E-health records a 'nightmare', says AusCERT

Powered by SC Magazine
 

Health records need to be more secure than bank data.

View larger image View larger image View larger image

See all pictures here »

The Government's plan to introduce electronic health records is a "nightmare" for security according to the head of industry group AusCERT

AusCERT boss Grahame Ingram said information security risks were amplified because of the highly sensitive nature of patient data held under the e-health scheme.

"It is a nightmare scenario," Ingram said. "That they think they have the security to safeguard the data is just a nightmare."

The Government had compared e-health security to systems used by major banks, but to Ingram, that fell short.

Bank security was not flawless, he said, and financial transactions were considered "compromised" -- a state that could not be extended to sensitive e-health records.

He said security should be thought of as damage mitigation not intrusion prevention because of the complexity of attacks.

"Banks examine risk profiles, they have accepted risk," he said. "If there was a better system out there to secure their data, I'm sure they would be using it."

Ingram warned that compromises of patient data were likely from insecure end user machines, and said there was a "misplaced trust" in technology.

"The end user attack capability is now fully deployable against the enterprise and is much harder to mitigate," he said.

Copyright © SC Magazine, Australia


 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 707

Vote