Intelligent CIO Africa Issue 56 | Page 69

t cht lk

t cht lk

Since many IT users in the healthcare sector have administrative rights on the respective end devices , access to applications and interfaces should be particularly protected .
Can you tell us about Matrix42 HEALTHCARE DATA and how it assists healthcare organisations ?
Matrix42 HEALTHCARE DATA offers a holistic and integral solution for the protection of IT systems and patient data .
is recommended here , which automatically detects and eliminates anomalies on the basis of access logging . Access to data such as the emergency file should also be more strongly protected .
How can organisations increase patient data protection despite reduced use of IT resources ?
Data security can in many cases be designed built-in and on-the-fly . For example , a new system can be automatically equipped with hard disk encryption and multi-factor authentication during initial installation . Application control does not have to be regarded as a stand-alone solution , but manages itself automatically if , for example , software retention is combined with application control using the Trusted Installer function .
This means that users are only allowed to run applications that have been approved and rolled out by the IT department via software distribution . Encryption of data movement and storage is best done with filebased on-the-fly encryption on local folders , network paths , cloud and USB storage .
For example , the transfer of data for the cancer registry can also be automated , digitised and secured , with the export process of the data encrypted in the background right away .
Based on years of cooperation with numerous healthcare organisations , a perfect package was created that protects patient data and co . according to the so-called C . A . F . E . ( Control , Audit , Filter , Encryption ) principle . These protective measures can be implemented without major administrative effort and user training – everything runs as usual , only secure .
What best practice advice would you offer IT managers on taking a proactive approach to protecting their sensitive data ?
In the first step , it is important to create a situation picture of the current IT security situation .
Based on this , the following questions can be answered :
• Which interfaces ( USB , cloud , network ) are required by users ?
• What data volumes and types are transported ?
• When do most accesses take place ?
Based on the data obtained , it is then possible to show which interfaces and applications must continue to be permitted for which purposes , whether they need to be encrypted and what typical user behaviour looks like .
If user behaviour deviates from the norm , data losses can be made transparent and traced more quickly . It is precisely these simple measures that are enormously important in the course of data protection regulations such as the EU GDPR , CCPA , but also ISO2700x . p
www . intelligentcio . com INTELLIGENTCIO AFRICA 69