How to respond to a healthcare data breach

The cause is as important as the solution


When dealing a data breach, it's important for healthcare facilities to understand the cause of the breach, and not just work towards a solution, according to an article on the Healthcare IT Security website.

For instance, analyzing logs will allow a healthcare facility to look deep inside of its network and understand the flow of data and quickly analyze which part of the infrastructure was breached and then better understand why. 

Also, risk within an environment should be weighted based on the type of system and what data it houses. If a small part of the environment gets breached, what risk does it pose? 

New  security solutions allow a facility to find the root cause of a breach. An analytics approach can examine failures within the network related to configurations, patch levels and updates. 

Read the article.

 

 



January 10, 2018


Topic Area: Security


Recent Posts

From Downtime to Data: Rethinking Restroom Reliability in Healthcare

Manufacturers discuss the operational issues plaguing healthcare restrooms and how to shift maintenance from reactive to resilient.


LeChase Building Four-Story Addition to UHS Delaware Valley Hospital

It will consolidate services into a state-of-the-art Medical Neighborhood.


AdventHealth Sebring Breaks Ground on Expansion Project

Construction is scheduled to begin in March and is anticipated to be completed in Fall 2027.


Regulations Take the Lead in Healthcare Restroom Design

Infection-control guidance and water management standards drive earlier planning, smarter fixtures and more resilient restroom environments.


AHN Allegheny Valley Hospital Opens Expanded Inpatient Rehabilitation Unit

Construction began in July 2025 and included 12 new inpatient rehabilitation beds, bringing the unit’s total to 29.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.