Health IT tip of the day: Monitor your inner data flow so it doesn't flow out

Track who has access to your data — and how much of it — to mitigate cybersecurity risks.

Guy Baroan, president of Baroan Technologies in Elmwood Park, N.J.: Most hacking attacks happen from within, not from the outside. Be very afraid and lock your systems down. Protect the data, so you protect the business. Technology exists to limit what can be done to the data on your systems. Check how much access you are allowing your users and make sure it is just enough to get the job done. No more, no less. Track what happens to that data, who is accessing it and what are they doing with it. Be ready before something happens.

Copyright © 2024 Becker's Healthcare. All Rights Reserved. Privacy Policy. Cookie Policy. Linking and Reprinting Policy.

 

Featured Whitepapers

Featured Webinars

>