BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Putting the Health Care Cart Before the Horse?

Post by Peter McCalister January 14, 2011

Health Information Exchanges (HIEs) are the latest buzz phrase to hit the compliance marketplace. In a recent post blogger phiprivacy.net, reported on the opinions of top IT experts, about the top Patient Health Care Information trends for 2011.heath information exchanges need least privilege

Amongst a clear indication of increased breaches; imposition of fines and other regulatory action; as well as the implementation of new laws, the experts identified the launch of new health information exchanges (HIE) as the main driver of change in enforcing increased security and privacy.

Although HIEs have a noble purpose in making it easier for health care professionals to access patient information electronically across multiple organizations within a region, community or hospital systems, in order to provide more efficient and effective care, the risks of increased exposure to data breach remain high.

Not only do the experts point out that many HIEs will be launched by inexperienced and understaffed organizations, they will be launched in an industry (health care) which has consistently failed to keep pace with data security best practices and governance.

This is clearly a case of health care organizations putting the cart before the horse.

Leave a Reply

Additional articles

April VEF Participant Wins a Apple iPad mini

Every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization and a way to…

Post by Qui Cao April 24, 2014
smart rules manager for vulnerabilities - v2

A New Way of Looking at Vulnerabilities in Your Environment

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does…

Post by Morey Haber April 23, 2014
Tags:
, , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,