Keys to a healthcare cybersecurity strategy

Naming a CISO and maintaining a separate budget are two of the crucial elements


Naming a chief information security officer (CISO), maintaining a separate budget and stating a strategic objective are some of the crucial elements of a healthcare facility cybersecurity plan, according to an article on the Healthcare IT News website.

Board involvement and strict vendor scrutiny are also on the experts' must have list.

“Information risk management will inform many decisions that require organizational prioritization and ensure the C-suite and board are well-informed on threats, vulnerabilities and risks that may adversely impact the organization,” according to Rich Curtiss, a managing consultant at Clearwater Compliance.

Information security workforce should be from the information technology workforce to ensure adequate separation of duties and avoid conflicts of interest, Curtiss said. 

Read the article.

 

 



September 1, 2017


Topic Area: Information Technology


Recent Posts

Infection Control is Key to Ongoing Measles Outbreak

Infection control is essential to protecting both patients and staff from contracting measles.


Kaiser Permanente to Open New Parker Medical Offices

It also announced it's in the early stages of planning a rebuild and expansion of its Westminster Medical Offices.


Skanska Completes Renovation for New Sutter Health Care Center

The new facility will provide internal medicine, family medicine, pediatrics, as well as lab and imaging services.


Probiotic Cleaners: The Start of a Cleaning Revolution?

Advantages of probiotic cleaning include fewer resistant genes and cost savings through decreased antibiotic use.


Gun Incident Highlights Need for Security Infrastructure

A man was arrested at Aultman Memorial Hospital after allegedly firing a gun in the ER.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.