E-health records a 'nightmare', says AusCERT

Powered by SC Magazine
 

Health records need to be more secure than bank data.

View larger image View larger image View larger image

See all pictures here »

The Government's plan to introduce electronic health records is a "nightmare" for security according to the head of industry group AusCERT

AusCERT boss Grahame Ingram said information security risks were amplified because of the highly sensitive nature of patient data held under the e-health scheme.

"It is a nightmare scenario," Ingram said. "That they think they have the security to safeguard the data is just a nightmare."

The Government had compared e-health security to systems used by major banks, but to Ingram, that fell short.

Bank security was not flawless, he said, and financial transactions were considered "compromised" -- a state that could not be extended to sensitive e-health records.

He said security should be thought of as damage mitigation not intrusion prevention because of the complexity of attacks.

"Banks examine risk profiles, they have accepted risk," he said. "If there was a better system out there to secure their data, I'm sure they would be using it."

Ingram warned that compromises of patient data were likely from insecure end user machines, and said there was a "misplaced trust" in technology.

"The end user attack capability is now fully deployable against the enterprise and is much harder to mitigate," he said.

Copyright © SC Magazine, Australia


 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1052

Vote