SailPoint

Healthcare Providers Deeply Concerned with Insider Threats

If you were at HIMSS this past year, you would have noticed that many of the information security presentations focused on keeping outsiders out of the IT infrastructure. The looming questions that were not asked, however, include: what do you do once someone with malintent gets inside? What if the threat originated from an insider? And how would you mitigate insider risks beyond awareness and training? It turns out, these issues are on the minds of many healthcare providers according to a new study conducted by HIMSS and SailPoint. The findings resulted from surveying 100 healthcare IT professionals in roles ranging from individual contributors to executives.

What did HIMSS find? Here are a few key takeaways:

There are other data resulting from this survey, including feedback that indicates the growing concerns about addressing risks from insiders. You can view the report and register for a live webinar on June 27 regarding the findings here.

Who are the Insiders?

It’s not just your traditional FTEs. Today, provider organizations must look at insiders from the lens of access, rather than employed status. This becomes a bigger challenge particularly in a complex ecosystem where non-employed staff, vendors, partners and even volunteers may have varying levels of access to systems, applications and data stored in files.

Why Insiders Do What They Do

There are three primary reasons for why leak or breach occurs:

Regardless, the insider threat is not something that can be ignored. And here’s why.

Given these challenges, how does a healthcare provider organization effectively address the insider threat? We invite you to register for the live webinar on June 27, co-presented between HIMSS and SailPoint.