Data-Centric Approach Starves Data-Hungry Cybercriminals

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Data-Centric Approach Starves Data-Hungry Cybercriminals-3 Next

Control Access to Data and Permissions 

The stewards of health data need to control who is allowed access to the information and what they are allowed to do with it, regardless of location and device. Employees should be aware of their access and permissions. Health care organizations must enforce employee training and enforce it often. In the case of a phishing style attack, employees are typically the first line of defense for the organization and should always fully vet who they are corresponding with to understand what data access is allowed.

Health care breaches reached an all-time high last year, as employees and patients of major health care organizations found themselves victims of cyber attacks. Health care records have grown in value. Because they contain credit card data, email addresses, social security numbers, employment information and medical history, these records are both a desirable target for cybercriminals looking for a quick payout or, for the long con, a vehicle to engineer convincing correspondence to enter a corporate network via phishing. Whether stealing an identity, phishing for a payout or setting up a ransomware attack, compromised data, once out, is out forever.

Health care organizations have been easy targets. With a focus on compliance, important security measures are all too often lacking. A data-centric security approach could easily bring health care organizations up to speed, securing protected health information (PHI) at its origin regardless of where it resides.

Incorporating security capabilities such as encryption, better control and management of PHI and a data security framework will help alleviate health care organizations, employees and patients of the burden breaches take on their lives and boost confidence in their ability to trust their personal information is safe.

In this slideshow, Ron Arden, Fasoo, outlines steps organizations can take to better protect their critically important data and mitigate the risks of a data breach.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.