At HIMSS, Mac McMillan, CEO of CynergisTek, speaks about a few ways companies and health systems can protect patient data.
While many companies at HIMSS 2019 are speaking about digital health solutions and putting health data into the hands of patients, one thing is still very clear: we have to make sure the data are protected.
That’s where companies like CynergisTek come into play.
>> READ: Securing the Internet of Medical Things
It’s no secret that as the health-tech space continues to evolve, so do cybercrimes. Health systems, hospitals and companies that are using digital platforms to extract patient data are always at risk.
And Mac McMillan, CEO of CynergisTek, a cybersecurity consulting company, took some time to talk about cybersecurity best practices that companies should be implementing.
For one, McMillan told Healthcare Analytics News ™ that the most important thing a company can do is make sure it recognizes cybersecurity as a priority. Health executives and CEOs need to be communicating with their employees about the importance of protecting data and about tips to be more careful during the exchange of data.
It is also important for companies to use a third-party cybersecurity vendor and to develop a strong cybersecurity program based on credible standards. Companies can also use high-grade technology that can detect suspicious activity. The technology, along with conducting annual risk assessments can be critical.
When it comes to sensitive patient data, it is crucial to make sure that these practices are followed in order to build trust and keep the data safe.
Get the best insights in healthcare analytics directly to your inbox.
Related
Defending Your Data from the Dark Overlord
Cybersecurity Precautions Protect Patient Data and Care Delivery
November 9th 2021On this week's episode of Data Book, Jesse Fasolo, director of technology, infrastructure, and cybersecurity at St. Joseph’s Health, discusses cybersecurity for hospitals and health systems, the biggest threats and points of vulnerability, how attackers are evolving, how to respond when there is a breach and more.