New Report Address a Range of Health IT Security Issues in the Context of Rising Cybercrime

April 28, 2014
A new research report sponsored by the Institute for Health Technology Transformation (iHT2) looks at multiple aspects of health IT security, in the context of increasing concern driven by an explosion in cybercrime

According to a new research report sponsored by the Institute for Health Technology Transformation (iHT2), “Cyber criminals are increasingly targeting the healthcare industry, because medical identity theft is more lucrative than the theft of personal identification information alone. Meanwhile,” the report notes, “healthcare systems are increasingly vulnerable to attack as electronic health records spread, and as the use of web portals for information exchange with patients and providers becomes more common.

“Healthcare Security: 10 Steps to Maintaining Data Privacy in a Changing Mobile World,” was written by a collaborative group of patient care organization and vendor executives. On the patient care organization side, the authors were James Dzierzanowski, information security officer at the San Francisco-based Dignity Health, and Howard E. Halle, chief information security officer at SCL Health System (Broomfield, Colo.). On the vendor side, Chris Brooks, SVP of technology at WebMD Health Services, and Sam Curry, CTO at the Naperville, Ill.-based RSA Medical, contributed. The report can be accessed here.

Among the “best practices for security in healthcare” that the authors cite are Halle’s reporting that SCL Health System “has a policy that advises users to keep devices with them at all times, but they still leave [devices in their cars and they get] stolen… Policy is not a security control,” Halle emphasizes, and the report goes on to say that “The important thing is to make sure that any patient data on the device is encrypted.” He further notes that, “In any organization, you have to balance security with operations. It isn’t security driving operations; operations drive security, and security should be able to live in harmony with those operations.”

The report goes on to address issues around, among other elements, the integrity of information residing within hospital, medical group, and health system information networks; the relative value of antivirus software; issues around single sign-on strategies, and around mobile device management.

Since December 2013, the Institute for Health Technology Transformation (iHT2) has been in partnership with Healthcare Informatics, through its parent company, the Vendome Group LLC.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...