SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
GreyCastle Security intel@greycastlesecurity.com Page | 1
(800) 403-8350
GreyCastle Security intel@greycastlesecurity.com Page | 2
(800) 403-8350
1. The New Era of Cybercrime..........................................................................................................3
2. Healthcare’s Problem with Patient Safety ...................................................................................3
3. The New Approach to Patient Safety...........................................................................................4
4. Conclusion .....................................................................................................................................7
5. About Dr. Bertine Colombo McKenna..........................................................................................8
GreyCastle Security intel@greycastlesecurity.com Page | 3
(800) 403-8350
1. The New Era of Cybercrime
Healthcare has had many cyberattacks in the last year. Making this a top safety issue in
a healthcare organization is challenging – a challenge that executives must make a top
priority. The 2018 Environmental Scan, released by the American Healthcare Association,
was a reminder of the complicated business that healthcare represents. When
developing new innovative programs to serve our patients and competing in an ever-
complicated environment, we don’t often stop for a minute and ask “are we protecting
our patients’ privacy thoroughly?” Unlike any other business, healthcare leaders go to
work every day with the knowledge that they have the ability to protect and enhance
lives and unintentionally hurt them as well. This white paper is directed at the
fundamentals that must be undertaken in the healthcare environment to protect the
organization and its patients from cybercrime.
2. Healthcare’s Challenge with this Patient Safety Issue
For the first time in history, cybersecurity has become a life or death issue. No healthcare
organization is immune to today’s threat landscape. According to a recent study done by
the Ponemon Institute, data breaches have cost healthcare organizations $6.2 billion
with the average electronic health record (EHR) costing $355.
In the high paced world of healthcare where every day represents a new modality, a new
technology, a new system of care, a new political worry, we have to make sure that we
are protecting patient privacy. Imagine, if you will, a situation where a healthcare
organization is developing its population health plan. In the thousands of steps necessary,
is cybersecurity part of the planning? As we plan to ensure that information is shared for
coordination of care, are we stopping to say, “can we protect their identity?” In
population health efforts, are we asking partners if they are taking proactive
cybersecurity measures? When the latest innovative monitoring system becomes
available, are we asking if the manufacturer has built-in protection from cyberattacks
before we buy it? In developing telemedicine programs, are we asking question about
privacy and cybersecurity as we develop these programs? In the latest news article about
Amazon, JP Morgan and Berkshire Hathaway’s announcement about developing
GreyCastle Security intel@greycastlesecurity.com Page | 4
(800) 403-8350
healthcare programs causes me to wonder, how this will impact privacy and
cybersecurity? Renewed focus on Telemedicine programs should be coupled with a full
assessment of how patient privacy can be protected
Recall, when patient safety began to be part of our conversation, years ago, it became
part of how we developed new programs, ensuring potential safety hazards were
evaluated and mitigated preprogram startup. When quality became a key component of
healthcare program planning, we built in quality measures by which to evaluate the
program and held them as important as financial measurements. Are we doing this in the
new era of cybercrime?
Envision the benefits and opportunities this problem creates. Not only can your
organization be the leader in this space, you can achieve immediate financial savings by
implementing proactive cybersecurity measures, comply with various regulations such as
the Health Insurance Portability and Accountability Act (HIPAA), establish a competitive
advantage by becoming the preferred healthcare solutions provider, but also ensure the
protection of your patients’ safety and well-being.
3. The New Approach to Patient Safety
How do we begin to protect our patients as we develop new ideas, programs, systems of
care, and digital solutions?
Most articles and white papers on this topic are focused on the information technology
and assessment solutions that are currently thought to be the best practice. However, as
a former healthcare executive and a current consultant, I am struck by the fact that this
needs to be approached in a very different way.
As I study the solutions that many organizations are using, it focuses on how the current
information system can be strengthened with information technology and the ways in
which one can assess their systems.
I do not have an information technology (IT) background, as I am a former healthcare
executive who served as Chief Operating Officer (COO), and therefore, this whitepaper is
not focused on IT solutions, antivirus or firewalls. It is directed at specifically what
GreyCastle Security intel@greycastlesecurity.com Page | 5
(800) 403-8350
healthcare organizations’ leadership team should be doing right away from an insider’s
view. Too many times I have read about solutions from those who have not had the
opportunity to be inside a complex whirling healthcare organization to know where to
focus cybersecurity efforts for the betterment of safety and patient care, I bring that
perspective.
It is my view that a very different approach should be taken. I would suggest the
following hypothesis:
Every day, healthcare organizations accept responsibility for patients who entrust their
lives and information to us. In a very organic way, we accept it and “bubble wrap” that
responsibility with numerous approaches to safety. Part of the paradigm shift in patient
safety planning should be the organization’s thorough review and protection of patient
privacy and protection against cybercrime. This should be something we share with
patients as we do our other safety efforts.
Given the fact that healthcare culture shifts occur only with the focused attention, I am
positing that the following should occur:
1. Align the healthcare provider with cybersecurity experts and innovators.
2. Perform all the actions suggested by the experts – including a comprehensive
assessment to determine your sensitive risk areas and your risk tolerance, create
policies that will protect your patients, train your staff, educate your employees,
etc.
3. Appoint a leader with only this responsibility who reports to the Chief Operating
Officer or the Chief Quality Officer. This will sound edgy to many organizations,
but in fact it is both a quality issue (consider hacking of medical devices), a safety
issue (consider shut down of medical record system) and finally an operational
issue (consider the most important factor in protecting patients by changing their
approaches to technology and information).
4. Develop a routine tabletop exercise with clinicians and others to not only outline
what should be done but to educate those folks. If drills are being done by IT, this
will not change the culture, nor does it involve the actual people who will be
involved when a breach occurs.
5. Routinely test downtime procedures for the potential of medical information not
being available (certainly a drill where the staff is unknowingly unable to access
medical information can be dangerous but creates an amazing learning
GreyCastle Security intel@greycastlesecurity.com Page | 6
(800) 403-8350
environment). I would recommend this be done with actual fake patients who
perhaps suffer from a machine malfunctioning due to a cyberattack.
6. Implement a corrective action plan (CAP) from each tabletop exercise and training
sessions to be taken to enhance the process. Assume your CAP is dynamic and
organic in its development. Ensure you have the following categories in the CAP:
a. Culture shifts required by department
b. Employee education needs
c. Insurance coverage assessment
d. Safety rounds question additions
e. Cybersecurity Council actions needed
f. Policy enhancements
g. Vendor risk assessments
h. Added assessments to be done
i. New education opportunities by department and job classification
7. Create a sense of urgency that cybersecurity is everyone’s job every day.
8. Establish a cybersecurity reporting system where employees (much like patient
incident reports) can report situations where they can see a problem exists.
9. Have secret shoppers try to access information they should not or even to try and
hack into a system. This is known as a penetration test.
10. Do walk arounds and test how many times you gain access to health information
and access you should not have as a leader.
11. Develop “town halls” where employees can hear recent “near misses” (a common
approach with safety programs which will move them to change their own
practices).
In establishing these types of actions, cybersecurity slowly, but surely, becomes
something each person in a healthcare environment thinks about as they are working.
This state is the place your organization should be. The place where someone in
healthcare doing their work, recognizes a cybersecurity risk/vulnerability/threat and
either corrects it and/or brings awareness. Only in this way can healthcare indeed make it
safer for patients who entrust us with their information and their lives.
Recently, the articles I have been reading are focused on medical device hacking with the
expansion of the Internet of Things (IoT). Even though the reality of this possibility is
frightening, it has not yet happened and, although this would be the time to plan and
prepare, healthcare is encumbered by so many other priorities that it has not made its
way into the consciousness. Here is where a real-life drill would be key – to point out the
GreyCastle Security intel@greycastlesecurity.com Page | 7
(800) 403-8350
possibility but also to engage the clinicians in what they should do next. Remember,
clinicians and employees at all levels in healthcare are trained for emergencies, fires,
infection, code blues – they understand this is a reality. Building on this reality for
cybersecurity issues is key. Currently, healthcare workers, without a doubt, view this as
“someone else’s” job and not theirs, much like safety was viewed before the Institute of
Medicine (IOM) report came out. This is the 21st century’s largest safety issue, whether
healthcare employees see it or not.
4. Conclusion
This is not your grandfather’s white paper, I am suggesting that healthcare executives are
not paying full attention nor putting their attention in the right places. Instead, they may
be “hoping” that the Chief Information Officer (CIO) is handling this issue. However, hope
cannot be the strategy here. We are missing an opportunity to ensure that we are ahead
of this curve like every other curve we have had to be ahead of. Cybersecurity is not an IT
issue – it is an operational issue focused on patient safety. It is a safety hazard requiring
full attention and innovative solutions. You cannot do this alone – you must have expert
help from firms who specialize in creating and deploying a tailored cybersecurity program
development for your organization. There are not many out there, I consult for one.
So, for those of you in healthcare who, like me, read the last page only and look for a
summary and a few takeaway points:
1. Partner with a cybersecurity firm who has an innovative approach to the
complicated problem.
2. Appoint one person whose only job is to do this (not part of their regular job). I
would recommend it not be an IT person. They must have expert help from an
outside company (like risk management has from a legal firm). They can get IT
help inside. They should report to the COO or Chief Quality Officer.
3. Create educational teaching moments by telling real-life stories of patients being
compromised. Require all employees to attend – do not tell them IT stories, tell
them patient stories. Include a “what if” about technology hacking – make them
feel it in their gut.
GreyCastle Security intel@greycastlesecurity.com Page | 8
(800) 403-8350
4. Do routine tabletop exercises with a specific action plan which includes all
components mentioned above (otherwise you are not looking at it holistically or
from a safety perspective).
5. Perform a penetration test with your expert firm and see what they can find then
show these at events mentioned in number 3 above.
6. Have a Cybersecurity Council (just like a safety council populated with similar
people). Include clinicians, nurses and the Chief Operating Officer in that council.
7. Ensure executives have a full understanding of the risks (not a cybersecurity
education). That ensures they understand the risks of reputation, or patient
endangerment in real time, of how their inaction can be viewed as the potential
abandonment of known issues, etc.
8. Bring it to the board – ensure the board knows the risks (not from the IT
perspective) but from the perspective of patient safety and reputation. Either
include it part of the Board Performance Improvement Council or part of the
President’s report.
9. Know the risks in your organization and examine them closely – use an outside
firm to tell you the issues – as we all know internal folks may, appropriately not
have the clear eye to see all the risks.
In summary, I am challenging healthcare leaders to take a different approach than most
other articles suggest. I am suggesting you leave the IT solutions to IT but your approach
is one of organizational risk, organization operations and organizational safety – all things
healthcare executives are responsible to think about. Healthcare executives continuously
rise to the challenges of complex solutions, this is no different.
5. About Dr. Bertine Colombo McKenna
Dr. Bertine Colombo McKenna, FACHE, has worked in healthcare
for over thirty years, most recently as the Executive Vice President
and Chief Operating Officer for the Bassett Healthcare Network.
Dr. McKenna is currently a consultant in Healthcare Issues.
Dr. McKenna has her bachelors, MBA and Ph.D. and is also a
Fellow in the American College of Healthcare Executives. At
GreyCastle Security intel@greycastlesecurity.com Page | 9
(800) 403-8350
Bassett, she was responsible for the day-to-day operations and programmatic
performance of the over $700 million organization. Dr. McKenna was the COO for the
entire system which encompassed a 700-employed practitioner Medical Group, five
hospitals, 35 clinical outpatient centers, three ambulatory surgery centers, two long term
care facilities, a DME company and Home Care Company. In this role Dr. McKenna was a
Corporate officer and was responsible for Board relationships, compliance, quality/safety,
hospital and medical group operations, budget, integration strategies, strategic planning
and much more.
Her expertise covers the healthcare landscape from physician relations, safety quality and
service, regulatory and compliance and healthcare operations of all levels – hospital,
physicians practice, long term care and managed care.

Weitere ähnliche Inhalte

Was ist angesagt?

1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Morakinyo Animasaun
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uaeRishalHalid1
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsJim Kaplan CIA CFE
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat SimulationTonex
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber securityyatendrakumar47
 

Was ist angesagt? (20)

1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
 
Cyber Threat Simulation
Cyber Threat SimulationCyber Threat Simulation
Cyber Threat Simulation
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 

Ähnlich wie Whitepaper next generation_patient_safety_bertine_mc_kenna.01

Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Sungard Availability Services
 
Mustafa Degerli - 2016 - Answers for MI 502 – Introduction to Medical Informa...
Mustafa Degerli - 2016 - Answers for MI 502 – Introduction to Medical Informa...Mustafa Degerli - 2016 - Answers for MI 502 – Introduction to Medical Informa...
Mustafa Degerli - 2016 - Answers for MI 502 – Introduction to Medical Informa...Dr. Mustafa Değerli
 
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxMake sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxendawalling
 
Healthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxHealthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxwrite4
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
Computer Information Systems and the Electronic Health Record
Computer Information Systems and the Electronic Health RecordComputer Information Systems and the Electronic Health Record
Computer Information Systems and the Electronic Health RecordRebotto89
 
vmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepapervmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepaperTony Amaddio
 
A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare SecurityAngel Villar Garea
 
Secure Cloud Based Centralized Health Improvement through homomorphism Encryp...
Secure Cloud Based Centralized Health Improvement through homomorphism Encryp...Secure Cloud Based Centralized Health Improvement through homomorphism Encryp...
Secure Cloud Based Centralized Health Improvement through homomorphism Encryp...IRJET Journal
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityKym Canty
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.comjonhson199
 
List Of Figures And Functions Requirements
List Of Figures And Functions RequirementsList Of Figures And Functions Requirements
List Of Figures And Functions RequirementsLeslie Lee
 
Ethical & Legal Issues of AI in Medicine (March 7, 2019)
Ethical & Legal Issues of AI in Medicine (March 7, 2019)Ethical & Legal Issues of AI in Medicine (March 7, 2019)
Ethical & Legal Issues of AI in Medicine (March 7, 2019)Nawanan Theera-Ampornpunt
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comjonhson198
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxTOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxturveycharlyn
 

Ähnlich wie Whitepaper next generation_patient_safety_bertine_mc_kenna.01 (20)

Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT
 
Mustafa Degerli - 2016 - Answers for MI 502 – Introduction to Medical Informa...
Mustafa Degerli - 2016 - Answers for MI 502 – Introduction to Medical Informa...Mustafa Degerli - 2016 - Answers for MI 502 – Introduction to Medical Informa...
Mustafa Degerli - 2016 - Answers for MI 502 – Introduction to Medical Informa...
 
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxMake sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
 
Healthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxHealthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docx
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Computer Information Systems and the Electronic Health Record
Computer Information Systems and the Electronic Health RecordComputer Information Systems and the Electronic Health Record
Computer Information Systems and the Electronic Health Record
 
vmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepapervmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepaper
 
A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare Security
 
Towards predictive medicine
Towards predictive medicineTowards predictive medicine
Towards predictive medicine
 
arcsight_scmag_hcspecial
arcsight_scmag_hcspecialarcsight_scmag_hcspecial
arcsight_scmag_hcspecial
 
Secure Cloud Based Centralized Health Improvement through homomorphism Encryp...
Secure Cloud Based Centralized Health Improvement through homomorphism Encryp...Secure Cloud Based Centralized Health Improvement through homomorphism Encryp...
Secure Cloud Based Centralized Health Improvement through homomorphism Encryp...
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
List Of Figures And Functions Requirements
List Of Figures And Functions RequirementsList Of Figures And Functions Requirements
List Of Figures And Functions Requirements
 
Ethical & Legal Issues of AI in Medicine (March 7, 2019)
Ethical & Legal Issues of AI in Medicine (March 7, 2019)Ethical & Legal Issues of AI in Medicine (March 7, 2019)
Ethical & Legal Issues of AI in Medicine (March 7, 2019)
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxTOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
 

Mehr von Ronan Martin

UC2020 Digital Program
UC2020 Digital ProgramUC2020 Digital Program
UC2020 Digital ProgramRonan Martin
 
AWARDS U 2019 - Virtual Conference Program
AWARDS U 2019 - Virtual Conference ProgramAWARDS U 2019 - Virtual Conference Program
AWARDS U 2019 - Virtual Conference ProgramRonan Martin
 
EHR Association - Recommended Ideal Dataset for PDMP Inquiry
EHR Association - Recommended Ideal Dataset for PDMP InquiryEHR Association - Recommended Ideal Dataset for PDMP Inquiry
EHR Association - Recommended Ideal Dataset for PDMP InquiryRonan Martin
 
The I/DD Movement & Foothold Technology
The I/DD Movement & Foothold TechnologyThe I/DD Movement & Foothold Technology
The I/DD Movement & Foothold TechnologyRonan Martin
 
Medicaid & Housing Services - CSH
Medicaid & Housing Services - CSHMedicaid & Housing Services - CSH
Medicaid & Housing Services - CSHRonan Martin
 
Medicaid: What You Need to Know (CSH and Foothold)
Medicaid: What You Need to Know (CSH and Foothold)Medicaid: What You Need to Know (CSH and Foothold)
Medicaid: What You Need to Know (CSH and Foothold)Ronan Martin
 
Case study bio medical research_o365 deployment
Case study bio medical research_o365 deploymentCase study bio medical research_o365 deployment
Case study bio medical research_o365 deploymentRonan Martin
 
For Media Lovers - FML.ie - M.Sc. Multimedia Practicum
For Media Lovers - FML.ie - M.Sc. Multimedia PracticumFor Media Lovers - FML.ie - M.Sc. Multimedia Practicum
For Media Lovers - FML.ie - M.Sc. Multimedia PracticumRonan Martin
 
Case Study Sync IT
Case Study Sync ITCase Study Sync IT
Case Study Sync ITRonan Martin
 
Lean On Me: Student Life
Lean On Me: Student LifeLean On Me: Student Life
Lean On Me: Student LifeRonan Martin
 
Keyzy Business Plan
Keyzy Business PlanKeyzy Business Plan
Keyzy Business PlanRonan Martin
 
Hackett's bookmakers brand renewal and media camapign
Hackett's bookmakers   brand renewal and media camapignHackett's bookmakers   brand renewal and media camapign
Hackett's bookmakers brand renewal and media camapignRonan Martin
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 

Mehr von Ronan Martin (15)

UC2020 Digital Program
UC2020 Digital ProgramUC2020 Digital Program
UC2020 Digital Program
 
AWARDS U 2019 - Virtual Conference Program
AWARDS U 2019 - Virtual Conference ProgramAWARDS U 2019 - Virtual Conference Program
AWARDS U 2019 - Virtual Conference Program
 
EHR Association - Recommended Ideal Dataset for PDMP Inquiry
EHR Association - Recommended Ideal Dataset for PDMP InquiryEHR Association - Recommended Ideal Dataset for PDMP Inquiry
EHR Association - Recommended Ideal Dataset for PDMP Inquiry
 
The I/DD Movement & Foothold Technology
The I/DD Movement & Foothold TechnologyThe I/DD Movement & Foothold Technology
The I/DD Movement & Foothold Technology
 
Medicaid & Housing Services - CSH
Medicaid & Housing Services - CSHMedicaid & Housing Services - CSH
Medicaid & Housing Services - CSH
 
Medicaid: What You Need to Know (CSH and Foothold)
Medicaid: What You Need to Know (CSH and Foothold)Medicaid: What You Need to Know (CSH and Foothold)
Medicaid: What You Need to Know (CSH and Foothold)
 
Sales slide deck
Sales slide deckSales slide deck
Sales slide deck
 
Case study bio medical research_o365 deployment
Case study bio medical research_o365 deploymentCase study bio medical research_o365 deployment
Case study bio medical research_o365 deployment
 
For Media Lovers - FML.ie - M.Sc. Multimedia Practicum
For Media Lovers - FML.ie - M.Sc. Multimedia PracticumFor Media Lovers - FML.ie - M.Sc. Multimedia Practicum
For Media Lovers - FML.ie - M.Sc. Multimedia Practicum
 
Case Study Sync IT
Case Study Sync ITCase Study Sync IT
Case Study Sync IT
 
Lean On Me: Student Life
Lean On Me: Student LifeLean On Me: Student Life
Lean On Me: Student Life
 
Keyzy Business Plan
Keyzy Business PlanKeyzy Business Plan
Keyzy Business Plan
 
Hackett's bookmakers brand renewal and media camapign
Hackett's bookmakers   brand renewal and media camapignHackett's bookmakers   brand renewal and media camapign
Hackett's bookmakers brand renewal and media camapign
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Sales Slide Deck
Sales Slide DeckSales Slide Deck
Sales Slide Deck
 

Kürzlich hochgeladen

Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Sheetaleventcompany
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapurgragmanisha42
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availablegragmanisha42
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...chandigarhentertainm
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591adityaroy0215
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhSheetaleventcompany
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...Ahmedabad Call Girls
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 

Kürzlich hochgeladen (20)

9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa9316020077📞Goa  Call Girls  Numbers, Call Girls  Whatsapp Numbers Goa
9316020077📞Goa Call Girls Numbers, Call Girls Whatsapp Numbers Goa
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 

Whitepaper next generation_patient_safety_bertine_mc_kenna.01

  • 2. GreyCastle Security intel@greycastlesecurity.com Page | 2 (800) 403-8350 1. The New Era of Cybercrime..........................................................................................................3 2. Healthcare’s Problem with Patient Safety ...................................................................................3 3. The New Approach to Patient Safety...........................................................................................4 4. Conclusion .....................................................................................................................................7 5. About Dr. Bertine Colombo McKenna..........................................................................................8
  • 3. GreyCastle Security intel@greycastlesecurity.com Page | 3 (800) 403-8350 1. The New Era of Cybercrime Healthcare has had many cyberattacks in the last year. Making this a top safety issue in a healthcare organization is challenging – a challenge that executives must make a top priority. The 2018 Environmental Scan, released by the American Healthcare Association, was a reminder of the complicated business that healthcare represents. When developing new innovative programs to serve our patients and competing in an ever- complicated environment, we don’t often stop for a minute and ask “are we protecting our patients’ privacy thoroughly?” Unlike any other business, healthcare leaders go to work every day with the knowledge that they have the ability to protect and enhance lives and unintentionally hurt them as well. This white paper is directed at the fundamentals that must be undertaken in the healthcare environment to protect the organization and its patients from cybercrime. 2. Healthcare’s Challenge with this Patient Safety Issue For the first time in history, cybersecurity has become a life or death issue. No healthcare organization is immune to today’s threat landscape. According to a recent study done by the Ponemon Institute, data breaches have cost healthcare organizations $6.2 billion with the average electronic health record (EHR) costing $355. In the high paced world of healthcare where every day represents a new modality, a new technology, a new system of care, a new political worry, we have to make sure that we are protecting patient privacy. Imagine, if you will, a situation where a healthcare organization is developing its population health plan. In the thousands of steps necessary, is cybersecurity part of the planning? As we plan to ensure that information is shared for coordination of care, are we stopping to say, “can we protect their identity?” In population health efforts, are we asking partners if they are taking proactive cybersecurity measures? When the latest innovative monitoring system becomes available, are we asking if the manufacturer has built-in protection from cyberattacks before we buy it? In developing telemedicine programs, are we asking question about privacy and cybersecurity as we develop these programs? In the latest news article about Amazon, JP Morgan and Berkshire Hathaway’s announcement about developing
  • 4. GreyCastle Security intel@greycastlesecurity.com Page | 4 (800) 403-8350 healthcare programs causes me to wonder, how this will impact privacy and cybersecurity? Renewed focus on Telemedicine programs should be coupled with a full assessment of how patient privacy can be protected Recall, when patient safety began to be part of our conversation, years ago, it became part of how we developed new programs, ensuring potential safety hazards were evaluated and mitigated preprogram startup. When quality became a key component of healthcare program planning, we built in quality measures by which to evaluate the program and held them as important as financial measurements. Are we doing this in the new era of cybercrime? Envision the benefits and opportunities this problem creates. Not only can your organization be the leader in this space, you can achieve immediate financial savings by implementing proactive cybersecurity measures, comply with various regulations such as the Health Insurance Portability and Accountability Act (HIPAA), establish a competitive advantage by becoming the preferred healthcare solutions provider, but also ensure the protection of your patients’ safety and well-being. 3. The New Approach to Patient Safety How do we begin to protect our patients as we develop new ideas, programs, systems of care, and digital solutions? Most articles and white papers on this topic are focused on the information technology and assessment solutions that are currently thought to be the best practice. However, as a former healthcare executive and a current consultant, I am struck by the fact that this needs to be approached in a very different way. As I study the solutions that many organizations are using, it focuses on how the current information system can be strengthened with information technology and the ways in which one can assess their systems. I do not have an information technology (IT) background, as I am a former healthcare executive who served as Chief Operating Officer (COO), and therefore, this whitepaper is not focused on IT solutions, antivirus or firewalls. It is directed at specifically what
  • 5. GreyCastle Security intel@greycastlesecurity.com Page | 5 (800) 403-8350 healthcare organizations’ leadership team should be doing right away from an insider’s view. Too many times I have read about solutions from those who have not had the opportunity to be inside a complex whirling healthcare organization to know where to focus cybersecurity efforts for the betterment of safety and patient care, I bring that perspective. It is my view that a very different approach should be taken. I would suggest the following hypothesis: Every day, healthcare organizations accept responsibility for patients who entrust their lives and information to us. In a very organic way, we accept it and “bubble wrap” that responsibility with numerous approaches to safety. Part of the paradigm shift in patient safety planning should be the organization’s thorough review and protection of patient privacy and protection against cybercrime. This should be something we share with patients as we do our other safety efforts. Given the fact that healthcare culture shifts occur only with the focused attention, I am positing that the following should occur: 1. Align the healthcare provider with cybersecurity experts and innovators. 2. Perform all the actions suggested by the experts – including a comprehensive assessment to determine your sensitive risk areas and your risk tolerance, create policies that will protect your patients, train your staff, educate your employees, etc. 3. Appoint a leader with only this responsibility who reports to the Chief Operating Officer or the Chief Quality Officer. This will sound edgy to many organizations, but in fact it is both a quality issue (consider hacking of medical devices), a safety issue (consider shut down of medical record system) and finally an operational issue (consider the most important factor in protecting patients by changing their approaches to technology and information). 4. Develop a routine tabletop exercise with clinicians and others to not only outline what should be done but to educate those folks. If drills are being done by IT, this will not change the culture, nor does it involve the actual people who will be involved when a breach occurs. 5. Routinely test downtime procedures for the potential of medical information not being available (certainly a drill where the staff is unknowingly unable to access medical information can be dangerous but creates an amazing learning
  • 6. GreyCastle Security intel@greycastlesecurity.com Page | 6 (800) 403-8350 environment). I would recommend this be done with actual fake patients who perhaps suffer from a machine malfunctioning due to a cyberattack. 6. Implement a corrective action plan (CAP) from each tabletop exercise and training sessions to be taken to enhance the process. Assume your CAP is dynamic and organic in its development. Ensure you have the following categories in the CAP: a. Culture shifts required by department b. Employee education needs c. Insurance coverage assessment d. Safety rounds question additions e. Cybersecurity Council actions needed f. Policy enhancements g. Vendor risk assessments h. Added assessments to be done i. New education opportunities by department and job classification 7. Create a sense of urgency that cybersecurity is everyone’s job every day. 8. Establish a cybersecurity reporting system where employees (much like patient incident reports) can report situations where they can see a problem exists. 9. Have secret shoppers try to access information they should not or even to try and hack into a system. This is known as a penetration test. 10. Do walk arounds and test how many times you gain access to health information and access you should not have as a leader. 11. Develop “town halls” where employees can hear recent “near misses” (a common approach with safety programs which will move them to change their own practices). In establishing these types of actions, cybersecurity slowly, but surely, becomes something each person in a healthcare environment thinks about as they are working. This state is the place your organization should be. The place where someone in healthcare doing their work, recognizes a cybersecurity risk/vulnerability/threat and either corrects it and/or brings awareness. Only in this way can healthcare indeed make it safer for patients who entrust us with their information and their lives. Recently, the articles I have been reading are focused on medical device hacking with the expansion of the Internet of Things (IoT). Even though the reality of this possibility is frightening, it has not yet happened and, although this would be the time to plan and prepare, healthcare is encumbered by so many other priorities that it has not made its way into the consciousness. Here is where a real-life drill would be key – to point out the
  • 7. GreyCastle Security intel@greycastlesecurity.com Page | 7 (800) 403-8350 possibility but also to engage the clinicians in what they should do next. Remember, clinicians and employees at all levels in healthcare are trained for emergencies, fires, infection, code blues – they understand this is a reality. Building on this reality for cybersecurity issues is key. Currently, healthcare workers, without a doubt, view this as “someone else’s” job and not theirs, much like safety was viewed before the Institute of Medicine (IOM) report came out. This is the 21st century’s largest safety issue, whether healthcare employees see it or not. 4. Conclusion This is not your grandfather’s white paper, I am suggesting that healthcare executives are not paying full attention nor putting their attention in the right places. Instead, they may be “hoping” that the Chief Information Officer (CIO) is handling this issue. However, hope cannot be the strategy here. We are missing an opportunity to ensure that we are ahead of this curve like every other curve we have had to be ahead of. Cybersecurity is not an IT issue – it is an operational issue focused on patient safety. It is a safety hazard requiring full attention and innovative solutions. You cannot do this alone – you must have expert help from firms who specialize in creating and deploying a tailored cybersecurity program development for your organization. There are not many out there, I consult for one. So, for those of you in healthcare who, like me, read the last page only and look for a summary and a few takeaway points: 1. Partner with a cybersecurity firm who has an innovative approach to the complicated problem. 2. Appoint one person whose only job is to do this (not part of their regular job). I would recommend it not be an IT person. They must have expert help from an outside company (like risk management has from a legal firm). They can get IT help inside. They should report to the COO or Chief Quality Officer. 3. Create educational teaching moments by telling real-life stories of patients being compromised. Require all employees to attend – do not tell them IT stories, tell them patient stories. Include a “what if” about technology hacking – make them feel it in their gut.
  • 8. GreyCastle Security intel@greycastlesecurity.com Page | 8 (800) 403-8350 4. Do routine tabletop exercises with a specific action plan which includes all components mentioned above (otherwise you are not looking at it holistically or from a safety perspective). 5. Perform a penetration test with your expert firm and see what they can find then show these at events mentioned in number 3 above. 6. Have a Cybersecurity Council (just like a safety council populated with similar people). Include clinicians, nurses and the Chief Operating Officer in that council. 7. Ensure executives have a full understanding of the risks (not a cybersecurity education). That ensures they understand the risks of reputation, or patient endangerment in real time, of how their inaction can be viewed as the potential abandonment of known issues, etc. 8. Bring it to the board – ensure the board knows the risks (not from the IT perspective) but from the perspective of patient safety and reputation. Either include it part of the Board Performance Improvement Council or part of the President’s report. 9. Know the risks in your organization and examine them closely – use an outside firm to tell you the issues – as we all know internal folks may, appropriately not have the clear eye to see all the risks. In summary, I am challenging healthcare leaders to take a different approach than most other articles suggest. I am suggesting you leave the IT solutions to IT but your approach is one of organizational risk, organization operations and organizational safety – all things healthcare executives are responsible to think about. Healthcare executives continuously rise to the challenges of complex solutions, this is no different. 5. About Dr. Bertine Colombo McKenna Dr. Bertine Colombo McKenna, FACHE, has worked in healthcare for over thirty years, most recently as the Executive Vice President and Chief Operating Officer for the Bassett Healthcare Network. Dr. McKenna is currently a consultant in Healthcare Issues. Dr. McKenna has her bachelors, MBA and Ph.D. and is also a Fellow in the American College of Healthcare Executives. At
  • 9. GreyCastle Security intel@greycastlesecurity.com Page | 9 (800) 403-8350 Bassett, she was responsible for the day-to-day operations and programmatic performance of the over $700 million organization. Dr. McKenna was the COO for the entire system which encompassed a 700-employed practitioner Medical Group, five hospitals, 35 clinical outpatient centers, three ambulatory surgery centers, two long term care facilities, a DME company and Home Care Company. In this role Dr. McKenna was a Corporate officer and was responsible for Board relationships, compliance, quality/safety, hospital and medical group operations, budget, integration strategies, strategic planning and much more. Her expertise covers the healthcare landscape from physician relations, safety quality and service, regulatory and compliance and healthcare operations of all levels – hospital, physicians practice, long term care and managed care.