An advancement of adopting a system that allows information security to be protected in all aspects is encouraged. I think that the implementation of this new system will ensure all information and data while it’s in storage to be protected and kept confidential. This will help also improve the accessibility of the structure on which the information security management system will be built on. They should develop and encourage people to strategize different processing methods for technology to smoothly adapt to its new setting, which will be beneficial. I believe that we should only implement a security program that’s simple and easy for users to practice, yet an effective system. Some components of this system could include easy access to the cloud, the implementation of an effective management structure, provide clear direction and access rights, password maintenance and management, and inspecting appropriate software configuration. I think this will significantly ensure the ability to monitor and detect threats in real time. Within these components of this new system, healthcare organizations should address the reduction of complex security problems by simplifying the usage of the right tools, laws, policies, and the enforcement of healthcare management issues being at risk via hackers and the overwhelming costs of …show more content…
Some of the top risks, as described in the Infosec Institute article “Top Cyber Security Risks in Healthcare” are as follows:
Healthcare organizations don’t allocate enough budget for IT security. Many industries such as the Federal government, banking, and finance allocate 10-15 percent of their total IT budget to security.
The Federal Bureau of Investigation reports that health records are a hot commodity on the black market and sell for 50 times the price of social security or credit card numbers. This may partially account for the rise in healthcare cyber attacks. Criminals use the data from the EHR to purchase prescriptions or medical equipment and sell it on the black market. They also use the patient data and a falsified medical facility to submit claims to payers. This type of crime can be more difficult to detect and dispute which makes resolution a trickier and longer process.
Ransomware, as described earlier, is a type of cyber attack that allows criminals to basically hijack your data and demand payment to relinquish access to the healthcare organization. This relatively new type of attack and the assault on the healthcare facility can be