fermer
fermer
Le réseau de demain
Le réseau de demain
Planifiez votre chemin vers un réseau plus rapide, plus sûr et plus résilient, conçu pour les applications et les utilisateurs que vous prenez en charge.
          Essayez Netskope
          Mettez la main à la pâte avec la plateforme Netskope
          C'est l'occasion de découvrir la plateforme Netskope One single-cloud de première main. Inscrivez-vous à des laboratoires pratiques à votre rythme, rejoignez-nous pour des démonstrations mensuelles de produits en direct, faites un essai gratuit de Netskope Private Access ou participez à des ateliers dirigés par un instructeur.
            Un leader sur SSE. Désormais leader en matière de SASE à fournisseur unique.
            Un leader sur SSE. Désormais leader en matière de SASE à fournisseur unique.
            Netskope fait ses débuts en tant que leader dans le Magic Quadrant™ de Gartner® pour le SASE à fournisseur unique.
              Sécuriser l’IA générative pour les nuls
              Sécuriser l’IA générative pour les nuls
              Découvrez comment votre organisation peut concilier le potentiel d'innovation de l'IA générative avec des pratiques robustes en matière de sécurité des données.
                Prévention des pertes de données (DLP) pour les Nuls eBook
                La prévention moderne des pertes de données (DLP) pour les Nuls
                Obtenez des conseils et des astuces pour passer à un système de prévention des pertes de données (DLP) dans le nuage.
                  Réseau SD-WAN moderne avec SASE pour les nuls
                  SD-WAN moderne pour les nuls en SASE
                  Cessez de rattraper votre retard en matière d'architecture de réseau
                    Identification des risques
                    Advanced Analytics transforme la façon dont les équipes chargées des opérations de sécurité utilisent les données pour mettre en œuvre de meilleures politiques. Avec Advanced Analytics, vous pouvez identifier les tendances, cibler les domaines préoccupants et utiliser les données pour prendre des mesures.
                        Les 6 cas d'utilisation les plus convaincants pour le remplacement complet des anciens VPN
                        Les 6 cas d'utilisation les plus convaincants pour le remplacement complet des anciens VPN
                        Netskope One Private Access est la seule solution qui vous permet d'abandonner définitivement votre VPN.
                          Colgate-Palmolive protège sa "propriété intellectuelle" "grâce à une protection des données intelligente et adaptable
                          Colgate-Palmolive protège sa "propriété intellectuelle" "grâce à une protection des données intelligente et adaptable
                            Netskope GovCloud
                            Netskope obtient l'autorisation FedRAMP High Authorization
                            Choisissez Netskope GovCloud pour accélérer la transformation de votre agence.
                              Faisons de grandes choses ensemble
                              La stratégie de commercialisation de Netskope privilégie ses partenaires, ce qui leur permet de maximiser leur croissance et leur rentabilité, tout en transformant la sécurité des entreprises.
                                Solutions Netskope
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) fournit aux clients de puissants outils d'intégration pour tirer parti des investissements dans leur dispositif de sécurité.
                                  Support technique de Netskope
                                  Support technique de Netskope
                                  Nos ingénieurs d'assistance qualifiés sont répartis dans le monde entier et possèdent des expériences diverses dans les domaines de la sécurité du cloud, des réseaux, de la virtualisation, de la diffusion de contenu et du développement de logiciels, afin de garantir une assistance technique rapide et de qualité
                                    Vidéo Netskope
                                    Formation Netskope
                                    Grâce à Netskope, devenez un expert de la sécurité du cloud. Nous sommes là pour vous aider à achever votre transformation digitale en toute sécurité, pour que vous puissiez profiter pleinement de vos applications cloud, Web et privées.

                                      Break Up the IT Block Party: Facilitating Healthcare Collaboration

                                      Aug 31 2021

                                      Healthcare organizations still seem to think that blocking all access to unapproved cloud storage or cloud collaboration tools means that they’re preventing leakage of sensitive information. But as the old saying goes, “Data flows like water.” Eventually, it’s going to find the holes and escape. 

                                      Even if a healthcare IT system has water-tight data controls, that’s not the only goal within the organization—and not even the most important one. When blocking prevents a clinician from doing their job to the best of their abilities, data is especially hard to contain.

                                      The need for more, and better, collaboration in healthcare 

                                      Today, a lot of health organizations are working to become more collaborative across doctors and teams to improve the quality of care and improve outcomes for patients. If I were a patient undergoing treatment, I would want to make sure that my primary care physician, my specialists, and all the different services and facilities involved across the medical treatment ecosystem would have access to all the necessary information to help resolve my illness. In fact, that’s one of the main transformative benefits that digital tools have brought to medicine in recent years.

                                      Patients expect that all the different care providers they need are working together to solve their health problems. But the whole idea of blocking data sharing as a default institutional policy limits the ability for healthcare providers to operate as a nimble, coordinated unit. In order to collaborate, sensitive patient data needs to be shared—across departments and oftentimes outside the institution. And this kind of sharing has historically been a problem for healthcare security. Security teams tend to block first and ask questions later.

                                      Managing data risks shouldn’t be all or nothing

                                      Why would we want to prevent sharing of patient information among the people who need to use it? Blocking collaboration tools or access to data sources outside the organization’s control might limit the risk of data loss, but it also sets us back in the core objective of treating patients with the best available resources.

                                      Here’s a good example. Let’s say the only managed cloud application for collaboration at our hospital is Microsoft OneDrive. The hospital’s security team blocks access to all other services (e.g., Dropbox, Google Drive, Box) to ensure that private patient data/PII can’t be exfiltrated via those tools. But what if a doctor is collaborating with a major research university on a specialized course of treatment, and that institution only allows access via Dropbox? 

                                      So, now we have a problem. Rigid data blocking policies are hampering cross-institutional collaboration and the best treatment for a patient, whether the data in question contains sensitive information or not. Maybe it’s just communications back and forth between the hospital and the university. Shouldn’t they be automatically allowed to collaborate across different cloud platforms under benign circumstances, rather than wasting time for one side or the other to request and wait for an approved exception from IT/security?

                                      In this case, the hospital says that clinicians can’t go to Dropbox and the university says researchers can’t go OneDrive because of overly rigid data policies. And rigid systems break—doctors who are committed to patient care will find workarounds—via Shadow IT, where data may be moving outside the institution anyway. We need to stop blocking everything for the sake of transparent, collaborative patient care. The only way we can do this is to allow providers to do the things that they need to do.

                                       “Allow” is the new “block”

                                      Modern healthcare organizations can start down the path of facilitating cooperative care by first gaining visibility into the data and the users who are seeking access to the cloud and collaboration tools. Once we have visibility, then we can apply granular controls around what users can and can’t do based on the content of the file and based on the action that they’re trying to make. 

                                      Back to the previous example of the hospital working with the research university. We can apply a group policy that allows our hospital clinicians to go to the university’s Dropbox account to view or download shared research findings, but the policy may block them from being able to upload anything. Or we can take it a step further and say our clinicians can also upload files—unless they contain protected health information (PHI) or personally identifiable information (PII) data. If that attempt is made, security controls would automatically block the user from being able to send out these specific files.

                                      By establishing visibility and implementing policy-based granular controls, the organization can move forward with transparent collaboration—whereas before, the universal block policy left everyone at a standstill.

                                      The challenge of multiple user instances

                                      Another thing that many hospitals don’t realize is that by allowing their users to go to Office 365 or Google Workspace, those users could potentially be going to another instance of those cloud applications. 

                                      To use another common example, let’s say you’re a doctor on contract with a local hospital, but you also have your own private practice. You may come in and access your hospital-sanctioned instance of Office 365—but one day, you also need access to your private practice Office 365 instance to check on something else. By allowing users into Office 365 as a default policy, the hospital very often isn’t able to see which instance you’re actually accessing. You could be connecting to reference test results for an outside patient, or you could be uploading patient PII. The hospital may not be able to see enough to know what’s actually transpiring—let alone do anything to control it.

                                      So how can hospitals gain visibility to discern a doctor’s private Office 365 instance from one that’s managed to use within the hospital? They need security with instance-aware visibility and granular controls. Policies can be set so that a contractor can come into the hospital, view their private instances for reference, but they can’t upload anything. Or maybe just not anything that contains sensitive or private information. 

                                      Security that enables this kind of adaptive trust is what healthcare needs to embrace in order to make flexible collaboration and appropriate information sharing possible—without introducing undue risks to patients or institutions.

                                      The block party is over: Secure collaboration starts today

                                      It’s important to remember, data flows like water—it will find any available gap to escape. Clinicians will find ways to bypass any security controls that appear to get in the way of their primary objective—providing patients with the best possible care and saving lives.

                                      Security for healthcare now needs to focus on visibility and control so conversations can shift from just a standard “no”  into policies that mitigate risks without inhibiting teamwork. Ten years from now, healthcare CISOs are going to look back and say, “Remember when we used to just block everything?” To serve patients and save lives, that evolution needs to start today. And fortunately, there are already security solutions for transparent visibility and granular control available to help make it possible.

                                      This article was originally published at Healthcare IT Today

                                      author image
                                      Damian Chung
                                      Damian Chung is a cybersecurity leader with over ten years of security experience in healthcare. Damian is responsible for corporate security tools and processes.
                                      Damian Chung is a cybersecurity leader with over ten years of security experience in healthcare. Damian is responsible for corporate security tools and processes.

                                      Restez informé !

                                      Abonnez-vous pour recevoir les dernières nouvelles du blog de Netskope