{"id":1865,"date":"2019-10-29T09:48:40","date_gmt":"2019-10-29T16:48:40","guid":{"rendered":"https:\/\/ascentblog.org\/?p=1865"},"modified":"2019-10-21T10:01:08","modified_gmt":"2019-10-21T17:01:08","slug":"top-healthcare-security-threats-in-2019-and-beyond","status":"publish","type":"post","link":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/","title":{"rendered":"Top Healthcare Security Threats in 2019 (and Beyond)"},"content":{"rendered":"\n

Data security is an ongoing concern for healthcare practices\ntasked with ensuring patient privacy. In 2019, some clear trends emerged,\nproviding healthcare organizations with a blueprint for where to focus their\nefforts in the coming years. <\/p>\n\n\n\n

A Secure Infrastructure is Key
<\/h2>\n\n\n\n
\"chain<\/figure><\/div>\n\n\n\n

The primary goal for healthcare organizations is to ensure their\ninformation communication technology (ICT) infrastructure is secure. This has\nbecome increasingly difficult with the widespread use of mobile devices such as\nsmartphones and tablets, which many healthcare professionals depend on for\ntheir jobs. Problems aren\u2019t confined to mobile devices; with an ever-growing\nnumber of connected devices, including medical equipment, there is a growing\nthreat of weak or improper security. <\/p>\n\n\n\n

Experts have identified five potential security threats that\nhealthcare organizations will face in the coming years. <\/p>\n\n\n\n

  • Cloud Security<\/strong>. With more confidential\ndata being moved to cloud-based storage, the risk of a breach increases. IT\nprofessionals must be diligent in monitoring traffic and data to and from the\ncloud\u2014a huge burden given the volume of information moving back and\nforth. <\/li>
  • Unsecured Mobile Devices<\/strong>. The ubiquitousness of\nmobile devices is both beneficial and problematic. It allows healthcare staff\nto perform their jobs more efficiently and accurately, but at the same time,\naccess to a variety of systems opens the door to potential security threats.\nExperts urge the adoption of additional authentication procedures, a trend\nalready evident in fingerprint and facial recognition software. <\/li>
  • Ransomware<\/strong>. Ransomware is malicious\nsoftware designed to prevent access to a computer system or data until a ransom\nis paid. Phishing schemes that trick people into connecting to private networks\nrepresent a major security threat for healthcare organizations. It\u2019s crucial to\ndetermine where weaknesses are and take steps to prevent malware attacks\nthrough improved scrutiny over traffic movement. <\/li>
  • IoT Exploits<\/strong>. IoT refers to the\nInternet of Things, the interconnection of computers, machines, objects and\npeople over the internet. Healthcare organizations welcome the ability to\neasily transfer large volumes of data over their network, but doing so opens\nthem up to potential security and privacy threats. Especially vulnerable are\nwearable and implantable devices such as smartwatches, insulin pumps and\npacemakers. With such a proliferation of devices throughout the industry,\ndeveloping security protocols could prove to be a logistical and technical\nnightmare. <\/li>
  • People<\/strong>. The human factor cannot\nbe overlooked. A lack of employee awareness and training on security policies\nopens the door to improper protection of patient data. Healthcare organizations\nmust make an effort to define security policies and share them with staff on a\nregular basis. <\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"

    Data security is an ongoing concern for healthcare practices tasked with ensuring patient privacy. In 2019, some clear trends emerged, providing healthcare organizations with a blueprint for where to focus their efforts in the coming years.  A Secure Infrastructure is Key The primary goal for healthcare organizations is to ensure their information communication technology (ICT)…<\/p>\n","protected":false},"author":3,"featured_media":1866,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"schema":"","placeID":"","no_match":false,"name":"","company":"","review":"","address":"","city":"","state":"","zip":"","lat":"","lng":"","phone1":"","phone2":"","fax":"","mon1":"","mon2":"","tue1":"","tue2":"","wed1":"","wed2":"","thu1":"","thu2":"","fri1":"","fri2":"","sat1":"","sat2":"","sun1":"","sun2":"","hours-note":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-1865","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitaltechnology"],"yoast_head":"\nTop Healthcare Security Threats in 2019 (and Beyond) | ASCENT: Administrator Support Community for ENT<\/title>\n<meta name=\"description\" content=\"ASCENT: Administrator Support Community for ENT | Data security is an ongoing concern for healthcare practices tasked with ensuring patient privacy. In 2019, some clear trends emerged, providing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Healthcare Security Threats in 2019 (and Beyond) | ASCENT: Administrator Support Community for ENT\" \/>\n<meta property=\"og:description\" content=\"ASCENT: Administrator Support Community for ENT | Data security is an ongoing concern for healthcare practices tasked with ensuring patient privacy. In 2019, some clear trends emerged, providing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/\" \/>\n<meta property=\"og:site_name\" content=\"ASCENT: Administrator Support Community for ENT\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-29T16:48:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-21T17:01:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/10\/security-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ascent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ascent\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Healthcare Security Threats in 2019 (and Beyond) | ASCENT: Administrator Support Community for ENT","description":"ASCENT: Administrator Support Community for ENT | Data security is an ongoing concern for healthcare practices tasked with ensuring patient privacy. In 2019, some clear trends emerged, providing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/","og_locale":"en_US","og_type":"article","og_title":"Top Healthcare Security Threats in 2019 (and Beyond) | ASCENT: Administrator Support Community for ENT","og_description":"ASCENT: Administrator Support Community for ENT | Data security is an ongoing concern for healthcare practices tasked with ensuring patient privacy. In 2019, some clear trends emerged, providing","og_url":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/","og_site_name":"ASCENT: Administrator Support Community for ENT","article_published_time":"2019-10-29T16:48:40+00:00","article_modified_time":"2019-10-21T17:01:08+00:00","og_image":[{"width":600,"height":900,"url":"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/10\/security-.jpg","type":"image\/jpeg"}],"author":"Ascent","twitter_misc":{"Written by":"Ascent","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/","url":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/","name":"Top Healthcare Security Threats in 2019 (and Beyond) | ASCENT: Administrator Support Community for ENT","isPartOf":{"@id":"https:\/\/ascentblog.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/#primaryimage"},"image":{"@id":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/#primaryimage"},"thumbnailUrl":"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/10\/security-.jpg","datePublished":"2019-10-29T16:48:40+00:00","dateModified":"2019-10-21T17:01:08+00:00","author":{"@id":"https:\/\/ascentblog.org\/#\/schema\/person\/a48fa1aa41da1c29cc94d21d838e548c"},"description":"ASCENT: Administrator Support Community for ENT | Data security is an ongoing concern for healthcare practices tasked with ensuring patient privacy. In 2019, some clear trends emerged, providing","breadcrumb":{"@id":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/#primaryimage","url":"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/10\/security-.jpg","contentUrl":"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/10\/security-.jpg","width":600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/ascentblog.org\/top-healthcare-security-threats-in-2019-and-beyond\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ascentblog.org\/"},{"@type":"ListItem","position":2,"name":"Top Healthcare Security Threats in 2019 (and Beyond)"}]},{"@type":"WebSite","@id":"https:\/\/ascentblog.org\/#website","url":"https:\/\/ascentblog.org\/","name":"ASCENT: Administrator Support Community for ENT","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ascentblog.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ascentblog.org\/#\/schema\/person\/a48fa1aa41da1c29cc94d21d838e548c","name":"Ascent","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ascentblog.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d989781765ad4aaeddfde1e4751472ee?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d989781765ad4aaeddfde1e4751472ee?s=96&d=mm&r=g","caption":"Ascent"},"description":"The Association of Otolaryngology Administrators has more than 1 thousand members and continues to be the leader in otolaryngology practice management. AOA serves their membership through successful resources and services offered while striving to keep pace with future opportunities.","url":"https:\/\/ascentblog.org\/author\/ascent\/"}]}},"_links":{"self":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts\/1865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/comments?post=1865"}],"version-history":[{"count":2,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts\/1865\/revisions"}],"predecessor-version":[{"id":1868,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts\/1865\/revisions\/1868"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/media\/1866"}],"wp:attachment":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/media?parent=1865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/categories?post=1865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/tags?post=1865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}