How to respond to a healthcare data breach

The cause is as important as the solution


When dealing a data breach, it's important for healthcare facilities to understand the cause of the breach, and not just work towards a solution, according to an article on the Healthcare IT Security website.

For instance, analyzing logs will allow a healthcare facility to look deep inside of its network and understand the flow of data and quickly analyze which part of the infrastructure was breached and then better understand why. 

Also, risk within an environment should be weighted based on the type of system and what data it houses. If a small part of the environment gets breached, what risk does it pose? 

New  security solutions allow a facility to find the root cause of a breach. An analytics approach can examine failures within the network related to configurations, patch levels and updates. 

Read the article.

 

 



January 10, 2018


Topic Area: Security


Recent Posts

Mattresses Require Strict Care to Prevent Spread of Infections

Poor cleaning and disinfection techniques contribute to the persistent contamination of patient mattresses.


Gardner Health Services Opens Alum Rock Health Center

The 10,080-square-foot facility provides essential medical, dental, mental and chiropractic services to the Mayfair and East San José neighborhoods.


The Children's Center of Hamden Reports Data Security Incident

The incident was detected on December 28, 2024.


Designing for Senior Care Communities Means Designing for Everyone

No spaces can be designed for just one person, designers need to think about everyone who will occupy the space.


Harlem Hospital Legionnaires' Outbreak Highlights Cooling Tower Risks

Seven deaths linked to the cooling towers underscore the need for stricter water system monitoring and preventive maintenance in healthcare settings.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.