Skip to main content

On-demand webinar

Preventing cyberthreats webinar

Learn practical steps you can take to safeguard your enterprise imaging data.

Welcome to Becker's Data and innovation virtual

event and the featured session deterring

bad actors from accessing imaging

data is your secure,

My name is brian Zimmerman. I'm the A. V. P.

Of client content strategy here at Becker's Healthcare

and I'm thrilled to be today's moderator.

Before we dive into the discussion, I'm going to walk

us through some some housekeeping instructions.

You can submit any questions you have throughout today's

session in the Q and A box on your dashboard.

Today's session is also being recorded and

will be available after the event. You can

use the same link used to log into today's session

to access that recording

and if you have any any technical difficulties

please um and enter a message

into the Q and a box there. We've got folks ready

on the back end to help out.

So with that I want I want to go ahead and introduce

our two terrific speakers today.

So we're joined by Mike's White. Chief

information security officer would Change healthcare.

Mike has spent over 20 years leading and advising

organizations on information security and business

resiliency risk in high risk business

environments.

Mike's deep healthcare experience spans

leading information security functions at a

top player performing security consulting

for numerous providers. Mike has also

served and led numerous organizational functions

he's built and deployed a risk assessment

model used to measure the maturity

of security controls and the corresponding risk

reduction of control improvements.

Dr Sonia Gupta is the chief medical

officer at Change Healthcare and

an abdominal radiologist at

radiologist. Associates of florida.

DR Gupta has consulted for google.

IBM Watson health ran A I and

G. With former faculty appointments

at Harvard Medical School and Temple Temple

University School of Medicine. Dr

Gupta is the chair of the GoBI

AI advisory board and is an

advisor to Mass mutual Ventures Southeast

Asia. She is a board member of the american

board of artificial intelligence in medicine

and an editorial board member of the applied

radiology medical industry section,

Dr Gupta is passionate about the possibilities

of AI in healthcare and mentoring the next

generation of physicians. Mike

Dr Gupta thank you so much for for taking

the time to be a part of the session.

Thank you for having us.

Thank you.

So just to set the stage here

with some some initial comments, attacks on health

care providers are of course increasing.

We've seen cyber thieves hold ransom

data shutting down critical hospital systems

until hospitals pay ransom for that data

and the cost here of of course are large

and patient care can also be affected.

And of course this, this is primarily caused by

malicious software called ransomware which

encrypts sensitive data until a key code is

provided. And this can be and

it's very easy for this to infiltrate

the hospital system. Um you know, it's

as simple as an unsuspecting employee clicking

on a phishing email and then you're

in deep trouble.

So in order to prevent these episodes,

cybersecurity protection must keep pace

or even be ahead of these increasingly

sophisticated attacks.

So with that sort of setting the stage here,

I love to just hear about,

you know, the speaker's concerns

are around cybersecurity

and mike. Can you build on that that

very brief overview that, that I just shared

with folks out there, what, what more would you have?

Yeah, I guess I would add.

I've been in healthcare cybersecurity

for quite a few years and I think one thing that we've

noticed over the years is that

health care has been lagging behind as it

relates to cyber street maturity.

We haven't had the kick in the rear end that we needed

um, to get more serious about it as

other industries have, for instance, you know, financial

services has really been heavily regulated

for for a long period of time. They were one of the early

um targets of cyber security

attacks. And as a result, regulations

were put in place, They've put in um well

funded and mature programs, they really

provide them a leg up and and a better defense

defensive scenario um, with

the cybersecurity attacks of today. And

I think, you know, that hasn't gone unnoticed by,

by the bad guys. And what we've seen as a result

of that is, is a significant uptick

in the attacks on, on healthcare entities

and, and you know, I think providers, we've seen

a 70% increase in

the reported us seriously

pretty incidents in the past year

And and these aren't cheap. You know, we're

averaging about 9.3 million or $9.2

million dollars per incident for these incidents.

And we've seen healthcare entities with

documented public um, costs

related to the security incidents in excess

of $100 million. And so this is serious

business. It's impacting

not just um, their financials, but

their ability to deliver care as well. I mean, there's

there's been entities where they're having to turn

away patients and and divert, you know,

trauma patients to other facilities simply

because their systems are down. And so

it's not only a very serious impact on the ability

to to run a healthcare entity,

but also it's, it's becoming more and more impactful

on delivering care as well. And we've seen that

from our perspective when we sit in the healthcare

ecosystem where we've seen a lot of

our customers

become compromised, where we've had to work with

them to cut off access and ensure we protect

ourselves from their situation, but also

help them get back on their feet when they do

clean up the incident and get back up and running

is reconnect systems with them. So it's

become much more challenging and much more disruptive

to the entire healthcare ecosystem.

And I think one of the reasons why is

of course, as I mentioned, the maturity

that we see in the health care entity space,

but also because the folks that are attacking

us are becoming much more sophisticated and creative

in how they're doing so,

um you know, as I mentioned they've they've realized

that health care is a good target. And

not only that they realized that healthcare data

is as valuable as it is, it's a lot easier

to cancel a credit card number and have a new one

overnighted to you the next day and you're back up and running.

And the impact to you is you know, fraudulent

charge that you don't have to pay in your credit card bill.

But when someone steals your healthcare data, it's

much more valuable in the sense that they can continue to

use that over time. You can't really cancel

your healthcare record, I can't really cancel who

I am. And so what you see is is

things like fraud or blackmail or or all

sorts of ways in which that data is used which

makes it more valuable to these Attackers

and it makes us you know bigger targets for

them. And and 11 thing we've

seen in the last several years is it was around

October of 2020 when the federal

government um released a number of advisories

indicating that that there was targeted

attacks on the healthcare ecosystem. So

if you can imagine in the midst of

COVID when we're all scrambling

and of course, you know, providers are overwhelmed.

Um there was folks out there that were specifically

targeting the U. S. Health care system and

trying to take down hospitals and payers and

and and middlemen like you know, change healthcare

where we provide a lot of services to both sides of the

the the the coin and

it's just become much more hard to

prevent these sorts of attacks.

And one of the primary ways we're seeing is typically

most attacks start with a phishing email,

typically an email where they're trying to trick you into clicking

on something, they're trying to socially engineer

you to doing something that you would normally do.

And the whole intention is to establish a foothold

into your environment

and and once they have that foothold um

it really becomes paramount and identifying

them because their their whole goal is to get

into your environment and pivot and move throughout

the environment and find areas where they have

the they can identify the

most valuable data and also inflict the

most pain on you. And the whole premise around

ransomware is put you in a position

to where the pain that you're experiencing is

so great, but you will happily pay that ransom

because that's the best way out of your scenario

that you're in. So it's it's been a it's been

pretty, you know awful to watch it happen.

But at the same time, you know, the methods

that these folks are using are based

upon them trying to extract dollars

from institutions, you know, and healthcare

entities are a very valuable target

for them. Thank you, Mike

and dr Gupta, I want to get your perspective as well.

But Michael followed for you just

because I think everyone listening

or watching this right now has encountered a phishing

email and it's, it's a lot of them

are, probably some of them are just very obvious,

right? Like they're just very like blatantly

like you're not gonna get me today. Like this is,

this is bad work. But I think so when

when folks see here phishing email, they

might conceptualize that. Well, that's not gonna happen to me.

Um, can you talk a little bit about

how sophisticated some of these phishing

emails can be and how, you know,

we like to think all of us, even

security experts, I imagine like to think we're all

sort of immune to these sort of

provocations. But I would

venture to guess that we're not, am I, am I

on to something that

Yeah, I mean the reality is these folks can get

very surgical and there's a, there's a term called

spearfishing when they're specifically targeting individuals

and when they take that more targeted approach,

Like a lot of the fishing you see is kind of spray and pray

if you will, they're just shooting out a bunch of emails and hoping

someone clicks on it and then something bad

happens. But, but when you get into scenarios

where folks are targeting a specific entity,

they're doing their research. They're finding out who are your vendors

and who are your business partners and how can I mimic

ways in which you conduct business,

such that that email that arrives in your inbox

looks very real.

Maybe it's from your ceo with a sense of urgency

or things like that. And and they're really

operating in ways which, which again

are much more complicated and

difficult to identify. And

you know, I always joke around with with our team if we want

to fish, people will just think ups emails

at christmas time because everybody's looking for their tracking numbers.

But the reality is that while that is

a very easy way to get a lot of even, you know,

suspicious people like myself

um when you when you get into another level

where you're mimicking

maybe a business partner that you do business with.

And they're trying to trick folks that we are doing an employee

survey or things like that that are run

of the mill type of things where normally someone's gonna click

that link and enter their information.

That's when it becomes a lot more complex when

they're when they're when they're actually doing the research on

the on the entity

and trying to target that entity in a very specific

way. Um that that you know, would

would easily fool most folks,

thank you Mike and dr Gupta, can you speak

to this issue

specifically from a physician's perspective,

clinician's perspective um why should

clinicians and physicians be really concerned about

cybersecurity and what else would you add to what

mike's laid out so far.

Yeah, I mean, I think it's a newer issue for

us because if I think about when I was

in medical school and early in my residency, we

were making the switch from paper

charts to computers and you know,

using HR So we're not always

we have not always been in the habit of having

all of this information on a computer

system, you know, because before we weren't

really worried that somebody would walk into the hospital

and walk out with a bunch of patient binders and

charts.

But now, with everything increasingly being

in the cloud and, you

know, being on a computer system, more security vulnerabilities

certainly come up

and we want to make sure that we're able

to keep that patient data secure

and, you know, like Mike mentioned,

we're increasingly seeing these phishing attacks

and,

you know, our worst case scenario is that the,

like a critical system of the hospital, like radiology

for example, gets completely shut down and we have

to divert patrons because when you

think about it,

almost every patient that comes to the

hospital or to an outpatient imaging center

gets imaging done. You

know, that's just part of your healthcare journey.

And if that system goes down

because it's vulnerable because,

you know, we are using older technology,

you know, different parts of the

hospital system got upgraded at different

times as we were making these transitions

from, you know, paper to computer

and then from computer to computer

then it really makes us vulnerable.

And what our worst case scenario is

that the system goes down and then our surgical

colleagues or oncologists are

having to delay patient care because they're

waiting on imaging results. And

what we really don't want is that a radiologist

or a cardiologist has to physically walk to a

scanner, you know, to get that information

because it's not available in our computer system.

And when we talk about these sophisticated

phishing emails, you know the

physicians and all of our staff are

obviously drowning in emails. So it's

easy for some email like that to slip in.

And if you think the email is coming from your

boss or you think it's the hospital

itself saying that we need some information

to do this, you know, upgrade because we

get those emails about changing our passwords, you

know every 30 to 60 days. It

would not be you know, easy

to fathom that. We would click on that email to

say we need to change your password or

they'll threaten you and say you're gonna be locked out

of the computer system completely. You

know, you can't get into your patient charts because you

need to do this

um thing where you need to update something or

change your password. So it's

you know, we like to think that we would be too sophisticated

to fall for something like that. But that's a real threat

and we want to prevent that,

make sure that we don't have patient care delays

and you know, we're able to take care of our patients,

especially during the last two years

when we were really stretched them.

Yeah. And as he laid it out there, I mean,

no physician wants to go through sort of the scenario

that you laid out that sounds

um challenging to say the least.

But I also say to to your point about

being sort of a wash and emails, um

there's so it is, we're

so aware right now in healthcare media

as well as sort of the burden that that is on physicians

and clinicians.

And I'm curious what we would say dr Gupta

if an added focus on cybersecurity

sort of um and I'm thinking here

about maybe perhaps an added apparatus

more clicks potentially for clinicians.

Does that have the potential in your mind to

sort of add to this administrative burden

and potentially make burnout worse? Can

you speak to that a little bit?

Yeah. You know, we do have a renewed

focus on burnout and it is really

an epidemic in health care right now.

But the goal is that if we

have better technology that's more advanced,

we should really have the exact opposite,

you know, especially with cloud technology, we

should have improved efficiency

and less clicks and less pauses.

Um because I think the issue right now

is when we talk about a computer system

upgrade in the hospital, we think of a

delay

and what we really want is with a cloud

technology platform. We really

want those updates to happen seamlessly

in the background. So the way we think

about our gmail or our iphones,

you know, those things just update and we never really

think about it

and it shouldn't be that in a hospital we

have to think about it and watch a system crash

because it's supposed to be updated.

So you know that burnout piece

is supposed to get better in an

ideal scenario.

And I think it's important to note that

right now we do have a lot of different logins

and passwords and that is probably

a security vulnerability because there's one for my

email, there's one for the E H. R.

That's inpatient outpatient then potentially

for your pacs and imaging viewer and

that causes more confusion and really if

you had one login and it was all secure

that would prevent it.

And so that's really ultimately the goal to ease

that burnout.

I appreciate that Dr Gupta and I think

that brings me where I want to go next, which is really

digging a little bit deeper on imaging but also

focusing on the cloud here as well.

And I'm thinking that, you know, can

the the cloud for some folks perhaps might

just be, make them feel a little bit vulnerable,

right? That some leaders out there might feel

that the best way that they can

protect their data, keep their arms around their

data is to keep it inside the four walls of

the hospital

and and you know I

can't help but think that these data

breaches really reinforces

that that sort of mindset

mike, can you talk about

that just a little bit how how

um you might address that sort of mindset

shift especially as we think about imaging

and and and and sort of some of the scenarios

Dr Gupta Gupta laid out.

Yeah absolutely. And I think you

know, one thing that we've seen is is with

with on prem data centers and

your own hosted solutions and kind of managing

your own I. T. Estate.

What what many health care entities have fallen into

the trap of is that they have a lot of debt. Now

they have a lot of technology debt that is difficult

to manage. You know they've been so focused

on care delivery and keeping systems

up to date as Dr DR dimension

is disruptive. You know updating

an imaging system. It's not a fun thing

for a hospital go through a process like that where

hey you have to apply a new patch or you have to upgrade

to a new version or guess what? The server that you're,

you're, you're imaging system, your pack system

runs on is on a date, you have to update

that all of these things are disruptive

to the care delivery scenario. And

I think you know a lot of this is is based upon the

fact that we were all in legacy

that we're all but many many entities are legacy

data center environments where you

know you're applying technology resources

that are in high demand and hard to get

um to try and manage this stuff and also update

systems that, let's face it, our aging

um and need to be updated without

disrupting the entity's ability to deliver

care. Many many industries you have

those, you're fortunate to have those maintenance windows

where you can get things done.

Unfortunately hospitals don't have that luxury.

You know people are are servicing patients

24x7. They're they're they're inviting

patients on a regular basis

and so they don't have those those wonderful

I. T. Maintenance windows where where people like

me can go in and update the

entities healthcare systems to

properly run and be secure and patched properly.

So it presents a challenge to them.

And what we've seen is the move to the cloud.

Um the fear with that I

think it's more related to the unknown, you know that

someone else has my computers in my data.

The reality is is that done properly and

built well. Um the cloud is

more secure I would say than

than a non prime solution because you can update

things in a more seamless fashion where you're

not necessarily impacting up time and

care delivery and things like that. So you can do some

seamless updating.

Um

and and really enable an entity to run

24 by seven, you know, without

having those downtime periods. And if

you think about that, think about you know when

you go to netflix and you can't watch a movie

or go to amazon and you can't shop, you know, these are

all cloud based systems that are always working

and don't think for a second, they're just sitting

there letting those systems age and get old

and insecure and things like that. No, they're constantly

updating them in the background

and in the cloud works in a similar way

in a in a healthcare setup. You know if you if you build

an imaging system like we have a change

in a cloud based scenario and done properly

and understanding how you're gonna handle

that data and how you're going to secure that data, you

can actually deliver a solution

that can be more helpful to an organization

than than hindering them because now I can

always rely on my my cloud based solution,

I can get to it from anywhere. I need to I

don't have to worry about you know, think about it

doctor good to mention is you've had hospital

systems and you know many, many organizations on

multiple hospitals

um they've updated their technology footprint

over years. And so now you have version

one in this hospital and version two in this hospital

and so on and and just think about

how complex it is to keep all of those systems

up to date on the latest version and

not impact downtime and ability to deliver

care.

Well now in a cloud based scenario, you're able to

do a lot of that sort of stuff in a seamless fashion

and you're, you're not impacting your organization

in a negative manner. So, so we we've

learned is that building a solution like this

and doing it right and doing it, you know, in accordance

with, with good security frameworks

and following a proper controls,

um, really can deliver not only

a very secure solution, but a

more robust solution that's, that's more manageable

for an entity to consume.

Yeah, this is the side, but on

the amazon component, how easy it is. A part

of me wishes that it wasn't so easy to be

able to be easier on my pocketbook,

right? Like it is uh, extremely

convenient to the point where the amount of cardboard

that is sometimes on my front porch is a little embarrassing.

Um, but but mike follow

for you there around sort of

some of the hangups that that might exist

in some folks minds around cloud technology.

I think some of that might be associated with

unpacking some of the buzzwords for folks that

might not be as

um, in tuned with, with, with the technology.

So thinking here about phrases like cloud enabled,

cloud native,

um, can you maybe unpack

those buzzwords for, for our attendees out

there, especially as you know, concerns

or is related to security.

Yeah. And so I think, you know, one thing that we've

seen over the last, you know, five or 10 years

is that there's been a big push um and

healthcare has been behind the curve and this, admittedly

I've watched it at my old employer and

and and now at my current one where you've

seen entities say I want to be in the cloud,

it's easy to say, but doing it that's pretty

challenging. You have to kind of re factor how

you think and how you operate, how you build things.

And one of the ways in which folks, you know, get to the

cloud is they want to be a cloud company, want to

I want to market that is they take

on prem legacy solutions, you

know, stuff that was in my data center and I move it

aWS or google or or

or or Microsoft and and I have them host

it for me. And all I've really done is changed

the four walls that my system sits in,

I really haven't changed that, that solution

to be cloud native. And so when I when

we say cloud enabled, we're talking about stuff, you know,

when you when you reference that were saying I took an

old legacy solution

and I kind of bolted it together in a way that allows

me to host in the cloud, which may

or may not be a good thing, depending on your scenario,

but what we've, we've decided is that building

cloud native solutions really enables

us to be more flexible and how we operate

that. We can, we can scale more easily. We,

we can, we can um deploy better

security solutions more easily. Um

we can, we can upgrade and patch things

in a very easy fashion where

now I'm not, you know, bugging one of my customers

that has an imaging solution on prem and saying, hey,

here's a patch, you need to apply or hey, we need

to get into your system and provide an update. Now we can

just do it on the fly and and automatically

your system is up to date, it's always gonna

be current, you're never gonna have to worry about, oh

gosh, I got version two here in version four in

this hospital. No, it's, you're leveraging

one solution

and from multiple places and

now you have all your data in one place as well, so it makes

it a heck of a lot easier for you to consume

that solution. Um, but but I think the big

difference is is that you have to be intentional

about building in the cloud, it can't be something that you're

just gonna move there because again, there's

benefits and there's downsides to doing that,

but when you're intentional about building something in the cloud,

you can take full advantage of all the cloud

capabilities exist.

Um, the elasticity, you know, it can, it can, it can size

up and size down based upon the usage and the

demand placed on the system. These things are really

important for folks using solutions like

this, especially when you consider the imaging solutions

and just how, how much churn there must be

to, to be able to, you know, scroll through, I've

gone through like M R I images and cat scan

images of myself for various things

and you know, the cd burners just spinning

forever in legacy systems when I've had

those images and now you're able to do that much

more easily and you're placing that that

compute load

in the cloud environment as opposed to to your,

your local system. So in our

minds it makes a lot of sense um

for folks to migrate to solutions like

this, it's just just better enables and

cities and not only that you're not having to pay

for the care and feeding and support of the system

in your data center on prem and you don't have to upgrade

your servers every couple of years and things like that.

Appreciate that mike, thank you for, for, for the,

for the deep clarity there

um dr Gupta, I want to turn back to you

now and set to

set the stage for my question. Um,

I think, you know, the

migration to telehealth amid Covid 19

I think was

so fast um and so

executed on such a large scale that I

think it surprised a lot of

folks in health care in terms of how nimble

healthcare organizations can actually

be when it comes to technology.

And I think that evidence sort of begs the question

when we're thinking about

imaging um specifically

um and and we think about you know, this

day and age, everything is so convenient.

You know, we can deposit money into our

bank accounts with the snap button.

There are just so much, so much convenience

and technology

and so why can't we have

the same level of convenience when it

comes to sharing imaging data between

providers? Can we get there?

It just seems like it's something that should absolutely

be on the table considering just how

transformative healthcare organizations

are actually capable of being.

Yeah. I mean, I think you're absolutely right Covid

19, you know that the pandemic has really

shown us how nimble we can be

and how remote health is possible.

And I think it really changed the paradigm

with patient care as well because

now patients want access

and should have access to their imaging data

when they go from doctor to doctor or hospital

to hospital. And I think that's been

a huge challenge because we've been trying

to protect that information And

you know, I like to always give the example of when I upgrade

my iPhone, I still have pictures from 10 years

ago that will come with me, you know, every

time I get a new phone. But then

when our patients are walking literally

across the street from one

hospital system to another, they can't

take their images with them and

they might have to have them burned on a cd potentially

that's physically walked over. And

so you're right. It seems odd

that, you know, we're not yet there. And

I think a big part of that has just been that

we've had this emphasis on security

and you know, this is really why we're talking about cybersecurity

today because we're talking about new

ways of protecting patient information,

but also giving them that flexibility

of being able to go from one

hospital to another if they need to

and to also own their data because at the end

of the day it's their imaging, you know, I

should be able to carry around my

x ray on my iphone just

the way I have those pictures, you know,

forever potentially. But that's not

been the case. And so I'm hoping

that as we move towards

cloud technology and

you know, cloud native specifically as

mike was mentioning that we're able to

do

new things and really, you know, push

on innovation and enable patient care,

you know, to a much higher degree and ultimately

reduce cost and improve that

efficiency for patients because what

I really don't want is a patient having to have

all their imaging work up done again,

you know, let's say they move

and many people did move during the pandemic

and you know, you moved from new york

to florida for example and now

suddenly you have to have everything redone

all your lab tests and all your C. T. Scans

because we're not able to enable

that transformation of information

easily. So that's you know, that's

something that we really have to focus on

as a community and

you know, another great thing about the cloud is

it enables us to use ai so we can

help some of these challenges and

efficiencies and you know,

be able to reach a more confident diagnosis

and expedite our workflow and

you know, that's really what I want to see us moving towards

and I'm glad that we're talking about it today because

I want attention to be directed

towards this, you know, cybersecurity

and how that will ultimately improve our patient

care. Such

an important point about how its security

of course is

we have to have here but security.

Once we have that that information is secure,

then you can build and transform patient care.

Um and you set you you touched a little

bit on some of the transformations that

are possible, how it would influence care

and diagnosis.

Is there anything you didn't mention that that you

are particularly fascinated by or

or or watching or optimistic about

the potential for this technology to transform

patient care. Anything else you can flag there

for for attendees.

I'm most excited about being able to

have access for patients

to special specialist.

So, you know, now you have patients

who may be in a more remote location that

with telehealth can have access to a specialist

without leaving their house. And I think that

was something that we didn't really focus on or think

about as much, because

if you think about a particular patient

population, you know, many of them are frail,

they're not feeling well. Do you really want

to make them drive in a car for an hour

or two hours or even have to get on a flight

to get to a specialist in person?

And, you know, then they're struggling with parking

at the hospital as far away from the actual,

you know, office that they have to get to.

Sometimes they have to get a wheelchair to get there,

and they're not feeling good during that entire

time, you know, they don't feel well and

to be able to just have them be at home

and be comfortable with their family support,

but to still offer them that high level

of expertise, you know, from

that specialty physician in a remote setting

is really what I'm most excited about, because I

think ultimately we're offering them

better care and they don't physically have

to go to that big city hospital

for that care because they can get it from home.

Thank you so much dr Gupta and thank you, mike

as well, this has been a real

pleasure for me to come on here and

moderate this conversation.

Alright, so so we've covered a lot of ground

here before we sign off though, I think

let's try to leave some folks with

some some really tactile

action steps, they can wrap their heads around. So

what preventative measures can folks

take out there? What are some steps that can be

taken to to really help

protect against these? And what would you, what

advice would you give folks Mike? Can you step

up and weigh in first year?

Yeah, absolutely. I think, you know, one

of the things that we frequently see in the in the healthcare industry

is is technology debt. And I think one of

the most important things you need to do is keep

your systems up to date.

Every institution has some sort of legacy

technology solution, some form of technology

debt that they're trying to clean up. And

I think what we often see happen is folks

acquire too much of that and they kind of

get behind the eight ball to where then it becomes

more and more difficult to clean up.

Um So keeping on top of that on a regular basis

prevents you from ending up in a scenario

where there's a significant security risk and you have

end of life systems or or technology debt

that really limits your options on how

you can address that security risk. And so having

up to date systems is paramount to maintaining

a secure environment, I think another one is

to factor access

um I think, you know, I'm not alone in being

annoyed when I have to enter the pin into my online

banking account in addition to my user name and

password, but it's also very important

in keeping those accounts secure.

Um so anytime you're you're having

having the option to use two factor, you always should

take that option simply because the end

of the day it's easy to lose the user name and password.

There's constantly ways around using admin

passwords and two factor really helps strengthen

the access controls that we put in

front of solutions.

And another one is is email security. I

think you know we spend millions

of dollars in security technology to change healthcare.

And one of the things that I've always, you know, imparted

on the rest of the organization is look all

that spend can be undone with one person

um all it takes is one mistake. And so we really

also spend a lot of time on security awareness with the

organization, having training courses

and and and doing phishing tests and getting people

used to spotting these sorts of attacks

and operating securely not only so

that they can prevent these sorts of activities from

happening, but also so they understand the important

role that they each play in our organization,

we kind of refer to them as our human firewalls

because that's in reality what they are.

Um and one last thing I will say is is

as folks move into the cloud and

and as you you look at leveraging cloud

environments. One of the big things you need to do

is consider, how is that entity securing

the cloud environment, what standards are they applying?

Are they using a security control framework? Do they

have any kind of certifications that that

bless those environments to say yes, this

organization is doing it the right way.

And that's a big thing to make sure you're looking out for

when you do weight into those waters and start leveraging

cloud solution,

appreciate that so much mike uh dr

Gupta, what would you add to that list?

I think I would echo mike's mention

of the emails, you know, they can be sophisticated

and we know as physicians and our

hospital staff just get tons and

tons of emails so something can easily slip

in there that can look like it's coming

from your boss or just something that,

you know, like an employee survey that just easily gets

your attention. And then you just click on that link

and I think it's something that we may need to also start

talking about with our patients because

again, these sophisticated phishing emails can

go to patients and they could be Impersonating,

you know, the hospital system and say they have

an unpaid bill for example, or

they could impersonate their doctor and say they have

results waiting for them and again, you know, click

on this to get your patient results. And

so we really want to avoid that. And

so just that increased scrutiny

and awareness and education of the community.

Excellent. Well dr Gupta mike.

It really has been a pleasure being a part of this discussion

today. Thank you. Thank you so much for taking the time.

Thanks. Thank you.

I also want to thank today's featured session sponsor

Change Healthcare. If you'd like to learn more,

please consult the resources section of your session

console.

Thank you for joining us at Becker's Data Innovation

Virtual event,

enjoy the rest of your day.

Related resources

View all

Article

How AI is delivering efficiencies for radiologists

Learn how AI solutions can boost your organization’s return on investment (ROI).

Guide

Improve your radiology performance

Learn how Change Healthcare Radiology Solutions™ 14.2.1 can help your department improve diagnostic confidence.

Guide

Access point-of-care ultrasound imaging data

Discover how centrally stored point-of-care ultrasound images can help your organization increase efficiency and improve revenue.