Health IT tip of the day: Monitor your inner data flow so it doesn't flow out

Track who has access to your data — and how much of it — to mitigate cybersecurity risks.

Guy Baroan, president of Baroan Technologies in Elmwood Park, N.J.: Most hacking attacks happen from within, not from the outside. Be very afraid and lock your systems down. Protect the data, so you protect the business. Technology exists to limit what can be done to the data on your systems. Check how much access you are allowing your users and make sure it is just enough to get the job done. No more, no less. Track what happens to that data, who is accessing it and what are they doing with it. Be ready before something happens.

More articles on health IT:
Untangling the lingo: 10 most misused health IT terms
Best and worst states for physician EHR usage
Panel cites EHR 'challenges' as contributing to Ebola misdiagnosis at Texas hospital

© Copyright ASC COMMUNICATIONS 2021. Interested in LINKING to or REPRINTING this content? View our policies by clicking here.


Featured Whitepapers

Featured Webinars