Physicians Practice April 18, 2024
Patricia A. Markus, JD, Brad C. Moody, JD

With such a broad range of potential security weaknesses, organizations must take a layered approach to IT security.

In today’s connected world, the extent of threats to a healthcare organization’s information technology systems can be vast, ranging from latent vulnerabilities in software to user error. With such a broad range of potential security weaknesses, organizations must take a layered approach to IT security because there is no single, bulletproof method to protect IT systems and the data stored on them. Instead, the best practice is to use your HIPAA security risk assessment process to identify and implement security measures that fit the size and scope of your organization. Below, we outline some leading practices for building effective IT security defenses.

...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Health IT, Provider, Technology
The modern CISO: Scapegoat or value creator?
Why It’s Time to Go on the Offensive with Healthcare Cybersecurity
7 health systems hit by cybersecurity incidents in May
The role of cybersecurity in AI system development
How Change Healthcare hack affected a hospital's financials

Share This Article