By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

Elevate Your Style: Unleashing Trends, Embracing Elegance in Every Stitch.

RanaBeauty
  • Home
  • Accessories
  • Beauty
    • Beauty Products
  • Cosmetics
  • Health
  • Makeup
  • Fashion
    • Men’s Fashion
    • Women’s Fashion
  • Care
    • Skin Care
    • Hair Care
    • Personal Care
Reading: Why One Google Cloud Exec Thinks HHS’ New Cybersecurity Guidelines Are A Step In The Right Direction
Search
0

No products in the cart.

RanaBeautyRanaBeauty
0
Font ResizerAa
  • Home
  • Accessories
  • Beauty
  • Cosmetics
  • Health
  • Makeup
  • Fashion
  • Care
Search
  • Home
  • Accessories
  • Beauty
    • Beauty Products
  • Cosmetics
  • Health
  • Makeup
  • Fashion
    • Men’s Fashion
    • Women’s Fashion
  • Care
    • Skin Care
    • Hair Care
    • Personal Care
Have an existing account? Sign In
Follow US
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
RanaBeauty > Blog > Why One Google Cloud Exec Thinks HHS’ New Cybersecurity Guidelines Are A Step In The Right Direction

Why One Google Cloud Exec Thinks HHS’ New Cybersecurity Guidelines Are A Step In The Right Direction

docNIA
Last updated: 2024/02/11 at 5:16 PM
docNIA 4 Min Read
Share
Why One Google Cloud Exec Thinks HHS’ New Cybersecurity Guidelines Are A Step In The Right Direction
SHARE

Why One Google Cloud Exec Thinks HHS’ New Cybersecurity Guidelines Are A Step In The Right Direction

Cyberattacks remain a formidable threat to healthcare providers, with hackers’ tactics getting more sophisticated by the day. 

Policymakers are trying to combat this. For example, New York Governor Kathy Hochul released a proposed set of cybersecurity regulations in November that require hospitals to establish new policies and procedures to protect themselves from ever-intensifying cyber threats. And a couple weeks ago, HHS published guidance outlining voluntary cybersecurity performance goals for the healthcare sector. While this initial guidance is voluntary, these goals will likely be used to inform upcoming HHS rulemaking.

In its guidance, HHS outlined 10 key goals for strengthening providers’ cybersecurity: mandating basic cybersecurity training, mitigating known vulnerabilities, boosting email security, using multifactor authentication, ensuring strong encryption, requiring unique credentials, revoking credentials for departing workforce members, separating user and privileged accounts, establishing incident response plans, and vetting vendors’ cybersecurity.

These guidelines are a starting point toward a more secure and resilient healthcare system in the U.S., and others are adopting similar measures internationally, pointed out Taylor Lehmann, director of Google Cloud’s office of the CISO, as well as the former CISO of athenahealth and Tufts Medicine. But he also thinks these regulatory efforts must be coupled with industry collaboration and information sharing to drive real, long-term change.

“The benefit of the cyber performance guidelines is that it indicates where the ball is bouncing next, and what the standards and expectations are for what organizations should be working on. It may not be today, but what is on HHS paper will most likely become what is in the actual final rulemaking or new regulatory requirements that become law,” Lehmann explained.

Some hospitals are more prepared to achieve these cybersecurity goals than others. While many hospitals have already begun their digital transformations, there are plenty of others that are still using legacy IT systems.

The degree of readiness depends on the hospital’s size, funding and resources for an IT security team, Lehmann noted.

“While the essential goals may seem like base-level security — things like multi-factor authentication and using unique credentials — they’re clearly not being implemented properly, as these continue to be the leading causes of breaches in the industry,” he declared. “The basics aren’t always necessarily easy — they can actually be super hard.”

Across the board, hospitals should focus on strengthening their use of identity as a control mechanism, Lehmann recommended. Seeing that highlighted throughout HHS’ guidance was encouraging, he remarked.

Lehmann emphasized the importance of conducting penetration testing, as this can help healthcare organizations identify the high-impact, low-effort ways attackers can get in — and the equally beneficial yet simple remediations that need  to be put in place immediately.

“Test and fix until the organization achieves a baseline of security control that would allow it some breathing room to consider prioritizing voluntary goals, like HHS’ cybersecurity performance goals. Trust in systems, especially those that haven’t been assessed before, needs to be established regularly and continuously,” he said.

Penetration testing, red teaming and other forms of technical assessments provide a realistic view of what problems need to be fixed immediately, Lehmann explained. In his view, providers need to begin performing these processes regularly before more strategic conversations can occur.

Photo: JuSun, Getty Images

docNIA February 11, 2024 February 11, 2024
Share This Article
Facebook Twitter Print
Previous Article “The Name May Be ‘Neue’ but Their Problems are Old”: Will Bright Health’s Rebrand Save It? “The Name May Be ‘Neue’ but Their Problems are Old”: Will Bright Health’s Rebrand Save It?
Next Article Navigating Tomorrow’s Behavioral Health with Compassion and Innovation Navigating Tomorrow’s Behavioral Health with Compassion and Innovation
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

Ignite Your Style

Our mission is to bring you the freshest insights into the world of fashion, from the hottest runway trends to the most coveted street style looks.

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Never miss a beat when it comes to fashion

Copyright © 2024 Rana Beauty. All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?