Intelligent Health.tech Issue 24 | Page 61

U N D E R T H E M I C R O S C O P E
Kimberley : Another key area we focus on , besides the technical aspects , is recognising that some things will inevitably slip through , as staff are constantly using computers . We now have alerts that pop up for everything . Even I get frustrated sometimes when I can ’ t access certain things because of the security blocks in place .
We ’ ve put a lot of effort into educating staff about phishing , which is becoming increasingly difficult to keep up with . The sheer volume of attempts , from post office fraud to bank fraud , is overwhelming , and they ’ re incredibly clever in how they try to trick people . One thing we do is send staff updates on the latest threats , even if they aren ’ t relevant to their work environment . This also helps protect them at home .
We know we have to stay on top of these risks . OCI has provided us with a strong foundation , but we also rely on them to continually refine and update their security as hackers become more sophisticated in the future . While we ’ ve taken steps to safeguard ourselves now , the concern is how long that protection will last . I think this is a worry shared by everyone in healthcare . We ’ re protected for now , but for how long , I can ’ t say . That ’ s why we can ’ t afford to take our eyes off the ball . This is just the first layer of defence .
The next question is , with the integration of autonomous systems through OCI , how has the automation of security processes improved your ability to respond to potential cyberincidents ?
Rajiv : One key advantage of being on the cloud is that , as I mentioned , the multiple layers of protection safeguard our patient records and keep the data secure . In this regard , OCI provides a strong backbone that manages most of the security processes for us . However , we also have our own networks and data centres to consider .
For instance , we have a dedicated security person monitoring emails and classifying them . Once that ’ s done , the algorithm takes over , sorting emails into high-risk and low-risk categories , providing an additional layer of protection . We ’ ve also updated our antivirus system , which , while frustrating for some users , is essential for maintaining security .
Kimberley : We receive a report that shows how many events occurred on the website , including the number of attempted attacks and how many managed to get through . This data allows us to analyse trends and take action . What ’ s interesting is that , although I ’ ve been a CEO for a while , this is the first year that cybersecurity has become a formal agenda item in terms of reviewing these reports .
Cybersecurity has always been a priority for the C-suite and the board , but now we ’ re asking for exact details on the number of attempted attacks and how we ’ ve responded to them . It ’ s become a real-time concern that we ’ re fully aware of .
I believe keeping this issue front and centre is half the battle . When Rajiv comes in and requests additional funds for cybersecurity , the C-suite and the board should already be aware of the rising number of attacks . If we notice that fewer are being stopped , we ’ ll know we need to act . Staying on top of this is crucial , and this reporting process is one way to ensure that happens .
What role does real-time threat detection and autonomous systems within OCI play in improving data centre security and protecting against evolving cyberthreats in healthcare environments ?
Rajiv : Oracle is a leader in the database world , and with their autonomous databases , they offer significant advantages . These self-patching databases automatically address threats and enhancements without requiring human intervention . With OCI , this is a major benefit . We no longer need to play catch-up with patching ; it happens automatically and in real time . This ensures that we are always up to date , which is crucial for minimising threats – whether on phones , laptops , or large databases . Staying current is essential for security , and moving to the cloud provides this flexibility .
Just as physicians can save up to 30 % of their time with advancements like ambient listening , our IT team can also regain time to focus on improving our own networks and data centres . This enables us to enhance our overall security posture . �
We are also looking into Data Loss Prevention ( DLP ) for the coming year . This will help prevent users from copying sensitive data out of the system , especially patient records . Although we can ’ t stop someone from physically taking a picture of the screen , we can at least prevent the copying of PDFs or other sensitive files .
We ’ re exploring these types of automation to make it much harder to breach our systems . Additionally , the Machine Learning algorithms we use for classifying emails , managing the firewall , and handling extended detection and response ( XDR ) help prevent DDoS attacks . These are some of the automation tools we ’ re implementing to strengthen our cybersecurity .
www . intelligenthealth . tech 61