Keys to a healthcare cybersecurity strategy

Naming a CISO and maintaining a separate budget are two of the crucial elements


Naming a chief information security officer (CISO), maintaining a separate budget and stating a strategic objective are some of the crucial elements of a healthcare facility cybersecurity plan, according to an article on the Healthcare IT News website.

Board involvement and strict vendor scrutiny are also on the experts' must have list.

“Information risk management will inform many decisions that require organizational prioritization and ensure the C-suite and board are well-informed on threats, vulnerabilities and risks that may adversely impact the organization,” according to Rich Curtiss, a managing consultant at Clearwater Compliance.

Information security workforce should be from the information technology workforce to ensure adequate separation of duties and avoid conflicts of interest, Curtiss said. 

Read the article.

 

 



September 1, 2017


Topic Area: Information Technology


Recent Posts

A 'Superbug' Is on the Rise in Hospitals

CDC data on C. auris in New York, Illinois, California, Florida and Nevada found more than 1,000 reported cases each in 2023.


The Next Generation of Security Tech in Healthcare Facilities

Manufacturers discuss how AI-powered CCTV and touchless weapon detection are redefining how hospitals protect patients and staff.


Encompass Health Rehabilitation Hospital of St. Petersburg Opens

This marks the opening of Encompass’ twenty-fifth location in Florida.


Why More Facilities are Adding Gender Neutral Restrooms

Gender neutral restrooms help avoid controversy in public facilities.


Massachusetts Hospital Cyberattack Reflects Growing Vulnerability in Healthcare Systems

As outages disrupt patient care and emergency services, facility leaders are reminded that cybersecurity is a shared responsibility.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.