Health IT infrastructure needs security upgrades

Healthcare organizations need more sophisticated security solutions


Healthcare organizations need security upgrades for more sophisticated systems, according to an article on the HIT Infrastructure website.

Healthcare facilities are spending more money upgrading their health IT infrastructure but may not be making the complementary digital security upgrades, according to a recent American Journal of Managed Care study.

The study found that network attacks, while less frequent than device or paper record theft, affected millions of patients and were more damaging overall.

Despite the implementation of more sophisticated health IT systems, security breaches are still prominent enough to be a severe threat to healthcare organizations, the article said. 

Read the article.

 

 



February 28, 2018


Topic Area: Information Technology


Recent Posts

Designing for Caregiver-Centered Support Spaces

When healthcare environments are designed to meet the needs of caregivers and patients, everyone who relies on the system experiences better outcomes.


Novant Health Gets Approval for Wesley Chapel Medical Center

The 32-bed hospital will be located in Monroe and is expected to be completed in 2030.


Rocky Mountain Associated Physicians Falls Victim to Data Breach

On February 2, 2026, Rocky Mountain confirmed that certain patient information may have been compromised because of a data security incident. 


The Disconnect Between EVS and Clinical Teams

A recent study shows that EVS feels disconnected from the clinical community, leading to negative experiences. 


Nemours Children's Hospital Opens Institute for Maternal Fetal Health in Delaware

The Institute for Maternal Fetal Health represents a comprehensive approach to supporting expectant patients who receive a complex diagnosis during pregnancy.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.