How healthcare facilities can stay ahead of cybercriminals

Organizations must understand the risk and respond with continuous diligent cyber security


Healthcare facilities must understand their cyber risk and respond with continuous diligent cyber security just as they run the core business, according to an article on the Becker's ASC Review website.

Organizations should begin with an honest and cyber-threat-informed risk assessment that looks at information, technology and human stakeholders. 

Many attacks are starting with interaction with a human; some security reports have estimated more than 70 percent of attacks in recent years began with an email. 

These are simple strategies that every organization can afford, the article said.

By tackling the biggest risks first, an organization's security situation can gradually improve over time, until it eliminates most of the threats.

Read the article.

 



October 21, 2016


Topic Area: Security


Recent Posts

Balancing Act: Designing for Safety and Flexibility

By understanding NFPA 99 requirements, facilities can be better designed to meet current needs and anticipate future challenges.


Methodist Healthcare Breaks Ground on Methodist ER Medina Valley

Construction began in March 2026 and is projected for completion by March 2027.


Fire Protection in Healthcare: Why Active and Passive Systems Must Work as One

Sprinklers, smoke compartments and firestopping can form an interdependent safety strategy.


Building Envelope Design: Beyond Energy Efficiency

An integrated approach to envelope design can create more comfortable and energy-efficient hospitals.


Outpatient Surge Reshapes Long-Term Strategy for Medical Outpatient Buildings

Demographic tailwinds, policy uncertainty and shifting care models are pushing health systems to rethink how and where they invest in outpatient facilities.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.