Automation in health care The health care information technology system is predisposed to various risks and threats among other vulnerabilities. The situation may worsen if such vices are channeled towards the information system targeting patients and employees. Some of the risks, threats, and vulnerabilities include and are not limited to accessing public internet without authority, hacking resulting to penetration of IT infrastructure, and fire torching primary data (Rodrigues 56).
Due to this, health-care centers have put in place web-based patient and physician portals to enable visibility in the organizations financial and clinical data. The physician portal is normally used for various purposes including viewing radiology and laboratory results, obtaining electronic medical records and completing charts. The patient portal enables accessing patient’s information including test results, billing information, prescribed medication, scheduled appointments, and medical conditions (Gentile 69).
The wireless network policy enables the use of wireless network infrastructure to handle patient’s information systems. This kind of system with proper coding plays a significant role in ensuring that there is integrity, confidentiality, and reliable availability of patient’s information. If proper securing of information is not enhanced under such circumstances, it would greatly affect the organizations internal systems (Brenner n.p). The wireless network system ensures that proper regulations and procedures are put in place to handle the patient’s information systems. These include performance logs and network security (Lowe and Scott 23).
Notable tools employed in the identification of healthcare related online risks include the Web inspect scanner by Hewlett, Web vulnerability scanner by Acunetix and the watchfire Appscan by IBM. Application of the above systems would then go ahead in selective selections of authentic databases, passwords, and user identities as far as the internet security is concerned (Gentile 41).
Works Cited
Brenner. Kerberos: Authentication with some drawbacks. Web. 21 March 2014.
Gentile, Michael. The Ciso Handbook: A Practical Guide to Securing Your Company. New York: Auerbach Publications, 2005. Print.
Lowe, Niesel., & Scott, W. Leon. Medical Device Reporting for User Facilities. Retrieved November 7, 2012. Web. 21 March 2014.
Rodrigues, James. Health Information Systems: Concepts, Methodologies, Tools and Applications. New York: Idea Group Inc (IGI), 2009. Print.
Suchih Ernest Chang, C. B. (n.d.). Organisational Factors to Effectiveness of Implementing Information Security Management. Web. 21 March 2014.