Implementation best practices: The optimal way to approach security
Security technologies and strategies have never been more important in healthcare than they are today. Healthcare provider organizations are one of the top targets of hackers today. The criminals are looking for those treasured electronic patient records, which fetch a hefty price on the dark web.
Healthcare CIOs and CISOs have to erect powerful defenses to keep evildoers at bay. And there are good approaches to take to healthcare cybersecurity technology and less effectual approaches. It’s important for health IT and health security leaders and workers alike to know the best ways to implement security technologies and to think about security in general.
Here, three healthcare cybersecurity experts offer their decades of experience to help CIOs, CISOs and others when it comes to best practices for safeguarding patient data and implementing security technologies.
Right off the bat, resilience
When implementing any new security technology, it should be reviewed for how it supports the organization’s resilience posture, said David Tobar, senior cybersecurity engineer at the Software Engineering Institute’s CERT Division at Carnegie Mellon University.
“Resilience is the capability for an organization to continue to operate, even when under attack, and to recover quickly when attacked,” he explained. “Establishing resilience requires implementing not just core functional requirements that a technology might provide, but also ensuring that the practices supporting it are institutionalized such that they will continue to operate even in times of organizational duress.”
Prepare for next-gen cybersecurity threats and join the #HITsecurity discussion at the HIMSS Healthcare Security Forum this Dec. 9-10 in Boston.
Source: Read Full Article