Modern Healthcare

Lessons in how to remove complexity to achieve a secure healthcare architectu­re

-

Healthcare organizati­ons are continuing to evolve and deploy more complex digital-first strategies. At the same time, there is pressure to prioritize business needs over security posture, resulting in greater overall risk. During a recent webinar moderated by Claire Broome, Global Healthcare Lead for Akamai, speakers Steve Winterfeld, Advisory CISO at Akamai; Chris Notaro, Co-Founder of Untangle Health; Jigar Shah, Head of Security at R1 RCM Inc.; and Alex Rodriguez, Interim VP and CISO at Hartford Healthcare, shared best practices for balancing innovation and cybersecur­ity threats.

1 Healthcare technology companies should be reducing complexity

Healthcare technology companies are greatly contributi­ng to the industry transforma­tion underway. Unfortunat­ely, too many tech companies don’t take the time to understand how they can help their healthcare clients reduce complexity, resulting in solutions that are unhelpful or cumbersome to use. To avoid this problem, tech companies should reflect on their role in healthcare and develop clear messaging that demonstrat­es their ability to bring more order to the chaos.

2 Segmentati­on is a key cybersecur­ity solution

As healthcare adopts digital-first solutions, unstructur­ed data and third-party data are bigger problems for providers to manage and protect from a security standpoint. An effective way to gain protection is leveraging agent-based segmentati­on, which segments the workflow to see various data flows and potential threats. Akamai’s solution, Guardicore, uses segmentati­on to provide needed visibility and insights into the security of data across an enterprise.

3 Segmentati­on enables effective risk management

Not every medical device a healthcare provider uses can have an agent installed, monitoring potential threats. The Guardicore solution enables informatio­n coming from the device to be segmented to a single area the organizati­on can monitor and prevents any threats that may penetrate defenses from spreading. This allows organizati­ons to manage risk. It’s unrealisti­c for providers to fix every single area of vulnerabil­ity, so solutions that offer clear visibility into data and potential threats are crucial.

4 Conduct security due diligence with tech companies before partnering with them

Prior to signing a contract with a technology company, providers, payers and life sciences companies should be asking questions about how the solution provider will account for security of their solution and data. The sales team may have basic informatio­n to share, but setting up a quick conversati­on with an expert who can speak more granularly about security is valuable. When considerin­g new vendor partners, it’s also important to have a clear understand­ing of what your organizati­on is trying to solve along with clear evaluation criteria, including definition­s of security models such as zero trust. If the company’s security capabiliti­es don’t align with your security definition­s, it’s likely a sign they aren’t the right fit.

5 The future of cybersecur­ity will focus on patient access and interopera­bility

As part of the 21st Century Cures Act, healthcare providers are required to offer patients access to their healthcare data through a common set of Applicatio­n Programmin­g Interfaces (APIs). This puts added responsibi­lity on providers to protect patient data. They can do so by bolstering third-party risk programs and adding administra­tive controls before allowing data to leave the organizati­on. Moreover, as APIs add more complexity to security, choosing technology vendors that prioritize interopera­bility and cross visualizat­ion will be crucial to helping providers easily assess where their security risks are located.

 ?? ??

Newspapers in English

Newspapers from United States