Three questions to ask

August 2017 Healthcare (Industry), Information Security

In the all-out war for data, the healthcare industry is getting hit the hardest. Experian’s fourth annual 2017 Data Breach Industry Forecast1 states that healthcare organisations will be the most targeted sector for attack, with new and sophisticated attacks emerging. If healthcare organisations and their IT teams aim to keep data safe, they need to take a step back to assess the overall security landscape and the security processes currently in place on a macro level.

Here are a few critical questions that all health IT professionals should ask themselves as they think about data security now and in the future.

1. Have we created a culture of security awareness?

Healthcare data security professionals generally agree that the most vulnerable point in a security framework is the users accessing and handling data on a daily basis. Whether it is data loss as a result of a phishing scam, hacked devices brought in from the outside or general carelessness when accessing sites or apps while on the network, there are a number of different ways employees can jeopardise patient data.

For this reason, health IT professionals should first build up cyber-awareness within the organisation to minimise future threats. That being said, successfully instilling cyber-awareness can be a challenge, as human nature leads individuals to believe they’re impervious to attacks. IT teams can attempt to change this mindset by educating and training the workforce.

While there are a variety of ways healthcare organisations can work to establish a more secure workplace culture, here are a few steps all should take:

• Lead by example: executives and directors should be a model for the rest of the organisation.

• Regularly schedule data training and education sessions throughout the year to provide the latest security trends to the organisation and to remind everyone that protecting data is everyone’s responsibility.

• Hold unscheduled inspections. Look for unattended and logged-in devices, usernames and passwords posted near (or under) devices, disabled security tools, unapproved network devices (such as wireless routers) and the use of proper protocols when logging in and out of multi-user devices.

• Recognise security success and remediate failure. Offer gift cards or other small incentives to those who pass an inspection or a phishing test while requiring additional security awareness training for those who don’t. Some organisations start with short remedial training that requires a 100 percent score on the follow-up quiz, then progressively longer training sessions for those who continue to fail. A formal reprimand in the employee’s yearly review is also an option at this point.

2. Are our current data security solutions equal to the threat?

Employee awareness is critical, but without cybersecurity solutions in place, deterring threats and minimising the number of attacks on your organisation will be next to impossible. To help lay the foundation for data security, organisations should first think about conducting a cyber threat assessment. This assessment will allow your organisation to validate the network’s current security accuracy, analyse traffic across the environment and monitor network performance.

Once this assessment has been completed, your organisation will have a better understanding of its current security posture and what steps to take next. Evaluating the data security systems and processes in place should be a recurring process. This is essential, as changes in healthcare networks and the threat landscape often happen at a rapid rate.

3. Are we in sync with health tech transformation?

The healthcare industry is in the midst of a technological transformation with the goal of improving patient care, and IT needs to be ready to support this progression.

More specifically, the Internet of things (IoT)2 has had a significant impact on the industry, forcing organisations to seamlessly connect both wired and wireless devices to their network. It’s also important to know whether legacy systems and technology are keeping pace with security changes and whether they’ll be protected against the next wave of attacks.

For these reasons (and more), healthcare IT professionals looking to improve data security should consider a security solution that hosts a centralised architecture and an established advanced threat protection (ATP) framework that can be accessed and managed in one place. Next-generation security solutions can help keep healthcare data protected and allow for the expansion of new patient care delivery models.

A strategy for success

The healthcare industry is making great technological strides to offer exceptional patient care, convenience and comfort, but these strides often create greater cyber vulnerability.

As we move through 2017, healthcare data will remain a top target within the cybercriminal community. However, if you and your team address the above questions and establish a robust cybersecurity defence plan, threats can be effectively reduced and attacks can be mitigated in a timely manner.

1 www.experian.com/assets/data-breach/white-papers/2017-experian-data-breach-industry-forecast.pdf

2 blog.fortinet.com/2016/09/12/healthcare-cybersecurity-risks-in-the-internet-of-medical-things





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Zero Trust and user fatigue
Access Control & Identity Management Information Security
Paul Meyer, Security Solutions Executive, iOCO OpenText, says implementing Zero Trust and enforcing it can create user fatigue, which only leads to carelessness and a couldn’t care attitude.

Read more...
Passwordless, unphishable web browsers
Access Control & Identity Management Information Security
Passkey technology is proving to be an easily deployed way to bring unphishable, biometric-based security to browsers; making identification and authentication much more secure and reliable for all parties.

Read more...
Practical guide to protect data privacy
Training & Education Information Security
The Data Privacy Toolkit, reflecting the evolving landscape of data privacy, includes guidelines and recommendations to safeguard sensitive information crucial for protecting sensitive information from malicious actors.

Read more...
Exclusive Networks Africa partners with HCLSoftware
News & Events Information Security
Exclusive Networks Africa has secured an agreement with HCLSoftware, the software business division of HCLTech, which will see the cybersecurity specialist for digital infrastructure add the HCLBigFix endpoint management platform to its existing cybersecurity offering.

Read more...