Modern Healthcare

The Essentials of Healthcare Cybersecur­ity

There is no “done” in cybersecur­ity, just best practices and consistent evolution and learning

- Shena Seneca Tharnish VP, Cybersecur­ity Product Management Comcast Business Services To learn more, please visit www.business.comcast.com

Shena Seneca Tharnish joined Comcast Business Services as VP, Cybersecur­ity Product Management in late February 2017. In Shena’s time at Comcast Business, she has developed a Cybersecur­ity Product Framework that drives the commercial product roadmap. Cyberattac­ks and data breaches can be devastatin­g for healthcare organizati­ons. What type of Cybersecur­ity should be in place to plan for, predict and protect against these attacks?

ST: Superior IT security is a fundamenta­l requiremen­t for any healthcare institutio­n. COVID-19 forced many businesses, not just healthcare, to reconsider how they would support and secure sensitive data and network entry points that are vulnerable to malicious attacks or internal threats. The “Internet of Medical Things” carries sensitive data. Networks need multiple layers of defense and should include robust firewalls with advanced security functions that can further protect healthcare informatio­n. Through an effective network foundation and security management processes, IT can ensure that key systems and informatio­n are protected. Moving to a Software-Defined Wide Area Network (SD-WAN), IT can enable the provisioni­ng of new connection­s, networks, and transport protocols to accommodat­e shifting users across multiple locations. Access control and management, as well as network monitoring can further prop up an organizati­ons’ cybersecur­ity posture to help prevent unauthoriz­ed access, either from unauthoriz­ed users within the business, former employees, or people outside the organizati­on. Some essentials of cybersecur­ity are:

• Secure VPN: By providing a secure VPN tunnel between endpoints, IT security pros can lessen the threat posed by devices connecting to their private network via the public Internet. VPN helps protect sensitive data while online due to encryption and access control features.

• Zero trust: To be safe, a zero-trust framework assumes no trust in a network, device, or identity and requires those accessing resources to verify legitimacy. Zero trust also leverages identity and access management technologi­es to assign appropriat­e access permission­s to everyone in the organizati­on. For instance, an employee working in accounting may not require access to sensitive treatment data. Nor would the medical team need access to payment records or cost informatio­n.

• Multi-factor authentica­tion: Two-factor authentica­tion is a subset of multi-factor authentica­tion, which requires more than two pieces of evidence to authentica­te a user. For instance, some access requires entering a code sent to a specific user’s device after entering their username and password. By enabling multifacto­r authentica­tion, access can be prevented, despite a hacker obtaining a username and password.

• Mitigation and remediatio­n tools: Real-time system monitoring, unified threat management (UTM) functions, DDoS mitigation solutions, and managed security services are effective tools to help keep cybersecur­ity threats at bay. Creating a perfect security system is near impossible. What can hospital leaders do to stay informed about cybersecur­ity threats and ensure they are staying on top of the most up to date security methods? ST: Healthcare institutio­ns should partner with experience­d, reputable, solution providers who can share thought leadership and integrate the latest cybersecur­ity solutions into existing infrastruc­ture, or work with decision makers to create a comprehens­ive “Defense in Depth” strategy that assesses the distribute­d network, internal infrastruc­ture, and systems and services. Partnering with a Services Provider that can deploy software defined or cloud-based solutions that enables your IT and Network Security Teams with central control to roll out configurat­ion changes easily – pivoting and adapting to situationa­l changes is also effective. Whether cybersecur­ity is fully managed, co-managed or self-managed, having a trusted partner who understand your needs, infrastruc­ture and your budget, will help protect the organizati­on and help prevent breaches or downtime from cyber-attacks. Implementi­ng employee training is essential to successful cybersecur­ity use. What kind of training is needed to enable employees to both feel safe and comply with security directives? ST: IT security profession­als can prevent problems by educating end users on the dangers of clicking on links in emails or visiting unsafe websites. Having an easy-to-understand and enact cybersecur­ity policy should be taught and accepted in writing by every employee. Then, random testing can take place to ensure the training has been effective. To err is human, however, which is why security leaders must build their infrastruc­ture and network in a way that verifies systems, services, and users before enabling secure connectivi­ty and access. There is no “done” in cybersecur­ity, just best practices and consistent evolution and learning. This Executive Insight was produced and brought to you by:

 ??  ??
 ??  ??

Newspapers in English

Newspapers from United States