If health IT and security leaders aren’t willing to take an honest look at why cybersecurity attacks work, we’re never going to be able to prevent them, says Mitch Parker, who examines the growing problem in this two-part series.
It’s time to stop overlooking the cybersecurity risks that exist within the supply chain and provide guidance on how to deal with them, says Greg Garcia, who talks about a new toolkit aimed at small-to-medium sized organizations.
Implementing a system that can accurately identify patients isn’t as simple as adding a field to an EMR system. But it is going to require “a mobilization and educational effort similar to the one that made EMR usage pervasive,” says Mitch Parker.
As healthcare enters “the digital revolution,” perhaps the greatest challenge for leaders is balancing the need for data access with the need for security, says Pamela McNutt, CIO at Methodist Health System.
Should patients be able to access and share their medical records? Of course. But are patients willing to read all the fine print, and qualified to properly vet third parties? That, says Chuck Christian, is the big question.