Data-Centric Approach Starves Data-Hungry Cybercriminals

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Data-Centric Approach Starves Data-Hungry Cybercriminals-5 Next

Require a Data-Centric Approach

The days of compliance over security must end — today’s threat environment is far more sophisticated and, in turn, requires a more intense approach. While EHR (electronic health record) and EMR (electronic medical record) systems have the ability to protect information within the system, they do not prevent against unauthorized users accessing the data once someone downloads it from the system. It’s crucial to focus on protecting the data, not only the system where it lives.

Health care breaches reached an all-time high last year, as employees and patients of major health care organizations found themselves victims of cyber attacks. Health care records have grown in value. Because they contain credit card data, email addresses, social security numbers, employment information and medical history, these records are both a desirable target for cybercriminals looking for a quick payout or, for the long con, a vehicle to engineer convincing correspondence to enter a corporate network via phishing. Whether stealing an identity, phishing for a payout or setting up a ransomware attack, compromised data, once out, is out forever.

Health care organizations have been easy targets. With a focus on compliance, important security measures are all too often lacking. A data-centric security approach could easily bring health care organizations up to speed, securing protected health information (PHI) at its origin regardless of where it resides.

Incorporating security capabilities such as encryption, better control and management of PHI and a data security framework will help alleviate health care organizations, employees and patients of the burden breaches take on their lives and boost confidence in their ability to trust their personal information is safe.

In this slideshow, Ron Arden, Fasoo, outlines steps organizations can take to better protect their critically important data and mitigate the risks of a data breach.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.