Skip to content
  • About
  • Contact
  • Contribute
  • Book
  • Careers
  • Podcast
  • Recommended
  • Speaking
  • All
  • Physician
  • Practice
  • Policy
  • Finance
  • Conditions
  • .edu
  • Patient
  • Meds
  • Tech
  • Social
  • Video
    • All
    • Physician
    • Practice
    • Policy
    • Finance
    • Conditions
    • .edu
    • Patient
    • Meds
    • Tech
    • Social
    • Video
    • About
    • Contact
    • Contribute
    • Book
    • Careers
    • Podcast
    • Recommended
    • Speaking

What keeps a hospital CIO up at night

John Halamka, MD
Tech
April 28, 2012
Share
Tweet
Share

Earlier this year, my team presented a list of risks to the Compliance, Audit and Risk Committee at BIDMC.   Here’s my list of top risks for 2012:

1. Old Internet browsers. Many vended clinical applications require specific versions of older browsers such as Internet Explorer 6, which are known to have security flaws.  We’ve worked diligently to eliminate, upgrade or replace applications with browser specificity.   At this point we are 96% Internet Explorer 8/Firefox 7/Safari 5 minimizing our risks to the extent possible.

2. Local Administrative rights. Of our 18,000 devices on the network, a few thousand are devices that require the user to have local administrative rights to run their niche applications (often the research community doing cutting edge research with open source or self developed software).   We have done everything possible to eliminate Local Administrative rights on our managed devices.

3. Outbound transmissions. Security has historically focused on blocking evil actors from the internet.   Given the current challenges of malware and infections brought in from the outside, it’s equally critical to block unexpected outbound activity.

4. Public facing websites. Any machine that touches the internet has the potential to be targeted for attack.  We’ve implemented proxy servers/web application firewalls on most public websites.

5. Identity and Access management. Managing the ever changing roles and rights of individuals in a large complex organization with many partners/affiliates is challenging.  If an affiliate asks for access to an application, how do you automatically deactivate accounts when users leave an affiliate, given the lack of direct employment relationships?

6. Anti-virus. The best anti-virus applications only catch about 50% of malware.  Thus, a multi-layered defense is required.  However, adding all those layers impacts performance and can result in false positives.   Balancing security, reliability, and performance is challenging.

7. Security awareness. When that phishing email arrives asking users for their username/password, social security number, and a DNA sample, some people still fall for it.   Many users surf sites that are known virus distribution sites.   Even social networking is a vector for malware.

8. Keystroke loggers and screen scrapers. Mobile devices and home computers beyond IT control may contain keystroke loggers that capture user credentials, bypassing encryption, VPNs, and other layers of security.

9. Forensics. Increasingly sophisticated security infrastructure implies more events to research which requires additional staff that are challenging to find, recruit and retain.

10. Third party desktop software. It’s no longer the operating system that presents the greatest risk, but security holes in Java and Adobe products such as Flash.

Security is journey and you’ll never be done.  The hope is that your risk profile improves over time as more  of the environment is locked down, creating a restrictive rather than permissive infrastructure which makes services available by exception to the minimum extent necessary while balancing security and ease of use.   As I’ve said before, this is a Cold War at a time when Meaningful Use encourages more data sharing and breach reporting/regulatory penalties are increasingly severe.   All you can do is your best, given fixed resources and time.   And try to get some sleep.

John Halamka is Chief Information Officer of Beth Israel Deaconess Medical Center and blogs at Life as a Healthcare CIO.

ADVERTISEMENT

Submit a guest post and be heard on social media’s leading physician voice.

Prev

Every emergency medicine shift teaches something

April 28, 2012 Kevin 5
…
Next

Where do our wasted health dollars go to?

April 29, 2012 Kevin 6
…

Tagged as: Health IT

Post navigation

< Previous Post
Every emergency medicine shift teaches something
Next Post >
Where do our wasted health dollars go to?

ADVERTISEMENT

More by John Halamka, MD

  • The future of EHR: Here are 5 predictions

    John Halamka, MD
  • 10 crucial guidelines for health care IT

    John Halamka, MD
  • 5 health care IT tips for President Trump

    John Halamka, MD

More in Tech

  • Choosing the best EHR for your new behavioral health business

    Ram Krishnan, MBA
  • How AI, animals, and ecosystems reveal a new kind of intelligence

    Fateh Entabi, MD
  • Rethinking medical gatekeeping in the age of AI

    Justin Schrager, MD, MPH
  • The future of clinical care: AI’s role in easing physician workload

    Michael Wakeman
  • Why Grok 4 could be the next leap for HIPAA-compliant clinical AI

    Harvey Castro, MD, MBA
  • AI is already replacing doctors—just not how you think

    Bhargav Raman, MD, MBA
  • Most Popular

  • Past Week

    • Why taxing remittances harms families and global health care

      Dalia Saha, MD | Finance
    • How AI, animals, and ecosystems reveal a new kind of intelligence

      Fateh Entabi, MD | Tech
    • Why kratom addiction is the next public health crisis

      Muhamad Aly Rifai, MD | Meds
    • A physician employment agreement term that often tricks physicians

      Dennis Hursh, Esq | Finance
    • How just culture can reduce burnout and boost health care staff retention

      Olumuyiwa Bamgbade, MD | Physician
    • The hidden moral injury behind value-based health care

      Jonathan Bushman, DO | Physician
  • Past 6 Months

    • Forced voicemail and diagnosis codes are endangering patient access to medications

      Arthur Lazarus, MD, MBA | Meds
    • How President Biden’s cognitive health shapes political and legal trust

      Muhamad Aly Rifai, MD | Conditions
    • The One Big Beautiful Bill and the fragile heart of rural health care

      Holland Haynie, MD | Policy
    • Who gets to be well in America: Immigrant health is on the line

      Joshua Vasquez, MD | Policy
    • Why specialist pain clinics and addiction treatment services require strong primary care

      Olumuyiwa Bamgbade, MD | Conditions
    • The hidden health risks in the One Big Beautiful Bill Act

      Trevor Lyford, MPH | Policy
  • Recent Posts

    • How just culture can reduce burnout and boost health care staff retention

      Olumuyiwa Bamgbade, MD | Physician
    • Why embracing imperfection makes you truly unforgettable

      Osmund Agbo, MD | Physician
    • Affordable postpartum hemorrhage solutions every OB/GYN should know

      Frank I. Jackson, DO | Conditions
    • Why kratom addiction is the next public health crisis

      Muhamad Aly Rifai, MD | Meds
    • Why taxing remittances harms families and global health care

      Dalia Saha, MD | Finance
    • How are prostate exams done and why you shouldn’t avoid them

      Martina Ambardjieva, MD, PhD | Conditions

Subscribe to KevinMD and never miss a story!

Get free updates delivered free to your inbox.


Find jobs at
Careers by KevinMD.com

Search thousands of physician, PA, NP, and CRNA jobs now.

Learn more

Leave a Comment

Founded in 2004 by Kevin Pho, MD, KevinMD.com is the web’s leading platform where physicians, advanced practitioners, nurses, medical students, and patients share their insight and tell their stories.

Social

  • Like on Facebook
  • Follow on Twitter
  • Connect on Linkedin
  • Subscribe on Youtube
  • Instagram

ADVERTISEMENT

  • Most Popular

  • Past Week

    • Why taxing remittances harms families and global health care

      Dalia Saha, MD | Finance
    • How AI, animals, and ecosystems reveal a new kind of intelligence

      Fateh Entabi, MD | Tech
    • Why kratom addiction is the next public health crisis

      Muhamad Aly Rifai, MD | Meds
    • A physician employment agreement term that often tricks physicians

      Dennis Hursh, Esq | Finance
    • How just culture can reduce burnout and boost health care staff retention

      Olumuyiwa Bamgbade, MD | Physician
    • The hidden moral injury behind value-based health care

      Jonathan Bushman, DO | Physician
  • Past 6 Months

    • Forced voicemail and diagnosis codes are endangering patient access to medications

      Arthur Lazarus, MD, MBA | Meds
    • How President Biden’s cognitive health shapes political and legal trust

      Muhamad Aly Rifai, MD | Conditions
    • The One Big Beautiful Bill and the fragile heart of rural health care

      Holland Haynie, MD | Policy
    • Who gets to be well in America: Immigrant health is on the line

      Joshua Vasquez, MD | Policy
    • Why specialist pain clinics and addiction treatment services require strong primary care

      Olumuyiwa Bamgbade, MD | Conditions
    • The hidden health risks in the One Big Beautiful Bill Act

      Trevor Lyford, MPH | Policy
  • Recent Posts

    • How just culture can reduce burnout and boost health care staff retention

      Olumuyiwa Bamgbade, MD | Physician
    • Why embracing imperfection makes you truly unforgettable

      Osmund Agbo, MD | Physician
    • Affordable postpartum hemorrhage solutions every OB/GYN should know

      Frank I. Jackson, DO | Conditions
    • Why kratom addiction is the next public health crisis

      Muhamad Aly Rifai, MD | Meds
    • Why taxing remittances harms families and global health care

      Dalia Saha, MD | Finance
    • How are prostate exams done and why you shouldn’t avoid them

      Martina Ambardjieva, MD, PhD | Conditions

MedPage Today Professional

An Everyday Health Property Medpage Today
  • Terms of Use | Disclaimer
  • Privacy Policy
  • DMCA Policy
All Content © KevinMD, LLC
Site by Outthink Group

Leave a Comment

Comments are moderated before they are published. Please read the comment policy.

Loading Comments...