Health security

Surname 1
Health security
To enhance the privacy of health records, most healthcare facilities employ portal
security safeguards. These are aligned with passwords and controls that ensure that data is
maintained securely both physically and electronically. The portals inclusively have data
encryption and call for frequent audits to prevent hacking of the systems. Regarding the survey,
there is an approach to ensuring that patient records are secure from outsiders. This as however
been proven false due to the ransomware that took place May 17, 2017. The call for a reliable
system of Data storage came as a result of incompatibility of HIPAA rules in providing a
guideline on how healthcare facilities work.
Electronic Health Record
Medical service delivery has dramatically improved due to the innovation of electronic health
record (EHR). This is the presentation of a patient's medical history in digital form. EHR help
service providers to have a patient's history that enables them to make evidence-based decisions
in handling that patient. However, there have been several cases of a security breach that as lead
Surname 2
to consideration of cyber security as a significant risk instead of a technology problem. There
have been problems in executing and sustaining the systems in the form of technical, safety,
strategy issues to human interaction. Hackers in the ability to access patient details easily since
most of this information are sent unencrypted through cloud o the emails hence constituting as a
significant threat to the EHR. Evidently, in 2014 this case happened, and the hackers stole to 4.5
million of the patient data via a bleeding heart internet bug. Since most hospitals don’t take
technology as a priority hence setting low budgets on it meaning there is much inconvenience in
updating security patches. According to, (Ponemon, 2017) just 9% manufactures and 5% medical
providers test their medical devices annually. This explains the venerability of the system to the
Therefore one can't emphasize enough on the essence of security in EHR. Passwords
should come as a necessity when accessing information as this will limit access. Encryption is a
great necessity too as in so outsides will not understand data unless they access the necessary
decrypting key. Though audits, changes made in the systems can be noted and the time of
occurrence; therefore identification is made on who has access to patients information. Yearly
security risks check to ensure the strength and vulnerability of the systems will also come in
handy. Anti-virus software's are vital as the shield devices from attacks and should frequently be
Protecting Medical Records
Several ways are to be observed to ensure the security of medical records with the current
internet era. Inclusively use of unique account IDs allocated by the system administrator to
specific medical practitioners, (Koegler, 11). Fundamentally with this technology, the
Surname 3
unencrypted passwords change after a duration of set time. This makes it had for intrudes to get
into patient medical records. The location-based software is another technology that is used to
ensure the security of the medical records (Sametinger, 76). In case the administrator realises that
the data might be being accessed by intruders, he creates a firewall that prevents the access.
Through internal local area networks (LANs) medical personnel are viewed on the location of
data access and the information being viewed via information servers. Steps used by medical
practitioners to access information should be tracked for security purposes regardless of where
they are obtaining the data (Koegler, 11).
Use of Anti-virus in healthcare organisation in protecting patient records is another
technology that is being employed in health security. This helps in detecting any intrusion into
the system (Varshney, 119). Hence without authorisation, one is not able to access the system
and this will enhance medical records security. With limited and controlled access that comes to
anti-virus, the organization is able to plan for unexpected concerning intruders and any other
hospital staff who is not allowed to access information from the medical devices (National
Research Council, 87).
Healthcare Security Block Chain
The revolutionised of the healthcare technology is the blockchain technology. Though being at
it growth stage, it has gained trust among some medical practitioners. In creating an audited trail
of events in the peer network of access locations built, this technology is reliable in tracking
down hackers and intruders.
Surname 4
Blockchain ensures that patients date is presented in a way that it's not possible to delete, add or
change without the user allowing it. Hence it's possible to detect changes in data presented. With
blockchain also, decentralization of central authority is important for data that is presented to be
checked. Hence verification is enhanced through consensus of many users within the network.
The technology behind it is ensuring that any data breach by default of the electron approach
used previously is solved.
The system ensures that every transaction is recorded and is restricted to be shared by other
computers through a network called nodes. Then all the information combined together to form
blocks in sort of traditional computer database. All the information is hence time stamped to
prevent any breach. The stamping is usually done on complete bricks as this avoids duplicate
entries. These blocks are the shared across the computer networks to ensure the security and
privacy of patient's data.
Blockchain technologies ensure a description of step by step transactions through a system of
computer codes by using smart contracts. This provides that patients have ownership of their
EHR, therefore, can access health care providers via their original agreements. Notifications are
sent to clients if any data is updated to their system. The client, if they notice any tampered
details and reject the update thus data security. The fact that information is anchored to a public
domain is an excellent advantage to ensuring patient data security and that the patient has to
confirm the data presented. So to say, successful implementation of this technology in
healthcare records will be a perfect way to solve security concerns on digital healthcare records.
Surname 5
Work cited.
Alcazar, Vincent. "Data You Can Trust Blockchain Technology." Air & Space Power Journal,
vol. 31, no. 2, Summer2017, pp. 91-101. EBSCOhost,
Koegler, Scott. “Securing medical devices in the age of the IoT” Security intelligence. 2017; 1-
National Research Council. For the record: protecting electronic health information. National
Academies Press, 1997; 82-105
Ponemon Institute. (2017). An Industry Under Attack and Unprepared to Defend. Medical
Device Security.
Siwicki, B. (2017). Most significant EHR challenges for 2018: security, interoperability,
clinician burnout. HealthcareITNews.
Woodside, Joseph M., et al. "Blockchain Technology Adoption Status and Strategies." Journal
of International Technology & Information Management, vol. 26, no. 2, Apr. 2017, pp.
65-93. EBSCOhost,

Place new order. It's free, fast and safe

550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.