Privacy & Security
The Medical Group Management Association also has concerns about security risks that might be associated with the proposed rules, and says they go "too far, too fast."
The wide array of connected devices means "lot of different stakeholders that need to coordinate," on both the clinical and IT side. That requires "process and due diligence."
Research from Digital Shadows found imaging files particularly vulnerable.
The Auditor-General determined that deficiencies exist in the region’s public health digital record systems that make them “highly vulnerable.”
You can't secure a network that you don't understand. Mapping hospital IoT is a must-do process for the creation of an effective defense strategy, experts say.
SPONSORED
The risk is that with so many access points, there is the high potential for exfiltration of data, especially those consciously or unconsciously occurring because of vulnerabilities with privileged escalation— which is administrative-level access to all kinds of vital data about patients and the organization.
Three health IT infrastructure experts offer some sage advice on getting foundational network technologies up and running.
And that’s despite the fact that the average number of breaches has fallen, according to the OAIC.
Healthcare systems need to collaborate on defense and rely on AI and machine learning to respond to new threats, study finds.
Connected Health
Frost & Sullivan research found hospitals focusing on collaboration to improve security and maintain medical device connectivity and uptime as top priorities.