By |February 26th, 2019|Blog|0 Comments

Clearwater CyberIntelligence Institute® IRM | Analysis™ Bulletin #2

Clearwater delivers cyber risk management solutions to hundreds of healthcare delivery organizations and their partners. The enormous data set of cyber risk information stored in our IRM|Analysis™ database enables us to capture deep insights surrounding current cyber threats and identify trends that will help inform and prepare organizations to Manage Cyber Risk Right.

Clearwater’s IRM|Analysis™ software facilitates and strengthens an organization’s cyber risk management program by providing an automated, scalable process for assessing, remediating and monitoring the security risks to the organization’s critical business systems and sensitive data while maintaining the evidence necessary for an audit or investigation. The Clearwater CyberIntelligence Institute, using its advanced analytics and data mining capabilities, has discovered significant patterns from our database which has been populated by organizations over the last six years and contains millions of data risk records from hospitals, Integrated Delivery Networks (IDNs) and business associates.

 

Common Security Weaknesses Found In Laptops  For Hospitals & Health Systems

Laptops quickly come to mind when security leaders think about potential vulnerabilities for their organization. They are highly portable, can be accessed remotely, and are at high risk for theft.

Should laptops be the number one concern of information risk management leaders? Let’s see what the data says.

CCI™ analyzed high and critical risks facing hospitals and health systems found in our database and summarized them based on Clearwater’s comprehensive method of evaluating administrative, technical, and physical vulnerabilities. Based on this analysis, we discovered that laptops, because of their vulnerabilities, rank 6th among sources of risk.

Let’s explore the top vulnerabilities putting laptops data at risk for hospitals and health systems:

  • Endpoint Data Loss
  • Excessive User Permissions
  • Dormant Accounts

 


Clearwater CyberIntelligence Institute® IRM _ Analysis™ Infographic #2      Clearwater CyberIntelligence Institute® IRM _ Analysis™ Infographic #2

 

Select the button below to download the CyberIntelligence™ Insight Bulletin and Infographic.

Avatar