Keys to a healthcare cybersecurity strategy

Naming a CISO and maintaining a separate budget are two of the crucial elements


Naming a chief information security officer (CISO), maintaining a separate budget and stating a strategic objective are some of the crucial elements of a healthcare facility cybersecurity plan, according to an article on the Healthcare IT News website.

Board involvement and strict vendor scrutiny are also on the experts' must have list.

“Information risk management will inform many decisions that require organizational prioritization and ensure the C-suite and board are well-informed on threats, vulnerabilities and risks that may adversely impact the organization,” according to Rich Curtiss, a managing consultant at Clearwater Compliance.

Information security workforce should be from the information technology workforce to ensure adequate separation of duties and avoid conflicts of interest, Curtiss said. 

Read the article.

 

 



September 1, 2017


Topic Area: Information Technology


Recent Posts

From Vacant to Vital: Adaptive Reuse of Retail Spaces

Adaptive reuse of big-box retail spaces is an increasingly popular way to expand access to healthcare in urban and suburban settings.


Community Health Network Falls Victim to Data Breach

The Indiana-based network has no evidence that any personal information has been or will be misused as a direct result of this incident.


Hudson Regional Health Launches 4-Hospital System

The launch comes after CarePoint’s bankruptcy plan was confirmed and went “effective.”


Must Know Recalls of 2025

For the safety of our readers, Healthcare Facilities Today has closely followed all recall notices related to the industry.


Sustainability as a Baseline in Healthcare Facilities

Hospitals can balance costs, build resilience and learn from global models for sustainable design to further their green goals.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.