Common Security Threats, and Countermeasures in Healthcare
Unsecured Data
CMPSC 260
Kirsten Cooper & Jeff Peters
4/28/2014
Bibliography
- Shared accounts can be easily broken into.
- Outdated systems can be accessed by hackers in various ways
- Countermeasures:
- Unique accounts for every user.
- Verified encryption
- Backups, backups, backups...
Malware
- Ciampa, Mark D., and Mark Revels. Introduction to Healthcare Information Technology. Boston, MA: Course Technology, 2013. Print.
- "HealthIT.gov." Meaningful Use Regulations. N.p., n.d. Web. 29 Apr. 2014.
- Email is easily mass distributed, infecting many workstations at once
- Social media is widely popular making it a gateway for many phishing attacks, etc.
- Not conducting regular system updates are key to keeping malware at bay.
- Countermeasures:
- Updated virus protection and malware detection software.
- Backups are essential for recovering from malware attacks.
Meaningful Use
Cloud Storage
- Became part of the HITECH Act in 2009.
- Through this patients must be able to access their charts.
- Can cause issues to the patient database if the patient is to connect to their chart while on an unsecured network
- Countermeasure:
- Keep patient data and the work environment separate.
Identity Theft
- Transportation to the cloud server might be encrypted, but the actual company's server might not be.
- Countermeasure:
- Do research on the cloud server you might use to make sure it's reputable.
- Encrypt your own data and keep extra backups of your data off site.
- Unencrypted data can be easily intercepted by black hats.
- Entire identity in one place can be catastrophic.
- Countermeasures:
- Real time verification.
- Backups are needed in case of stronger attacks.
- Secured, strong passwords.
Security Threats and Countermeasures in HIT