7 Myths of Healthcare Cloud Security Debunked
|
|
|
- Britton Chandler
- 10 years ago
- Views:
Transcription
1 BUSINESS WHITE PAPER 7 Myths of Healthcare Cloud Security Debunked Don t let these common myths stall your healthcare cloud initiative
2 7 Myths of Cloud Security Debunked Table of Contents 2 The Cloud is beginning to gain favor 3 Myth #1: The cloud isn t secure enough for healthcare 3 Myth #2: All cloud-based infrastructures are created equal 4 Myth #3: Data in the cloud is more vulnerable to hackers 4 Myth #4: Data in the cloud is accessible to other organizations using the same cloud 5 Myth #5: Data that resides in the cloud can t be controlled or mined by providers 5 Myth #6: Identity and access management is a headache with cloud-based systems 6 Myth #7: I can t trust a cloud provider like I can trust my own people Cloud computing could be the next game-changer in healthcare but not if healthcare IT professionals don t overcome their deep-rooted aversion to the cloud. A conventionally risk-averse industry, healthcare has been relatively slow to adopt the cloud, citing security and privacy concerns. According to MarketsandMarkets, despite a slow start, healthcare providers are predicted to spend $5.4 billion on cloud services by The Cloud is beginning to gain favor As regulation pushes the industry toward storage, collaboration and accessibility, the cloud becomes even more attractive since it s often safer and more versatile than on-premises solutions. Health information exchanges also are contributing to the need for interconnected electronic medical record systems to ensure easy access to patient data. As a result, cloud-based software-as-a-service models are beginning to grow. According to a June 2014 HIMSS Analytics Cloud Survey, 83 percent of 150 industry respondents said they currently use at least some cloud services. Another 9 percent plan to use the cloud, and just 6 percent don t plan to try cloud services. Despite the growth in cloud-based services, 61 percent of healthcare IT respondents indicated security is still a top concern. Many of the concerns about cloud computing security are more myth than fact. Let us debunk seven of them. 2
3 Myth #1: The cloud isn t secure enough for healthcare A long-held perception exists in healthcare that cloud systems are inherently less secure than traditional on-premises systems. While both enterprise systems and cloud systems have an equal chance of being attacked, data shows that cloud-based systems are actually more secure than their on-premises counterparts. According to Alert Logic s 2012 Cloud Security Report, on-premises users experience an average of 61.4 attacks per year while service-provider/cloud customers experience an average of only 27.8 attacks annually. The reason there are fewer attacks is because of better safeguards in the cloud, says Chris Bowen, chief privacy officer, ClearDATA. With the cloud, the data centers have specialized safeguards such as perimeter controls, cameras, armed guards, biometrics, interconnected room locks, man traps, multiple pipes for bandwidth, massive UPSs and multiple power grids, which are things even large hospital systems have a hard time providing, he says. Myth #2: All cloud-based infrastructures are created equal The cloud infrastructure can generally be boiled down to three components: network, storage, and computing. Each component must be purpose built for healthcare and with the use case in mind. In healthcare, networks must be secure, highly redundant, and designed to support burstability and have communications ports designed for shared use, Bowen says. But they must also be actively monitored and logged. Some cloud environments may be built with many of these features, but the logging requirements in healthcare often require other solutions to enable the logs to be kept, protected and archived according to specific data retention policies dictated by Health Information Trust Alliance (HITRUST), Omnibus and the Privacy and Security Rules. 3
4 Myth #3: Data in the cloud is more vulnerable to hackers In reality, data in the cloud is less susceptible when it is properly encrypted and secured. But it really depends on the cloud provider. Understanding how the provider approaches defense in depth from an administrative, technical and physical perspective is critical, Bowen says. Just as essential are the operating principles that the organization has developed to support a healthcare cloud. On-premises strategies are challenged to provide similar levels of service. Because IT security is not the core competency of most healthcare providers, turning to cloud providers can pay off since they focus on security extensively particularly cloud providers that focus on healthcare clients. The investment of resources and staffing by cloud-based providers is difficult to match with in-house employees. Additionally, HITRUST-certified vendors are particularly attractive given the rigorous certification process vendors endure. Myth #4: Data in the cloud is accessible to other organizations using the same cloud This myth is often unfounded since cloud providers take every precaution to secure the data. But since data in the cloud may be hosted on the same physical environment as others, it is important to choose a provider with the experience and know-how to ensure your data is segregated from other organizations data at all stages of the lifecycle. It is important to focus on isolation tactics for added protection of data in the cloud. Isolation is really a core function of a lot of the virtual infrastructure that cloud providers are using, says Rob Sadowski, of RSA, The Security Division of EMC. Most providers are going to be segmenting customer networks into virtual LANs. They re going to make sure that there is no cross-pollination over these virtual networks of customers. Another element to implement for isolation is the use of encryption. 4
5 Myth #5: Data that resides in the cloud can t be controlled or mined by providers This myth might be the most important to debunk. What contributes to the perception that the cloud may not be as secure or may have some level of risk is the lack of visibility and the loss of control, Sadowski says. The best way to ensure you have control is to extend the internal controls that you already trust into the cloud. For instance, make sure you have the same authentication, user management and access management capabilities in the cloud that you do with your on-premises solution. Any cloud environment should allow you to maintain an auditable chain of custody for your data. Any cloud provider that cannot guarantee this for you will put you at risk if you are ever audited by the ONC or investigated by the OCR, Bowen says. Once data enters the cloud, it might traverse many different data centers and geographic regions, be hosted multiple places simultaneously or be dynamically relocated as needed. Myth #6: Identity and access management is a headache with cloud-based systems In truth, it s not difficult to extend a provider s existing identification and authentication framework to a cloud environment. There are specific technologies (such as LDAP, SAML, Cloud Access Security Brokers, etc.) in the marketplace that can enable central identity management in the cloud. Network traffic settings also can help enable these technologies. Based on research we ve seen, we know that healthcare providers have to increasingly adopt the cloud in order to meet the infrastructure requirements mandated by regulations and to cope with rising costs, Bowen says. They can t necessarily meet infrastructure requirements with hardware-based solutions in their basement. 5
6 Myth #7: I can t trust a cloud provider like I can trust my own people This might be the most misguided myth of all since most data breaches to date are the result of employee negligence. According to a California Data Breach Report, in , the majority of breaches in the healthcare sector (70 percent) were caused by lost or stolen hardware or portable media containing unencrypted data, in contrast to just 19 percent of such breaches in other sectors. Healthcare organizations are moving to secure cloud computing technologies such as virtual desktop infrastructure to allow practitioners easy access to patient data without ever storing protected health information on mobile or remote devices such as smartphones and laptops. But there are ways to avoid this vulnerability by using the cloud. Some of the biggest risks we see still go back to a person. But you can actually put controls in place so that even on a mobile device the data will never be stored locally, he says. It can be viewed, but it can be completely controlled from a cloud-based environment. To learn more about healthcare cloud security, please call (888) or visit v1
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
How To Secure Cloud Computing
A hole in the cloud: Is cloud secure? N. Vijaykumar Infosys Technologies Limited, Bangalore presented at Security in cloud is a key challenge! 70% 60% 50% 40% 30% 20% 10% 0% Data integrity tampering Hacker
FOR THE FUTURE OF DATA CENTERS?
WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a
How To Protect Your Data From Being Hacked
Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief
EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Building Secure Cloud Applications. On the Microsoft Windows Azure platform
Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside
Security and Managed Services
iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images
WHITE PAPER. 5 Ways Your Organization is Missing Out on Massive Opportunities By Not Using Cloud Software
WHITE PAPER 5 Ways Your Organization is Missing Out on Massive Opportunities By Not Using Cloud Software Cloud software allows your organization to focus on its strengths and outsource tough data storage
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
How To Find Out What People Think About Hipaa Compliance
Healthcare providers attitudes towards HIPAA compliance in 2015 Created July, 27 2015 Healthcare providers attitudes towards HIPAA compliance in 2015 Over the course of this last year the healthcare industry
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Executive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Why can you trust Google?
Why can you trust Google? Przemek Sienkiewicz Head of Enterprise CEE, Russia & CIS Why is Security So Tough? Data Problem: Users want to access their data anytime, from anywhere 60% 1-out-of-10 66% of
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Hedge Funds & the Cloud: The Pros, Cons and Considerations
Hedge Funds & the Cloud: The Pros, Cons and Considerations By Mary Beth Hamilton, Director of Marketing, Eze Castle Integration The increased use of cloud-based services is undeniable. Analyst firm Forrester
HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
2014 HIMSS Analytics Cloud Survey
2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and
Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches
Sean Horne CTO EMC UKI The leakage of Intellectual Property...and the risk of Privacy, Trustworthiness, Governance and Data Breaches 1 The business of Insurance is guided by Trust Insurance is a promise
ALERT LOGIC FOR HIPAA COMPLIANCE
SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare
Encryption, Key Management, and Consolidation in Today s Data Center
Encryption, Key Management, and Consolidation in Today s Data Center Unlocking the Potential of Data Center Consolidation whitepaper Executive Summary Today, organizations leadership teams are striving
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
Moving to the Cloud: Truth or Dare? Debunking 5 Myths of Hosted Contact Centers
WHITE PAPER Moving to the Cloud: Truth or Dare? Debunking 5 Myths of Hosted Contact Centers This document is Copyright 2012 by USAN. This document contains information that is confidential and proprietary
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
Cloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.
Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Making the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
HIPAA Compliance: Efficient Tools to Follow the Rules
Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Data Flow and Management in Radiation Therapy
Data Flow and Management in Radiation Therapy Issues in Data Flow and Data Management in Radiation Oncology DICOM- an Overview with an Emphasis on Therapy - R. Siochi Issues in Data Flow Management in
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
A CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Compliance for the Road Ahead
THE DATA PROTECTION COMPANY CENTRAL CONTROL A NTROL RBAC UNIVERSAL DATA PROTECTION POLICY ENTERPRISE KEY DIAGRAM MANAGEMENT SECURE KEY STORAGE ENCRYPTION SERVICES LOGGING AUDITING Compliance for the Road
Secure Cloud Hosting for Healthcare Organizations
Secure Cloud Hosting for Healthcare Organizations OUR MISSION FIREHOST MISSION Our core is an unshakable, no compromise commitment to protect our customer's digital assets with integrity and innovation
Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
Ensuring security the last barrier to Cloud adoption
Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
a new approach to IT security
REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach to IT security FEATURE STORY REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.
Real Security Outcomes. Delivered. Deploying healthcare and healthcare related services to the cloud can be frightening. The requirements of HIPAA can be difficult to navigate, and while many vendors claim
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE Contents How to Buy Cloud-to-Cloud Backup...................... 4 Wait What is Cloud-to-Cloud Backup?.....................
PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.
PREP Course #25: Hot Topics in Cyber Security and Database Security Presented by: Joe Baskin Manager, Information Security, OCIO [email protected] Objectives Discuss hot topics in cyber security and database
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
BKDconnect Security Overview
BKDconnect Security Overview 1 Introduction 1.1 What is BKDconnect 1.2 Site Creation 1.3 Client Authentication and Access 2 Security Design 2.1 Confidentiality 2.1.1 Least Privilege and Role Based Security
1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Putting Web Threat Protection and Content Filtering in the Cloud
Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
BEST PRACTICES RESEARCH
2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Utilizing Cloud Storage for Mainframes
Utilizing Cloud Storage for Mainframes Art Tolsma Luminex Software, Inc. March 3, 2015 Vendor Session #17166 What? Why? and How? of Cloud Storage Cloud Storage and Cloud Computing are changing how IT operates
