Monday, April 18, 2016

Portals, sufferer photos pose potential security gaps

As the healthcare industry sustains to confront cybersecurity risks and seek ways to make better the defenses, it must consider every avenue that might lead to access to patient data.


Some potential gaps are not as clear, and contributors must look carefully at any potential gap in their perimeter defenses, claims security professional Keith Fricke.


For instance, there is a potential security gap within the patient portals that contributors are offering to sufferers as they seek to comply with needsof the electronic health records meaningful use program, claims Fricke, principal consultant at tw-Security in Overland Park, Kan.


Various cyber criminals have the acumen to insert malicious code into frequently visited web sites, and when a person approaches the site, that code tries to download to a user’s computer.


If a user’s computer does not have security controls and becomes infected with the malicious code, and then the user accesses the hospital’s sufferer portal, malware might be capable to offer a criminal access the patient’s infected computer, and the criminal may learn of the patient portal, Fricke claims.

No comments:

Post a Comment