New Report Address a Range of Health IT Security Issues in the Context of Rising Cybercrime

April 28, 2014
A new research report sponsored by the Institute for Health Technology Transformation (iHT2) looks at multiple aspects of health IT security, in the context of increasing concern driven by an explosion in cybercrime

According to a new research report sponsored by the Institute for Health Technology Transformation (iHT2), “Cyber criminals are increasingly targeting the healthcare industry, because medical identity theft is more lucrative than the theft of personal identification information alone. Meanwhile,” the report notes, “healthcare systems are increasingly vulnerable to attack as electronic health records spread, and as the use of web portals for information exchange with patients and providers becomes more common.

“Healthcare Security: 10 Steps to Maintaining Data Privacy in a Changing Mobile World,” was written by a collaborative group of patient care organization and vendor executives. On the patient care organization side, the authors were James Dzierzanowski, information security officer at the San Francisco-based Dignity Health, and Howard E. Halle, chief information security officer at SCL Health System (Broomfield, Colo.). On the vendor side, Chris Brooks, SVP of technology at WebMD Health Services, and Sam Curry, CTO at the Naperville, Ill.-based RSA Medical, contributed. The report can be accessed here.

Among the “best practices for security in healthcare” that the authors cite are Halle’s reporting that SCL Health System “has a policy that advises users to keep devices with them at all times, but they still leave [devices in their cars and they get] stolen… Policy is not a security control,” Halle emphasizes, and the report goes on to say that “The important thing is to make sure that any patient data on the device is encrypted.” He further notes that, “In any organization, you have to balance security with operations. It isn’t security driving operations; operations drive security, and security should be able to live in harmony with those operations.”

The report goes on to address issues around, among other elements, the integrity of information residing within hospital, medical group, and health system information networks; the relative value of antivirus software; issues around single sign-on strategies, and around mobile device management.

Since December 2013, the Institute for Health Technology Transformation (iHT2) has been in partnership with Healthcare Informatics, through its parent company, the Vendome Group LLC.

Sponsored Recommendations

How to Build Trust in AI: The Data Leaders’ Playbook

This eBook strives to provide data leaders like you with a comprehensive understanding of the urgent need to deliver high-quality data to your business. It also reviews key strategies...

Quantifying the Value of a 360-Degree view of Healthcare Consumers

To create consistency in how consumers are viewed and treated no matter where they transact, healthcare organizations must have a 360° view based on a trusted consumer profile...

Elevating Clinical Performance and Financial Outcomes with Virtual Care Management

Transform healthcare delivery with Virtual Care Management (VCM) solutions, enabling proactive, continuous patient engagement to close care gaps, improve outcomes, and boost operational...

Examining AI Adoption + ROI in Healthcare Payments

Maximize healthcare payments with AI - today + tomorrow