From FDA (Food and Drug Administration) to FBI (Federal bureau of Investigations), they see a core issue bubbling up: The vulnerability of Healthcare systems to cyber-attacks. Both agencies have issued an advisory in this regard in the last 1 year.
Source: DataLossDB.org -- Healthcare amounts to 17% of incidents in 2013
FDA Advisory was focused on medical devices and hospital networks, while the FBI’s communication is focused on hackers attempting to hack personal medical records and health insurance data and even goes to calling out the gaps in resiliency to cyber-attacks as compared with other sectors such as financial and retail sectors.
In addition, looking at statistics from datalossdb.org, Health Care sector has consistently been in the top 3 sectors that have had the most incidents.
But the question is, why now?
This is where the correlation with the Health Care IT transition time lines adds up. It’s the other side of Health Care IT transitions that we looked at in the previous part (At the security cross roads of Healthcare reforms and IoE – 6 Health Care IT Transitions) of this blog series – the threat that have emerged from open anywhere, anytime, any device access which has enabled convenience and transformational experience to patients and care teams.
Let’s see an example of the changing dynamics of some of these transitions from a Hackers perspective by analyzing one of these transitions: Transition from Paper charts to EMR and enabling anywhere anytime, any device access to my care teams and my patients.
Health Care IT Transitions and their Security Implications (1-3 of 6)
Read More »
Tags: Cisco Healthcare, Cisco Security, CiscoCloud, e-health, healthcare reform, Internet of Everything, mobile healthcare
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists, hosted by Cisco’s Amy Lewis (@CommsNinja). This week Chris Young, SVP Security Business Group Cisco, and Bill Carter, Senior Network Engineer and Cisco Champion, talk about Intelligent Cyber Security for the real world.
Listen to the Podcast
Cisco Subject Matter Expert: Chris Young, SVP Security Business Group Cisco (@YoungDChris)
Cisco Champion: Bill Carter, Senior Network Engineer (@billyc5022)
How Cisco deals with fragmentation in Security market
Attack-driven model for Security, before, during and after
How Sourcefire acquisition fits in with Cisco Security
Open Source Security around Snort Community Read More »
Tags: #ciscochampion, Chris Young, Cisco Security, Snort, Sourcefire
The saying ‘Tell me how you will measure me and I will tell you how I will behave’ could have been the perfect tag line for the US Health Care Reforms. When we look at how Health Care Information technology is getting used to enable reforms, we see that most of the technologies existed prior to the reforms, but there wasn’t a compelling reason to adopt it. Once the measurement criteria, the carrots and the sticks were defined, the behaviors changed, and to achieve the metrics, the technology adoption picked up. As an example, according to CDC’s report, the adoption of office based physicians with EHR systems has increased to 78.4% in 2013 from 17.3% in 2003.
Percentage of office based physicians with EHR systems in US
Maybe a coincidence, but the Health Care reforms and Health Care Internet of Everything (IoE) are very much intertwined. The Health Care reforms focus on the ‘why’ and ‘what’ changes are needed to enable outcomes and define how performance is measured. The Health Care Internet of Everything focuses on how technology can be leveraged to enable the goals of Health Care Reforms. By connecting the unconnected, IoE brings more information from multiple sources (things and people) to create an enhanced evidence based model to enable better outcomes.
From an IT perspective, Health Care Reforms requires breaking boundaries, opening up the access, enabling choices, improving data collection from multiple critical sources, and enabling information sharing. It is definitely a challenge to achieve these needs using the traditional approaches in Health Care. Hence Health Care approaches have evolved to leverage Health care IT as a change agent, thereby resulting in many new Health Care IT transitions.
Let us explore six key Health Care IT transitions that have significant security implications.
Read More »
Tags: Cisco Healthcare, Cisco Security, cloud, healthcare reform, InternetofEverything, sensors
Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author Darryl Wilson, Director, Enterprise Mobility for Dimension Data Americas, as the first in this series – Darryl will address how a balanced approach to security can yield better business results.
By Guest Contributor Darryl Wilson
Director, Enterprise Mobility for Dimension Data Americas
Darryl Wilson has more than 15 years of experience overseeing large scale network communications projects both from a technical delivery and pre-sales perspective. Wilson’s areas of expertise include unified communications, network performance, troubleshooting and optimization.
The evolution to a mobile-centric workforce has been relatively short, thanks to an explosion of innovation and emerging mobile and cloud technologies. Just a few years ago, BYOD was a hot topic of conversation and mobile device management (MDM) solutions offered a simple way to secure an influx of devices and users.
However, today we are seeing that the tactical implementation of MDM solutions is not enough to control a multi-device, multi-vendor, and multi-OS mobility landscape. In fact, most of the companies I work with are using solutions that have not been optimized or customized for today’s ever-changing mobile world. In addition, security concerns have left many organizations feeling like they need to choose between control and truly reaping the business value mobility offers.
For example, in a recent Dimension Data Secure Mobility Survey Report, 79% say mobility is a top priority for their organization. However, the report indicates that a much smaller segment of those IT leaders’ actions back it up. Seventy-seven percent of those surveyed believe data is the greatest concern pertaining to mobility, yet only 55% have a mobility roadmap in place. If securing company data and successfully implementing a mobile policy is of such importance, why aren’t more IT leaders taking strategic action?
Read More »
Tags: Cisco, Cisco Partners, Cisco Security, dimension data, mobile security, mobility, security
Despite the many benefits of IoT, the billions of connected sensors, devices, and other smart objects it comprises will also dramatically increase the diversity of threats we will face. As a result, ensuring that we can reap the overwhelming benefits of IoT without undermining security will take strong leadership and a great deal of teamwork throughout the industry. That’s why I’m proud that Chris Young, Senior Vice President, Cisco Security Group, recently made the list as one of the top 100 thought leaders for IoT!
Read the full blog post to learn more.
Tags: Cisco, Cisco Security, cybersecurity, Internet of Everything, internet of things, IoE, IoT, IoT Security, network security, security