Flex staff may work at various hospital locations on different days, resulting in frequently changing permission needs. Many organizations use staffing firms and temp firms to fill in workforce needs as required. For example, California has historically not allowed hospitals to employ doctors, meaning a lot of physicians are also contractors. If access remains for these individuals when they are no longer working in that specific capacity, healthcare records are left vulnerable. By using identity and continuous controls, healthcare organizations can create a holistic approach to security.
Insider Threats
Security threats aren’t limited to those outside the organization. Insider threats account for almost one-third of all attacks. Standing privilege, orphaned accounts, and a rotating workforce leave healthcare organizations vulnerable to access abuse.
Even individuals with the best intentions can unwittingly fall prey to bad actors through social engineering or phishing. Any compromised account is a security hole. The modern healthcare environment is under attack as it has never been before. Protecting patient information requires a shift from static access controls to more dynamic identity and access management.
Experian describes the coming year as a ‘cyber-demic,’ calling COVID-19 vaccine rollout information and personal healthcare data “particularly vulnerable.” Last year, 90% of the breaches Experian serviced were healthcare or telehealth related. Meanwhile, new statistics show a 45% increase in cyberattacks against the global healthcare sector since November — over double an increase of 22% against all worldwide industries in the same time period.
One Identity for Life and Zero Standing Privilege
So many healthcare organizations have moved to the cloud to benefit from modern technology’s advantages, that half of all EHR revenue is cloud-based. As a result, security solutions need to be more focused on the cloud to meet modern business needs. Additionally, IoT (Internet of Things) technology connects numerous devices from the local network to the EHR wherever it resides, creating vulnerabilities. With a single identity and continuous controls, organizations can take a holistic, agile approach to security.
Identity Management and Access Management
Security in the cloud requires establishing a full portrait of a user’s risk profile, including:
- Access Analytics
- Usage Analytics
- Individual User Activity
- Inherent User Risk