Lysa Myers, security researcher at ESET (San Diego, Calif.): If attackers get any one piece of the puzzle, they should not be able to figure out the whole picture. For example, if user credentials are stolen through phishing or a lost/stolen device, there should be another factor of authentication in place so the attackers are stopped from logging in. If an attacker does manage to log in, there should be network segregation and limited privilege, so they cannot pivot into more sensitive databases or areas within an organization.
More articles on health IT:
Tracing the roots of major IT players: The meaning behind 5 company names
Beyond the financial ROI: Experts thoughts on EHR selection
1-in-3 health records will be compromised in 2016: 5 things to know
At the Becker's 11th Annual IT + Revenue Cycle Conference: The Future of AI & Digital Health, taking place September 14–17 in Chicago, healthcare executives and digital leaders from across the country will come together to explore how AI, interoperability, cybersecurity, and revenue cycle innovation are transforming care delivery, strengthening financial performance, and driving the next era of digital health. Apply for complimentary registration now.