Healthcare records, which can include financial data, can garner up to $20 or more per health on the black market, compared to $2 per credit card record, according to WEDI. This means that most of the applications used in healthcare could be providing a risk. The average healthcare organization uses 928 cloud services, and only 7% of those meet enterprise security and compliance requirements, according to Skyhigh Networks. He says that because of the large amount of customers many cloud-based vendors have, hackers can steal a lot more data in less time. They recommend that healthcare systems consider bringing in independent security professionals or relevant software and hardware vendors, as third-party providers can help organizations identify (and plan around) their security needs and expenses.ĭon't assume that the information stored on the cloud is safe, Mounil Patel, vice president of strategic field engagement for Mimecast, recently told Managed Healthcare Executive. "Without ample investments in advanced tools and human capital, a firm's internal cybersecurity staff and systems will always be deficient," they wrote. Similar to lacking appropriate leadership, healthcare organizations lack the necessary in-house IT staffing, said Curran and Hinde. They recommend that organizations identify the most critical deficiencies upon completing risk assessments, and then commit the necessary resources toward addressing them. While most organizations conduct regulatory mandated risk assessments, many fail to act on the findings, according to Curran and Hinde. To ensure information is secure make clear distinctions on how personal mobile devices can be used through a bring your own device (BYOD) policy, Mike Willingham, vice president of quality assurance and regulatory affairs at Caradigm, recently told Managed Healthcare Executive. With more organizations allowing employees to use their personal devices for professional purposes, that concern is warranted. Mobile device security accounted for 40% of worries reported by healthcare organizations in 2014, according to Caradigm. The Spector Soft report says that inadvertent data breaches account for 57% of insider threats, while malicious data breaches account for 53% of insider threats. Make sure your employees are thoroughly educated on security risks and vulnerabilities, particularly when it comes to social engineering attacks such as phishing messages. Health organizations, they say, should invest more in cyber defense tools, and in ensuring that those tools are integrated successfully in their daily operations.Īccording to a report by Spector Soft, the most risky users in an organization include managers with access to sensitive information, and contractors and consultants, who are often temporary workers. They cite a Forrester research finding that insurance organizations, hospitals, and doctors, devote only 14% of their IT spend to security concerns. In addition to leadership gaps, many organizations lack the proper security tools, according to Curran and Hinde.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |