Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
27
28
29
30
1
3
5
6
8
9
10
11
12
14
15
16
17
18
20
21
22
23
24
25
27
28
29
30
63rd ACOG ANNUAL MEETING - Annual Clinical and Scientific Meeting
2015-05-02 - 2015-05-06    
All Day
The 2015 Annual Meeting: Something for Every Ob-Gyn The New Year is a time for change! ACOG’s 2015 Annual Clinical and Scientific Meeting, May 2–6, [...]
Third Annual Medical Informatics World Conference 2015
2015-05-04 - 2015-05-05    
All Day
About the Conference Held each year in Boston, Medical Informatics World connects more than 400 healthcare, biomedical science, health informatics, and IT leaders to navigate [...]
Health IT Marketing &PR Conference
2015-05-07 - 2015-05-08    
All Day
The Health IT Marketing and PR Conference (HITMC) is organized by HealthcareScene.com and InfluentialNetworks.com. Healthcare Scene is a network of influential Healthcare IT blogs and health IT career [...]
Becker's Hospital Review 6th Annual Meeting
2015-05-07 - 2015-05-09    
All Day
This ​exclusive ​conference ​brings ​together ​hospital ​business ​and ​strategy ​leaders ​to ​discuss ​how ​to ​improve ​your ​hospital ​and ​its ​bottom ​line ​in ​these ​challenging ​but ​opportunity-filled ​times. The ​best ​minds ​in ​the ​hospital ​field ​will ​discuss ​opportunities ​for ​hospitals ​plus ​provide ​practical ​and ​immediately ​useful ​guidance ​on ​ACOs, ​physician-hospital ​integration, ​improving ​profitability ​and ​key ​specialties. Cancellation ​Policy: ​Written ​cancellation ​requests ​must ​be ​received ​within ​120 ​days ​of ​transaction ​or ​by ​March ​1, ​2015, ​whichever ​is ​first. ​ ​Refunds ​are ​subject ​to ​a ​$100 ​processing ​fee. ​Refunds ​will ​not ​be ​made ​after ​this ​date. Click Here to Register
Big Data & Analytics in Healthcare Summit
2015-05-13 - 2015-05-14    
All Day
Big Data & Analytics in Healthcare Summit "Improve Outcomes with Big Data" May 13–14 Philadelphia, 2015 Why Attend This Summit will bring together healthcare executives [...]
iHT2 Health IT Summit in Boston
2015-05-19 - 2015-05-20    
All Day
iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging for more. 3. [...]
2015 Convergence Summit
2015-05-26 - 2015-05-28    
All Day
The Convergence Summit is WLSA’s annual flagship event where healthcare, technology and wireless health communication leaders tackle key issues facing the connected health community. WLSA designs [...]
eHealth 2015: Making Connections
2015-05-31    
All Day
e-Health 2015: Making Connections Canada's ONLY National e-Health Conference and Tradeshow WE LOOK FORWARD TO SEEING YOU IN TORONTO! Hotel accommodation The e-Health 2015 Organizing [...]
Events on 2015-05-04
Events on 2015-05-07
Events on 2015-05-13
Events on 2015-05-19
Events on 2015-05-26
2015 Convergence Summit
26 May 15
San Diego
Events on 2015-05-31
Articles

A Primer on Medical Data Security

A Primer on Medical Data Security

With the ever increasing breadth of technology, network security for medical data has never been a more important topic of discussion. In order to keep your data safe and sound, you’re going to need to stay on top of several potential security pitfalls. Here are some examples.

Encryption and Decryption

Encryption and decryption are the cornerstones of network security. In essence, encryption is the process of distorting information in order to make it more private, and decryption is the process of converting the information back into its original form using a cipher. Simply put, information that is transferred over a network, or the internet at large, is made unrecognizable in transit to avoid the information being intercepted by third party actors, such as hackers. This is not a native function of HTTP, however, and requires the additional presence of an encryption and decryption method such as TLS. “What is TLS?” you might ask. TLS encryption/decryption is the additional security needed in order for HTTP to continue to see widespread use without sacrificing the privacy of internet users, essentially. HTTPS is HTTP having been enhanced with the aid of encryption and decryption coding like TLS.

Analytics

“Analytics” refers to the interpretation of data in order to form a conclusion as to its meaning. As it pertains to network security, analytics refers to the monitoring of factors like network traffic in order to determine potential breaches of security, as well as weaknesses that could be exploited by nefarious actors. Tracking the traffic of a given network is a crucial part of catching problems in real time, but it also assists in fortifying the network against potential attackers. One persisting benefit of network analytics is that of being able to determine the cause and origin of DDoS attacks by tracking requests from the client in question to the server being attacked. DDoS attacks are actually the direct target of another important network security tool.

DDoS Prevention Software

DDoS attacks occur when the attacker rapidly launches a series of requests to the targeted server in order to cause an overflow of traffic that crashes the server. DDoS attacks are carried out by computers that are infected with malware, which enables a superhuman level of traffic to be sent to the target. This is a common method of attacking a server, because it has historically been difficult to combat and leaves the server vulnerable in the wake of the crash. However, recent software developments give server operators the tools to prevent these attacks. Essentially, DDoS prevention software scans incoming requests for those that seem suspicious and automatically denies them. There is a sort of poetic justice in fighting fire with fire in this way.

Passwords

Password security has typically been a weak point for network security, as it falls to each individual user to provide a secure password in order to keep the network secure. Best practices have evolved considerably, so keeping members of your network abreast of recent developments is a crucial component of securing your network. You’ve likely found yourself somewhat annoyed by the oddly specific and seemingly arbitrary requirements that many platforms require you to meet in order to use them. However, there are very good reasons for those requirements; each of those requirements helps to make passwords more difficult to guess by hackers. A common practice nowadays is for a platform to randomly generate a password for you. This is an effective method of creating secure passwords, because they are utterly incomprehensible. For that reason, however, many users choose to create their own password so that they, at least, can remember it. In these cases, there are certain recommended features that your password should have, such as both letters and numbers, capital and lowercase letters, and special characters. This makes the password substantially more difficult to guess, in and of itself.

Network security is a vital part of a healthy network. With growing concerns of violations of privacy online in the wake of various data leaks and cyber attacks, network security is more difficult to guarantee. However, these tips can help you maintain a safe and secure network for you and your users.