Analysis of data inside and outside of a healthcare facility can help identify when a breach is occurring and enable the organization to take proper mitigating actions, says Ken Bradberry, chief technology officer at Xerox Commercial Healthcare.
Intrusion and detection analytics tools, can spot broken patterns such as a rouge user created via a compromised ID from a directory of authorized, role-based users for a specific network or application, he explains. Running the directory against an analytics rules engine could spot anomalies.
Register or login for access to this item and much more
All Health Data Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access