Assignment:
Discussion 1:
Information is the lifeblood of healthcare and volumes of data increases exponentially every day. Having good backup practices is important, but it is critical to have a firm written policy for backups.
• What should a backup policy describe?
• How often should a backup plan be updated?
• This discussion is intended to get you started on the Backup policy section for your upcoming Week 8 assignment, Cybersecurity Policy Catalog.
• Be sure to respond to at least one of your classmates' posts.
Discussion 2:
An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to access a facility network or the Internet. Physical security technologies deployed in a hospital are badge readers, electronic locks, cameras, and other monitoring systems. Each technology needs a baseline standard to describe which features should be implemented, its purpose, and the information generated by those devices.
• Discuss a hospital network and its components and decide what is necessary for an acceptable use policy and a physical security policy.
• Describe the purpose and scope for each policy.
• This discussion is intended to get you started on the acceptable use and physical security policy sections for your upcoming Week 8 assignment, Cybersecurity Policy Catalog.
• Be sure to respond to at least one of your classmates' posts.
Discussion 3:
Healthcare organizations struggle to maintain HIPAA-compliant remote access. Many attackers use email to exploit organizations. There is a substantial risk from remote devices used to access the VPN and from weak credentials being exploited to directly access the VPN.
• Focus on email and think of how email is processed as sent by a remote user and received by a local hospital.
• As the CISO, support this effort by describing an up to date policy to prevent a remote access breach of email through these devices.
• This discussion is intended to get you started on the remote access policy section for your upcoming Week 8 assignment, Cybersecurity Policy Catalog.
• Be sure to respond to at least one of your classmates' posts.