The Effects of Patient Access to Data Cybersecurity

The Effects of Patient Access to Data Cybersecurity

Benefits vs. Consequences of Increasing Patient Power Over the past few years, there has been a shift in national healthcare systems to provide patients with greater access to their own medical records. Legal and technological trends have also granted patients more convenient access to medical records via the internet. As of 2017: United States: The Health Insurance Privacy and Portability Act (HIPPA) stipulates that patients must be permitted to review and amend their medical records. (1) United Kingdom: British GPs…

Read More Read More

Cybersecurity in the Healthcare Sector: Securing Sensitive Data in the Cloud

Cybersecurity in the Healthcare Sector: Securing Sensitive Data in the Cloud

The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1) The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by insider and privilege misuse. (2) Half of the breaches were caused by insider threats and the remaining were from external forces which included hacking. It is clear that the…

Read More Read More

The Cloud and the Need to Monitor User Activity

The Cloud and the Need to Monitor User Activity

With the advent of server virtualization and cloud technology, there has been a need to capture and record user activity. Computing technology has come a long way. Its early beginnings started in clean rooms filled with large, ceiling high mainframe computers. A separate room lined with rows of terminals on tables was for user access. Pull up a chair and log in remotely to the mainframe for your own personal computer account. You shared the system with dozens of other users, each being allocated…

Read More Read More

Welcome to our blog!

Welcome to our blog!

  Welcome to our first post InfoDigest Digest! This is a blog where we will discuss all the latest happenings in the cybersecurity world. In future posts, we will discuss monitoring user activity, data security and HIPPA, technological vulnerabilities in the financial sector as well as technical how-tos!