Tips to improve cyber security in the health sector

Although security is not the subject of a specific recommendation, it is fundamental to the success of such transformation and building trust with patients and professionals. However, the Information Commissioner’s Office (ICO) 2016 report on data breaches across sectors identified the health sector as twice as bad as the next sector for reported data breaches.

Although there are factors that may have amplified this number unfairly, the health sector cannot afford not to be at the top of its game when it comes to data and cyber security.

Cyber security can appear complex and needs expert skills to understand and manage it. True, there is no one-stop solution that achieves a secure, robust digital environment that both upholds privacy and allows sharing of data across an integrated world of healthcare and social care.

However, it is so fundamental to digital environments that it cannot be overlooked by any organisation, particularly not one that deals with the sensitive medical data of the entire population.

A survey, published earlier this year, found that NHS IT managers think security measures in the NHS are stronger than they actually are. NHS Digital has launched a programme that aims to enhance cyber resilience across health and social care by providing incident broadcasts, training and resources to health and care providers, but before you get that far, there are some basic steps any organisation can take to prevent the type of security breach that often hits the headlines, and for which the ICO has fined healthcare organisations in recent years.

Train your staff

Humans are the weakest link. Most people will not deliberately create insecurities, but if they don’t even know what the risks are and what to watch out for, there is no chance they can help defend against them. Phishing attacks are on the rise specifically because people can be targeted more successfully than breaking technical barriers.

Some 62% of breaches reported to the ICO originate from human error or human weakness, such as clicking on links in phishing attacks, so it is vital to tackle this.

Update your software

Software needs constant maintenance to correct issues and address new vulnerabilities. Most software manufacturers make updates and patches for off-the-shelf software available for free, and implementation is usually designed to be “do-it-yourself”. Updates can be more complicated in large, bespoke systems and this should be taken into account when procuring new software and building systems.

Do not use default passwords

These can be guessed and offer no protection. If the functionality is provided within a system, use it. Although obvious, do not write the password on a piece of paper next to an entry system. Clearly, having to remember a host of different passwords for different systems is annoying, but single-sign-on solutions and proper architecture can help to minimise this.

Encrypt laptops

Encryption is a hugely effective tool for securing information. It can be controlled centrally, so organisations are not reliant on front-line staff being vigilant and trained. It mitigates the effect of stolen or lost laptops being used to hack into systems. Different levels of encryption are available depending on the sensitivity of the data.

Double-check recipients

It is too easy to mis-type a fax number or let automatic email address recognition tools fill in a different email address to the one you intended to send to. Train and remind staff of the importance of paying close attention here, particularly when sending emails to lots of parties or when sending large files.

These five steps are essential, but it is also important to remember that maintaining security must be made easy. If processes are too cumbersome or time-consuming, people will see them as a barrier to doing their job and will work around it, usually in a very insecure manner. Security is also an ongoing operation, not a one-time fix.

New threats develop, new technology emerges and people churn. Organisations must constantly reassess and update practices to address new issues and to ensure that current practices are maintained among staff.

Prevention is better than cure. If there is a breach, you need to react. But it is not good enough to bury your head in the sand and hope it won’t happen. Breaches break trust, and that is not something the health sector can afford to lose.

23 comments

  1. I simply want to tell you that I am just new to blogging and actually savored your blog site. Very likely I’m want to bookmark your blog . You really have excellent articles. Appreciate it for revealing your web page.

  2. I simply want to say I am very new to weblog and certainly liked your web site. More than likely I’m planning to bookmark your blog post . You actually come with tremendous posts. Many thanks for sharing with us your blog site.

  3. Sorry for the huge review, but I’m really loving the new Zune, and hope this, as well as the excellent reviews some other people have written, will help you decide if it’s the right choice for you.

  4. I went over this site and I think you have a lot of great information, bookmarked (:.

  5. Thanks a bunch for sharing this with all of us you really recognize what you are talking about! Bookmarked. Please also seek advice from my website =). We could have a link trade agreement between us!

  6. I have recently started a site, the info you provide on this site has helped me tremendously. Thanks for all of your time & work.

  7. hey there and thank you for your information – I have definitely picked up something new from right here. I did however expertise a few technical issues using this website, as I experienced to reload the site lots of times previous to I could get it to load properly. I had been wondering if your web hosting is OK? Not that I’m complaining, but slow loading instances times will sometimes affect your placement in google and can damage your high-quality score if advertising and marketing with Adwords. Well I am adding this RSS to my email and could look out for a lot more of your respective intriguing content. Ensure that you update this again very soon..

  8. I was just seeking this info for a while. After 6 hours of continuous Googleing, finally I got it in your site. I wonder what is the lack of Google strategy that don’t rank this type of informative websites in top of the list. Usually the top web sites are full of garbage.

  9. wonderful points altogether, you just received a emblem new reader. What could you suggest about your submit that you simply made some days in the past? Any sure?

  10. My brother recommended I might like this blog. He was totally right. This post truly made my day. You cann’t imagine simply how much time I had spent for this info! Thanks!

  11. I get pleasure from, result in I found just what I used to be taking a look for. You’ve ended my four day long hunt! God Bless you man. Have a great day. Bye

  12. Nice blog here! Also your web site loads up very fast! What host are you the usage of? Can I get your affiliate link to your host? I desire my website loaded up as quickly as yours lol

  13. Keep up the good piece of work, I read few blog posts on this website and I believe that your website is really interesting and has circles of excellent information.

  14. I truly appreciate this post. I’ve been looking all over for this! Thank goodness I found it on Bing. You have made my day! Thanks again!

  15. Generally I do not read post on blogs, but I wish to say that this write-up very forced me to try and do so! Your writing style has been amazed me. Thank you, quite great article.

  16. Awsome site! I am loving it!! Will be back later to read some more. I am bookmarking your feeds also

  17. It¡¦s truly a nice and useful piece of info. I¡¦m glad that you simply shared this useful info with us. Please keep us informed like this. Thank you for sharing.

  18. hello!,I love your writing so so much! share we be in contact extra approximately your post on AOL? I need a specialist in this house to resolve my problem. May be that’s you! Looking ahead to peer you.

  19. Thank you, I’ve just been looking for info about this topic for a long time and yours is the best I’ve discovered till now. But, what concerning the conclusion? Are you sure about the supply?

  20. Great paintings! This is the kind of information that should be shared around the internet. Shame on Google for no longer positioning this post upper! Come on over and seek advice from my website . Thank you =)

  21. The new Zune browser is surprisingly good, but not as good as the iPod’s. It works well, but isn’t as fast as Safari, and has a clunkier interface. If you occasionally plan on using the web browser that’s not an issue, but if you’re planning to browse the web alot from your PMP then the iPod’s larger screen and better browser may be important.

  22. I’ll right away grab your rss feed as I can not to find your email subscription link or newsletter service. Do you’ve any? Please allow me know so that I may just subscribe. Thanks.

Leave a Reply

Your email address will not be published. Required fields are marked *

سوال امنیتی: