Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
30
31
1
2
3
4
5
6
7
8
9
11
12
13
16
17
18
19
21
23
24
25
26
27
29
30
31
1
The International Meeting for Simulation in Healthcare
2015-01-10 - 2015-01-14    
All Day
Registration is Open! Please join us on January 10-14, 2015 for our fifteenth annual IMSH at the Ernest N. Morial Convention Center in New Orleans, Louisiana. Over [...]
Finding Time for HIPAA Amid Deafening Administrative Noise
2015-01-14    
1:00 pm - 3:00 pm
January 14, 2015, Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Meaningful Use  Attestation, Audits and Appeals - A Legal Perspective
2015-01-15    
2:00 pm - 3:30 pm
Join Jim Tate, HITECH Answers  and attorney Matt R. Fisher for our first webinar event in the New Year.   Target audience for this webinar: [...]
iHT2 Health IT Summit
2015-01-20 - 2015-01-21    
All Day
iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging for more. 3. [...]
Chronic Care Management: How to Get Paid
2015-01-22    
1:00 pm - 2:00 pm
Under a new chronic care management program authorized by CMS and taking effect in 2015, you can bill for care that you are probably already [...]
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
Events on 2015-01-10
Events on 2015-01-20
iHT2 Health IT Summit
20 Jan 15
San Diego
Events on 2015-01-22
Latest News

Recognizing risk is the first step toward managing cloud-connected devices

Recognizing risk is the first step toward managing cloud-connected devices

In today’s healthcare environment, medical devices send their data directly to the cloud. Connected devices can send data directly to electronic health records, or a remote-hosted storage area for sharing with other healthcare delivery organizations managing cloud connected devices

As these devices collect and transmit real-time electronic protected health information, they often rely on out-of-date software that can be susceptible to malware.

James Angle, information security architect at Trinity Health, says in order to prevent cybersecurity incidents, said healthcare providers need to get a handle on the enormity and complexity of this problem, and catalog the threats and vulnerabilities.

“Managing medical devices is complicated, connecting to the cloud increases the complexity of securing medical devices by adding to the attack surface and the points of failure,” said Angle, who is scheduled to speak March 11 at HIMSS20.

Once upon a time, before connecting to the cloud, most health systems were only concerned with the security of the devices themselves and their own network infrastructure.

But “once you add the cloud to the picture,” said Angle, providers have to be concerned with “security of the device, the edge, and the cloud.”

That’s similar, he said, to what happens when IoT devices are introduced into provider ecosystems as unmanaged devices. Not only does it increase the risk to the organization, it “requires additional steps to ensure the security of both the device and the cloud.”

Angle said he worries that most health systems are not as prepared as they could be, because many are are being hit with three things at the same time: Employees are purchasing cloud services without management knowledge; there has been a large increase in IoT devices being introduced into the clinical ecosystem, and more manufacturers are connecting their medical devices to the cloud.

“All three of these are putting a burden on the (health systems) and they are struggling to identify and secure everything connected to the cloud,” Angle said. “Many do not have the infrastructure to identify, monitor, and control data flowing to the cloud.”

He said in order to assess the risk, they must first understand what hardware and software the devices use and where the data is processed, transmitted and stored.

“Once they know this, they can conduct a risk assessment,” Angle explained. “A major part of the risk assessment is understanding the threats at each step of processing, transmitting, and storing data.”

Source: https://www.healthcareitnews.com/news/recognizing-risk-first-step-toward-managing-cloud-connected-devices