• Expert Comments
  • Security Articles
  • News
  • Study & Research
  • How To
  • ISBuzz Expert Panel
    • InfoSec Expert Biographies
  • Security Videos
  • Security Education
  • Information Security Buzz

    Information Security Buzz

--

  • April 24, 2018
  • Follow us on Facebook
  • Follow us on Twitter
  • Follow us on YouTube
  • Follow us on Pinterest
  • Follow us on Linkedin
  • Events and Conferences
  • InfoSec Companies
  • InfoSec Training Providers
  • Cyber Insurance Providers
  • Advertise With Us
  • Free Resources
  • home
  • Hacked
  • IoT
  • Cloud Security
  • Mobile Security
  • Network Security
  • Application Security



  • Information Security Buzz
  • Expert Comments
  • Security Articles
  • News
  • Study & Research
  • How To
  • ISBuzz Expert Panel
    • InfoSec Expert Biographies
  • Security Videos
  • Security Education

Data Security Tips For Patient Safety Awareness Week

By John Suit, Chief Technology Officer, Trivalent
April 4, 2017

This week, U.S. healthcare organizations celebrate Patient Safety Awareness Week,which is traditionally focusedon reducing patient harm during on-site medical care. What many fail to consider is that information security is also a critical component of patient safety. An organization’s inattention to cybersecurity can be dangerous to patients, affecting their safety, identity and financial welfare.

IBM predicts the healthcare industry will see a growing number of data security threats in 2017, with exploitable information in electronic health records (EHR) continuing to fetch a high price on the black market. Regardless of the constant pressure put on healthcare organizations to lower healthcare costs for consumers, the industry simply cannot afford to skimp on cyber security.

Here are three considerations for healthcare leaders seeking to better protect their patients’ information, finances and safety:

Inspire a security-first company culture.

IBM reports that 68 percent of all network attacks targeting the healthcare industry came from insider threats. Two-thirds of these attacks resulted from unsuspecting employees who fell victim to phishing scams, misconfigured servers, lost laptops, etc. For this reason, it is imperative that organizations within the industry establish a security-first culture that starts from the top-down. Business leaders must set a good example by taking responsibility for turning data security into one of their organization’s core values. Through frequent and on-going training and security education, organizations can create a security-focused culture where safe computing practices and habits become second nature.

 Identify your risk.

From ransomware to data compromise through third-party vendors to unintentional or malicious insider threat,healthcare organizations face a daunting number of threats to patient data. In order to tackle these challenges, organizations must assume a defense-in-depth approach to data security that employs multiple layers of protection. Before deciding on what data protection technologies to implement, healthcare leaders and their teams must thoroughly assess their risk. By identifying where their most critical data travels and is stored, organizations can protect this data with technology that resides at the file’s core, creating a last line of defense that stays with data when it’s in use and at rest.

Pay special attention to mobile devices.

Mobile computing devices such as laptops, tablets and smart phones are now an integral part of a healthcare employee’s workflow. Health insurance providers, home care workers and remote outpatient cliniciansrely on these devicesto access sensitive, private data like protected health information (PHI) and personally identifiable information (PII). Threats can arise when this data is accessed and stored on mobile computing devices in the field; sometimes with no internet connectivity. Healthcare organizations are vulnerable to additional risk if these devices are lost, stolen or breached. In order to gain a better handle on their employees’ devices, organizations should employ data protection that encrypts, shreds and securely stores data, in real-time, without creating any noticeable changes to the end-user. Healthcare leaders should alsoimplement and enforce policies that stipulate circumstances under which devices can be removed from the facility.

About John Suit
John SuitJohn is Chief Technology Officer at Trivalent, where he explores and architects contemporary technologies that drive innovation. John previously served in both founding and executive roles at leading-edge technology companies such as Xceedium Inc., Silent Runner Inc., and Nano Network Engines. He holds over 22 U.S. and International Patents in Information Security Analysis, Cyber Defense, Ontological Inference systems, Splice Code Collaboration Analysis and Securing Cloud Environments, with an additional 8 patents pending.

OUR INFORMATION SECURTIY NEWS CHANNEL





RECOMMENDED CONTENTS






Recent Posts

  • GDPR1-e1495790925348-165x60.jpg
    Five Reasons To Be Cheerful About GDPR
    Oliver Vistisen
  • gdpr-165x60.jpg
    1 Month Till GDPR
    Rufus Grig
  • SWIFT-Banking-165x60.jpg
    SunTrust Bank Employee Steals Critical Data On 1.5 Million Customers
    Javvad Malik
  • Cybersecurity-background-2-165x60.jpg
    More Than 80 UK Manufacturing Plants Hit By Cyber Attacks
    Security Experts
  • GDPR-Ready-165x60.png
    Greatest GDPR Compliance Challenges From RSA
    Netskope

InfoSec Jobs From ISbuzz Dot Jobs
Flaw In Office 365
Previous
WhatsApp Backdoor Comment
Next

isbuzz logo

Information Security Buzz (aka ISBuzz News) is an independent resource that provides the best in breaking news for the information security community.


Follow Us

Connecting InfoSec with News

ABOUT US

CONTACT US

CONTRIBUTING AUTHORS

Connecting You with InfoSec

ADVERTISE WITH US

BE PART OF OUR INFOSEC AUTHOR COMMUNITY

DIRECTORY LISTING (INFOSEC COMPANIES TO WATCH)

PUBLISH YOUR INFOSEC EVENT OR CONFERENCE

TRENDING THIS WEEK

  • SANS Experts Share Five Most Dangerous New Attack Techniques
    SANS 
  • Botnets Remain A Persistent Cyber Threat
    CenturyLink
  • Russian Cyber Threat
    Security Experts
  • Grenfell Data Breach
    Jon Fielding
Back to top
  • Expert Comments
  • Security Articles
  • News
  • Study & Research
  • How To
  • ISBuzz Expert Panel
  • Security Videos
  • Security Education

Copyright © 2016 ISBuzz News.