New Report Address a Range of Health IT Security Issues in the Context of Rising Cybercrime

A new research report sponsored by the Institute for Health Technology Transformation (iHT2) looks at multiple aspects of health IT security, in the context of increasing concern driven by an explosion in cybercrime
April 28, 2014
2 min read

According to a new research report sponsored by the Institute for Health Technology Transformation (iHT2), “Cyber criminals are increasingly targeting the healthcare industry, because medical identity theft is more lucrative than the theft of personal identification information alone. Meanwhile,” the report notes, “healthcare systems are increasingly vulnerable to attack as electronic health records spread, and as the use of web portals for information exchange with patients and providers becomes more common.

“Healthcare Security: 10 Steps to Maintaining Data Privacy in a Changing Mobile World,” was written by a collaborative group of patient care organization and vendor executives. On the patient care organization side, the authors were James Dzierzanowski, information security officer at the San Francisco-based Dignity Health, and Howard E. Halle, chief information security officer at SCL Health System (Broomfield, Colo.). On the vendor side, Chris Brooks, SVP of technology at WebMD Health Services, and Sam Curry, CTO at the Naperville, Ill.-based RSA Medical, contributed. The report can be accessed here.

Among the “best practices for security in healthcare” that the authors cite are Halle’s reporting that SCL Health System “has a policy that advises users to keep devices with them at all times, but they still leave [devices in their cars and they get] stolen… Policy is not a security control,” Halle emphasizes, and the report goes on to say that “The important thing is to make sure that any patient data on the device is encrypted.” He further notes that, “In any organization, you have to balance security with operations. It isn’t security driving operations; operations drive security, and security should be able to live in harmony with those operations.”

The report goes on to address issues around, among other elements, the integrity of information residing within hospital, medical group, and health system information networks; the relative value of antivirus software; issues around single sign-on strategies, and around mobile device management.

Since December 2013, the Institute for Health Technology Transformation (iHT2) has been in partnership with Healthcare Informatics, through its parent company, the Vendome Group LLC.

About the Author

Mark Hagland

Mark Hagland

Mark Hagland has been Editor-in-Chief since January 2010, and was a contributing editor for ten years prior to that. He has spent 30 years in healthcare publishing, covering every major area of healthcare policy, business, and strategic IT, for a wide variety of publications, as an editor, writer, and public speaker. He is the author of two books on healthcare policy and innovation, and has won numerous national awards for journalistic excellence.

Sign up for our eNewsletters
Get the latest news and updates