Healthcare News & Insights

How to promote accessibility in healthcare cybersecurity

The more accessible healthcare information is, the more value it provides to patients and providers alike. But much of this information is sensitive, privileged or regulated, making it highly vulnerable when traveling in and out of networks. In this guest post, David Wagner, president and CEO of an email security company, details how to promote accessibility in healthcare cybersecurity.


The healthcare industry suffers a cybersecurity conundrum: While effective healthcare administration depends on the efficient exchange of this information with trusted vendors and other third parties, employees are often a source of security vulnerability.

In fact,almost half of all healthcare breaches in the first half of 2017 were caused by insiders, that concern is justified.

Problem of accessibility in cybersecurity

While the difficulties healthcare organizations face in the cybersecurity realm aren necessarily distinct to that industry, those enterprises are pulled in two very different directions that make their cybersecurity efforts more difficult: patient care and patient protection.

The most important aspect of people lives is their own health and the health of their loved ones. That why the core mission of hospitals, doctors and treatment centers across the country is preserving patient health and foregrounding care. It makes sense IT may be a lower priority for senior leaders. Where budget constraints are a constant concern, those leaders often focus on treatment technologies as opposed to IT, and while that certainly understandable, it unfortunately doesn mitigate the vulnerability such a focus induces.

Yet healthcare organizations do understand the need for more comprehensive cybersecurity. In response, many have implemented protections to address some of the lingering concerns and prevent data breach fallout, such as huge fines, long-term penalties and damaged public trust through the U.S. Department of Health and Human Services™ śWall of Shame.ť If users aren committed to using those protections consistently, though, they undermine even the best efforts of an organization.

Healthcare employees are already bombarded with user experienceť in cybersecurity is a fairly recent one. Older IT systems often require mazes of inputs and commands, all made worse by the fact that legacy systems don receive the updates and support required for today ever-evolving cyberattack landscape. Now, newer tools for cybersecurity are built with the needs of both back-end administrators and front-end users in mind. IT leaders and teams who upgrade their systems can help increase compliance from employees.

  • Rely on cloud providers: Because cloud companies compete to serve large numbers of users with greater ease, vendors work hard to optimize accessibility. In general, cloud-based tools are designed to be as intuitive and unobtrusive as possible so implementation is easy. Certainly, not all vendors are equal, but most of them will offer a better user experience than an on-premises solution.
  • Protect with automation: Anytime a cybersecurity tool requires users to choose where and how protection is applied, you leave your organization open to mistakes and risks. By using automatic policies and focusing security efforts on highly vulnerable business tools like the email inbox, you can mitigate the greatest amount of risk and decrease the chance for user mistakes or workarounds.
  • Accessibility and technical tools to enhance it are important, but employee buy-in must stay in focus as well. Users should be eager “ not just able “ to protect data to the fullest extent. When employees understand how catastrophic a breach would be both personally and organizationally, they become more committed to following policies and procedures to the letter. A combination of education, training and testing with easy-to-use next-generation tools will help ensure cybersecurity processes are seamless and applied throughout an information ecosystem, making accessibility standardized, simplified and streamlined.

    Zix, a leader in email security, and has more than 25 years of experience in the IT security industry.

    Subscribe Today

    Get the latest and greatest healthcare news and insights delivered to your inbox.