Answer 2 for NRS 450 Describe the processes that health care organizations can use to secure electronic information in a computer network

There are many different processes, or methods, that health care organizations can use to secure electronic health information within a computer network. Some examples of these different methods includes, but is not limited to: “1. Educating Healthcare Staff; 2. Restricting Access to Data and Applications; 3. Implementing Data Usage Controls.” (Lord, 2020) Of course, it’s important to mention that these are only just a few different ways that some health care institutions could implement. Moving on, the impacts of cyberattacks can be crippling to both the health care facility as well as the patients. It is becoming increasingly more evident that hackers are devising new, innovative, ways to obtain access to hospital networks. For example, several institutions utilize a “cloud” network in order to better facilitate the flow of information exchange. (proofpoint.com, 2024) “Fifty-four percent of surveyed healthcare organizations experienced at least one cloud compromise and 64% of those affected noted an impact to patient care. Consequences included an increase in complications from medical procedures (51%), longer length of stay (50%) and increase in mortality rates (18%).” (proofpoint.com, 2024) Carrying on, this leads us to the development and implementation of the Two-Factor Authentication process. (hhs.gov, 2024) For those who are not familiar with Two-Factor Authentication, “Two Factor Authentication (2FA) is process in which a user must provide two different types of information to gain access to an account or system.” (hhs.gov, 2024) This leaves me with a concluding question, how many of you utilize 2FA and how frequently do you find yourself using it?

Citations:

hhs.gov (Ed.). (2024). Utilizing Two Factor Authorization. Department of Health and Human Services. https://www.hhs.gov/sites/default/files/two-factor-authorization.pdf

Lord, N. (2020). Healthcare Cybersecurity: Tips for Securing Private Health Data. Digital Guardian. https://www.digitalguardian.com/blog/healthcare-cybersecurity-tips-securing-private-health-data

proofpoint.com (Ed.). (2024). Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care. Proofpoint. https://www.proofpoint.com/us/cyber-insecurity-in-healthcare