Distributed denial of service (DDoS) attacks are one of the oldest cyberattacks in the books, but they’re still common and can knock out vital services, leaving patients and providers unable to access EHRs and other systems.
Network devices make life easier in many ways, but they can be a significant challenge for security officers. These devices must be carefully managed and security officers need to be kept in the loop when any decision is made to add a device to the network.
Breaches are expensive and the price tag increases when preparation and formal documentation are lacking. One of the challenges of tracking security incidents and determining if a breach of PHI or PII is a reportable breach is developing a consistent assessment process and building a centralized breach tracking system.