CyberWisdom Safe Harbor Commentary:
Research over the past few years has shown that cybersecurity is a major healthcare problem, driving safety program funding and staff education up for being safe harbor.
Therefore, as hospitals begin to build a more realistic safety program, their leaders should focus on three key areas: supplier risk, risk assessment, and non-compliance.
One of the key risk areas that Hesse sees in terms of lawfulness and pure security is vendor risk – highlighted recently by third-party offenses due to misconfigured cloud buckets. For Hesson, one way to mitigate this problem is to require suppliers to self-certify as third-party risk assessment criteria. From a workload perspective, it is more efficient than the organization’s team to evaluate.
Hesse said: “From a legal point of view when you ask suppliers to self-certify, they can fulfill their contractual obligations to meet those standards.” It provides concrete, substantive hooks for suppliers to meet these standards. “
She said that risk assessment within the organization is also crucial to improving safety. It is a historical fact that one of the biggest risks to healthcare facilities is the Franconian system: equipment, independent systems, different hospital units, etc.
In the end, Hesse said she felt that at some point everyone might be hacked, so the organization had to test the emergency procedures in detail. Security leaders should drill staff – down to the phone tree level to determine who to call when a violation is detected on the system.
Quick Breach Response
Hesse said: “Time is important at the outset of the incident because you are not sure what you need – insurance, all of these steps – are problematic, and security professionals simply need to focus on the threat itself rather than Caught in trouble because of administrative problems.
Why hospitals must focus on risk assessments, breach response to strengthen cybersecurity
… Why hospitals must focus on risk assessments, breach response to strengthen cybersecurity
If you like to receive more of these curated safe harbor news alerts then subscribe to my mailing list. and come back soon at https://www.safeharboroncyber.com/Blog/ to read further CyberWisdom Safe Harbor Commentaries. Home » Curated SafeHarboronCyber’s CyberWisdom Post »