health information security session 03 : best practise in information security

14
Dr. Lasantha Ranwala MBBS, Msc- Biomedical Informatics Cert. in Ethical Hacking & Cyber Forensic Medical Officer Health Informatics Best practices of information security management Health Information Security Session 03:Best Practices of Informati Security Management

Upload: lasantha-ranwala

Post on 16-Apr-2017

193 views

Category:

Healthcare


0 download

TRANSCRIPT

Page 1: Health Information Security Session 03 : Best practise in information security

Dr. Lasantha Ranwala MBBS, Msc- Biomedical InformaticsCert. in Ethical Hacking & Cyber Forensic

Medical Officer Health Informatics

Best practices of information security management

Health Information Security Session 03:Best Practices of Information

Security Management

Page 2: Health Information Security Session 03 : Best practise in information security

“Cyber security is not just about technology”

Page 3: Health Information Security Session 03 : Best practise in information security

Defence in Depth

• concept in which multiple layers of security controls (defence) are placed throughout an information technology (IT) system.

• Its intent is to provide redundancy in the event of a security control fails or a vulnerability is exploited.

• cover aspects of personnel, procedural, technical and physical for the duration of the system's life cycle.

Page 4: Health Information Security Session 03 : Best practise in information security

Defence in Depth continu......

Page 5: Health Information Security Session 03 : Best practise in information security

Defence in Depth continu......

Page 6: Health Information Security Session 03 : Best practise in information security

Security Controls

1. Physical control2. Technical control3. administrative control

Page 7: Health Information Security Session 03 : Best practise in information security

1. Physical Controls

Implementation of security measures in a defined structure used to defend or prevent unauthorized access to sensitive material.

e.g.: • Closed-circuit surveillance cameras• Motion or thermal alarm systems• Security guards• Picture Ids

Page 8: Health Information Security Session 03 : Best practise in information security

2.Technical Controls

• Use of technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network.

• e.g.:– Encryption– Access control lists (ACLs)– File integrity auditing software

Page 9: Health Information Security Session 03 : Best practise in information security

Administrative Controls

• Administrative controls define the human factors of security. • It involves all levels of personnel within an organization and

determines which users have access to what resources and information by such means as:

• e.g.:– Information Security policy– Training and awareness– Disaster preparedness and recovery plans

Page 10: Health Information Security Session 03 : Best practise in information security

Best Practises - Protect your network

1. Create Specific Access Controls– Minimum user privileges

2. Collect Detailed Logs– for security and troubleshooting purposes– backup logs

3. Maintain Security Patches– make sure your software and hardware security is up to date

4. Educate and Train Your Users– users will always be your weakest link

Page 11: Health Information Security Session 03 : Best practise in information security

5. Policies and Guidelines– Clear User Policies for New Employees and Vendors– Security policy and guidelines for staff

6. User Activity Monitoring7. Data Breach Response Plan8. Back up and Restore

Best Practises - Protect your network Contin..

Page 12: Health Information Security Session 03 : Best practise in information security

Best Practices -Protect ourself

1. Install anti-virus software and keep all computer software patched and updates.

2. Use a strong password– Password Vs Pass phrase

3. Log off public computers/Lock your computer4. Keep personal information safe

– Be wary of suspicious e-mails– Use secure Wi-Fi connections– properly delete any personal information before sell or dispose of

your hardware

Page 13: Health Information Security Session 03 : Best practise in information security

5. Limit social network information– you should be wary about how much personal information

you post.6. Download files only from trusted souses7. Regular data Back up

Page 14: Health Information Security Session 03 : Best practise in information security

Thank you

@hlabcrewhealthlabcrew.lk