DRJ Fall 2019

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 32, Issue 3

Full Contents Now Available!

Friday, 17 February 2017 20:31

Legacy Software: Healthcare’s Weak Spot on Security?


Your hospital IT department has gotten tough on data security. It has strengthened firewalls, encrypted laptops, and instituted mobile device management that can remotely wipe mobile devices if they’re lost or stolen. Hospital policies require frequent password changes, and staff undergo annual training on HIPAA policies and procedures related to protected health information. Connections among IT systems required for interoperability between providers are secure and the hospital has a disaster recovery plan that includes data security. Think your hospital has data security buttoned down? Unless you take steps to sunset legacy IT systems, your hospital could remain vulnerable. Security, of course, is about the weakest link or path of least resistance. Oftentimes, the weakest link is an employee who leaves a password on a sticky note at the keyboard or clicks on a link in a bogus-but-innocent-looking email. But each connection point and each login represents a potential security risk to the