Surname 2
to consideration of cyber security as a significant risk instead of a technology problem. There
have been problems in executing and sustaining the systems in the form of technical, safety,
strategy issues to human interaction. Hackers in the ability to access patient details easily since
most of this information are sent unencrypted through cloud o the emails hence constituting as a
significant threat to the EHR. Evidently, in 2014 this case happened, and the hackers stole to 4.5
million of the patient data via a bleeding heart internet bug. Since most hospitals don’t take
technology as a priority hence setting low budgets on it meaning there is much inconvenience in
updating security patches. According to, (Ponemon, 2017) just 9% manufactures and 5% medical
providers test their medical devices annually. This explains the venerability of the system to the
hackers.
Therefore one can't emphasize enough on the essence of security in EHR. Passwords
should come as a necessity when accessing information as this will limit access. Encryption is a
great necessity too as in so outsides will not understand data unless they access the necessary
decrypting key. Though audits, changes made in the systems can be noted and the time of
occurrence; therefore identification is made on who has access to patients information. Yearly
security risks check to ensure the strength and vulnerability of the systems will also come in
handy. Anti-virus software's are vital as the shield devices from attacks and should frequently be
updated.
Protecting Medical Records
Several ways are to be observed to ensure the security of medical records with the current
internet era. Inclusively use of unique account IDs allocated by the system administrator to
specific medical practitioners, (Koegler, 11). Fundamentally with this technology, the