Intelligent Health.tech Issue 17 | Page 31

WITH INCIDENTS ON THE RISE , IT IS VITAL ORGANISATIONS WORK WITH THEIR SUPPLIERS TO IDENTIFY SUPPLY CHAIN RISKS AND
ENSURE APPROPRIATE SECURITY MEASURES ARE IN PLACE .
D I S S E C T I N G B U S I N E S S call to organisations . Document security makes a difference .
One of the causes of security risks from output management is that responsibility is often shared between departments . Procurement and facilities management teams often have a large level of output technology responsibility . However , these departments are often governed by price-driven key performance indicators ( KPI ) and lack data security skills . In the worst cases , some organisations allow business lines to form their own output device supply relationships .
For business technology leaders , the risk is perceiving output management as purely about printing . Whether printed on paper , an electronic tag , or a digital artifact , output matters and needs to be assessed and managed with the same high levels of cybersecurity as email , networks , databases and e-commerce systems .
A strategic approach
Ownership by a single team is not the answer for many organisations . Business outcomes are always a joint endeavour . It is more important that organisations have a strategic approach to output management that defines and reflects the business needs and security risks posed by the information contained therein .
Cybersecurity is beginning to be understood as a business risk that ranks alongside other threats to an organisation , such as the climate emergency and natural disasters . Output management needs to be understood along the same lines . Mature organisations are realising that cybersecurity is not solely the IT department ’ s , or the CISO ' s , problem but one that all members of the organisation play a role in tackling . Securing output has to follow the same path .

WITH INCIDENTS ON THE RISE , IT IS VITAL ORGANISATIONS WORK WITH THEIR SUPPLIERS TO IDENTIFY SUPPLY CHAIN RISKS AND

ENSURE APPROPRIATE SECURITY MEASURES ARE IN PLACE .

unnecessary printing or sharing of sensitive information . “ If you flag a document as confidential , then it cannot be printed , copied or sent on ,” he said .
Regarding security policy , Partridge adds : “ It is education , education , education and give the people in your organisation real-life examples because we all get complacent .”
Digitisation will continue to change business processes . Creation of digital and physical output will continue to be key to business processes . If overlooked , output management could be the open door that a cybercriminal is looking for and lead to significant damage to the business ' s finances and reputation . Output management , therefore , must be considered as part of the holistic strategy for making the business both more effective and secure .
Organisations cannot afford to consider output management as something outside of their Digital Transformation ambitions or the cybersecurity protections of the business . Creating an effective , secure IT landscape will require greater collaboration and a strategic approach to output management . �
“ Output management requires end-user administration to have strong capabilities in every discipline , such as database , networking and devices ,” Tucker said .
CIO Partridge agrees : “ Do your security basics and do them well .” He advises peers to use the security features in document creation tools so that security is set at the document level ; this will prevent
www . intelligenthealth . tech 31