{"id":149,"date":"2019-11-08T13:26:45","date_gmt":"2019-11-08T13:26:45","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=149"},"modified":"2021-09-10T06:53:11","modified_gmt":"2021-09-10T06:53:11","slug":"cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/","title":{"rendered":"Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1)<\/span><span style=\"font-weight: 400;\">\u00a0The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, both insider and privilege misuse.<\/span><span style=\"font-weight: 400;\">\u00a0(2) Half of the breaches were caused by insider threats and the remaining were from external forces which included hacking.<\/span><\/p>\n<p><!--more--><\/p>\n<p>It is clear that the healthcare industry, like any other, is facing increasing security challenges. What makes their challenges unique, and therefore more difficult to solve, is that implementing industry-standard cybersecurity practices isn\u2019t practical. It can inhibit clinicians\u2019 work, also leading to life-and-death consequences. For example, systems that prevent log-ins if clinicians are logged-in elsewhere can interrupt or delay surgeries or hinder emergency treatments. (3)<\/p>\n<p><b>Healthcare Cybersecurity: Protecting the Cloud &amp; Mobile Devices<\/b><\/p>\n<p>Mobile and cloud technologies, as well as healthcare exchanges, are all changing\u00a0<span style=\"font-weight: 400;\">the way healthcare organizations manage risk internally, extend security to their\u00a0<\/span><span style=\"font-weight: 400;\">partners and ensure security in concert with their application providers. Demand for\u00a0<\/span><span style=\"font-weight: 400;\">consumer-facing applications, especially mobile applications (and emphasis on patient\u00a0<\/span><span style=\"font-weight: 400;\">engagement, which drives portal access), spawns a whole new set of concerns and risks.\u00a0<\/span><span style=\"font-weight: 400;\">Such applications rely on consumers to manage their own sensitive data. (4)<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">How do we keep this data secure?<\/span><\/i><\/p>\n<p>Medical data such as patient records are typically accessed from one common point that may or may not be managed under company policy. Security can be increased on devices and applications, however user access still remains a vulnerable in how sensitive information is accessed and shared. It is imperative that organizations invest in ongoing education and awareness to \u201csecure the human\u201d mobile workforce. Modern Mobile Device Management and other device management programs are beginning to help reinforce these efforts with such capabilities as alerting a user when a possible policy violation is detected. (5)<\/p>\n<p>Employee monitoring applications are becoming standard in many companies, particularly those handling sensitive software such as in the healthcare sector. This software monitors what users are doing while logged in remotely and helps to provide clear evidence and root causes during investigations of security breaches.This software is often necessary for compliance and auditing purposes as in the case of HIPAA medical regulations regarding handling of patient records.<\/p>\n<p>Using a combination of technological innovations, common sense practices and education are necessary tactics to prevent as well as to help to resolve security breaches. It is the duty of every organization, especially those which handle sensitive data like those in the healthcare field, to ensure they take every practical measure possible to reduce the likelihood of future threats.<\/p>\n<p><b>Would you like to learn more?<\/b><\/p>\n<p>Visit our website to discover the most robust Remote Desktop Session Recording software available.<\/p>\n<p><a href=\"http:\/\/www.tsfactory.com\">www.tsfactory.com<\/a><\/p>\n<ol>\n<li><a href=\"https:\/\/www.scmagazine.com\/number-of-us-healthcare-data-breaches-almost-doubles-in-2016\/article\/631606\/\"><em>https:\/\/www.scmagazine.com\/number-of-us-healthcare-data-breaches-almost-doubles-in-2016\/article\/631606\/<\/em><\/a><\/li>\n<li><a href=\"https:\/\/www.alienvault.com\/solutions\/healthcare-security\"><em>https:\/\/www.alienvault.com\/solutions\/healthcare-security<\/em><\/a><\/li>\n<li><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2016\/12\/29\/balancing-cybersecurity-practices-with-the-realities-of-healthcare-operations\/#627ece9a7f48\"><em>https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2016\/12\/29\/balancing-cybersecurity-practices-with-the-realities-of-healthcare-operations\/#627ece9a7f48<\/em><\/a><\/li>\n<li><a href=\"https:\/\/uk.sans.org\/reading-room\/whitepapers\/analyst\/threats-drive-improved-practices-state-cybersecurity-health-care-organizations-35652\"><em>https:\/\/uk.sans.org\/reading-room\/whitepapers\/analyst\/threats-drive-improved-practices-state-cybersecurity-health-care-organizations-35652<\/em><\/a><\/li>\n<li><a href=\"https:\/\/www.healthit.gov\/sites\/default\/files\/Top_10_Tips_for_Cybersecurity.pdf\"><em>https:\/\/www.healthit.gov\/sites\/default\/files\/Top_10_Tips_for_Cybersecurity.pdf<\/em><\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1)\u00a0The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, both [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":150,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[22],"class_list":["post-149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-healthcare"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data - Blogs\" \/>\n<meta property=\"og:description\" content=\"The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1)\u00a0The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, both [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-08T13:26:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-10T06:53:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/an-elderly-woman-taking-notes-while-using-a-laptop-4057764-e1631256780882.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/\",\"name\":\"Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/an-elderly-woman-taking-notes-while-using-a-laptop-4057764-e1631256780882.jpg\",\"datePublished\":\"2019-11-08T13:26:45+00:00\",\"dateModified\":\"2021-09-10T06:53:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/an-elderly-woman-taking-notes-while-using-a-laptop-4057764-e1631256780882.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/an-elderly-woman-taking-notes-while-using-a-laptop-4057764-e1631256780882.jpg\",\"width\":600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data - Blogs","og_description":"The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1)\u00a0The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, both [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2019-11-08T13:26:45+00:00","article_modified_time":"2021-09-10T06:53:11+00:00","og_image":[{"width":600,"height":900,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/an-elderly-woman-taking-notes-while-using-a-laptop-4057764-e1631256780882.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/","name":"Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/an-elderly-woman-taking-notes-while-using-a-laptop-4057764-e1631256780882.jpg","datePublished":"2019-11-08T13:26:45+00:00","dateModified":"2021-09-10T06:53:11+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/an-elderly-woman-taking-notes-while-using-a-laptop-4057764-e1631256780882.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/an-elderly-woman-taking-notes-while-using-a-laptop-4057764-e1631256780882.jpg","width":600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-in-the-healthcare-sector-securing-sensitive-cloud-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/149\/revisions"}],"predecessor-version":[{"id":151,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/149\/revisions\/151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/150"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}