How connecting disparate data sources opens the doors to hackers

siteadmin October 27, 2017

Connecting disparate information systems in healthcare can lead to cybersecurity weaknesses that can be exploited by hackers. Healthcare CIOs and CISOs can take steps to strengthen weak points between systems by maintaining accurate inventories, enabling visibility through audit trails, and updating acceptable use policies. It’s also important to ask new vendors about their risk assessments, security awareness training, and encryption policies. Healthcare organizations must prioritize security and privacy, and software vendors should provide open interfaces for third-party products to secure the entire environment.