Protect Your Hospital’s Critical Patient Information: 7 Best Practices

Great healthcare security article from our technology partner Citrix, make sure that your organization is ready to tackle the challenges that are in store.

Screen Shot 2015-11-30 at 2.13.31 PM


A breach of patient data can be catastrophic, not only from a PR and public image standpoint, but to a hospital’s bottom line, as well. The AMA estimates–conservatively–that the cost of breaches such as these could be in the millions. Today’s attackers have proved to be more creative than ever when it comes to obtaining sensitive patient data and it is up to the organization’s IT security team to ensure that data doesn’t fall into the wrong hands. 89% of IT decision-makers say that security technologies are critical or important to creating a business advantage.

Click here to read on and discover the 7 best practices from Citrix. 

Cloud Considerations for Healthcare

There are several key factors that must be considered when selecting a cloud provider in the healthcare environment. These factors are strictly unique to healthcare due to the environmental differences the industry presents; in most industries, application availability is measured in dollars, but in healthcare, the availability of an application could literally be life saving.

Here are the three key factors you must taken into consideration, above all others, when selecting a cloud platform solution in the healthcare environment.

  1. Security and HIPAA compliance: The fines for the breach of PHI (Protected Health Information) can be crippling to an organization. This is one reason data security in a healthcare environment is so critical. Whether you are utilizing a cloud provider for all of your IT needs (or just using a small hosted application or email) it’s imperative that your provider understands your security requirements and is compliant with HIPAA standards. Additionally, HIPAA compliancy is not achieved through a one-time audit, but rather a series of regular audits to ensure security principles are up-to-date with the latest regulations.
  2. Availability: The world of healthcare never sleeps. There are always patients to take care of, calls to answer, and emergencies to address. If you need to access critical patient data, you shouldn’t have to worry about its availability. Most cloud provider’s SLAs (Service Level Agreements) will outline their promised availability, but you should also look into their past availability metrics by getting answers to the following questions:
    • Historically, have they delivered in accordance with their SLAs?
    • If not, what changes have been made to ensure compliancy?
  3. Transparency: As a customer, especially a healthcare customer, you must have access to the information necessary to make an informed decision. A cloud provider should be transparent in their operation, providing you with their SLAs and their HIPAA audit reports so that you have a clear and accurate view of the service they provide. Any cloud provider who doesn’t freely offer this information should be avoided. It’s your data, and the risks to you and your organization are extremely high – you must have all of the information necessary to make the right choice.

Your data security is always important, vitally so in the healthcare environment. By staying fully informed you will help to to ensure your patient’s privacy, and the reliability of your cloud provider.

The “Cloud” and Healthcare: Match Made in Heaven?

First, what is this “cloud” everyone keeps talking about?

The cloud is a new term for a pretty old idea.  The cloud simply refers to applications and data running in a data center that is not located on your organizations premises.  Back in the day of large mainframes, companies would offer compute cycles of their mainframes to other companies.  In the late 1990’s, ASP (Application Service Provider) was the trendy buzzword.  Later, SaaS (Software as a Service), IaaS (Infrastructure as a Service) and hosting were all used to describe this same idea.  Today, we refer to it as the cloud.  In actuality, most people have used the cloud in their daily lives without even realizing it.  If you have or had an email account with AOL, Hotmail, GMail, Yahoo or any other email service, then you have utilized the cloud. Read more

Conflicting Applications in a Secure Healthcare Environment

It’s an all too familiar situation for healthcare IT departments. Two primary applications have to be loaded on all PCs in the environment, but they require different versions of the same prerequisite software. Often times Java and Internet Explorer are the culprits but there are many others. How can two conflicting application environments be setup to coexist on the same PC? Application Virtualization. Read more