{"id":29719,"date":"2020-05-29T13:39:10","date_gmt":"2020-05-29T13:39:10","guid":{"rendered":"https:\/\/staging.consileon.de\/it-security\/"},"modified":"2023-03-30T17:20:27","modified_gmt":"2023-03-30T15:20:27","slug":"it-security","status":"publish","type":"post","link":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/","title":{"rendered":"IT security in hospitals"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-make-security-your-it-strategy\">Make security your IT strategy<\/h2>\n\n\n\n<p>According to <a href=\"https:\/\/www.swr.de\/report\/krankenakten-im-visier-von-hackern-wie-gut-sind-arztpraxen-und-krankenhaeuser-geschuetzt\/-\/id=233454\/did=23249614\/nid=233454\/1qulr2v\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Report Mainz<\/a>, a German politician was blackmailed in 2019 for his hacked health data. Similarly, patient data is a popular commodity on the darknet and trades higher than credit card information, according to Arzt Wirtschaft. When doctors&#8217; offices were connected to the telematics infrastructure in 2019, malware was already found on many systems to grab data. In 2018, three million patients in Norway found that their data had been hacked. Could Germany also be threatened by something like this? The likelihood is not so small, especially because cyberattacks increased significantly during the Corona crisis. It&#8217;s better not to be one of the victims &#8211; but to take control of your IT security from the very beginning.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-heart-of-your-digitization-the-security-strategy\">The heart of your digitization: the security strategy<\/h3>\n\n\n\n<p>And that&#8217;s right from the start! Security strategy will save you uncontrollable costs and sleepless nights. When developing your IT strategy, we plan your &#8220;safety net&#8221; right from the start, precisely because IT is becoming increasingly complex in the healthcare sector. Existing IT systems are being connected to more and more new solutions, potentially opening the door for a new attack. The security strategy therefore includes an analysis of the entire system landscape, including interfaces to their partners or new software. Especially the necessary, rapid digitization measures in the context of the Corona epidemic often still have vulnerabilities that must be quickly eliminated.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-it-security-is-not-a-measure-but-a-process\">IT security is not a measure, but a process<\/h3>\n\n\n\n<p>However, a custom-fit IT security strategy is not a one-time step. IT security is a process that begins with software selection and continues throughout its lifetime. The final IT risk can only be eliminated if your employees consistently apply the security strategy once it has been established. Unfortunately, it has been shown time and time again that the person sitting in front of the computer is the biggest security risk. Many successful attacks are due to the &#8211; usually unconscious &#8211; misconduct of individuals. The only thing that can help here is to train and sensitise your employees to the dangers of digital communication and networking. We offer both: learning and action.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Report Mainz, a German politician was blackmailed in 2019 for his hacked health data. Similarly, patient data is a popular commodity on the darknet and trades higher than credit card information, according to Arzt Wirtschaft. <\/p>\n","protected":false},"author":20,"featured_media":6325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"_acf_changed":false,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-29719","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-healthcare","post_format-post-format-image"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IT security in hospitals | | Consileon<\/title>\n<meta name=\"description\" content=\"According to Report Mainz, the blackmail of a German politician based on his hacked health data occurred in 2019.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT security in hospitals\" \/>\n<meta property=\"og:description\" content=\"According to Report Mainz, the blackmail of a German politician based on his hacked health data occurred in 2019.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Consileon Business Consultancy GmbH | Management- und IT-Beratung\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-29T13:39:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-30T15:20:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.consileon.de\/wp-content\/uploads\/2020\/05\/datenzugriff.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin Consileon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin Consileon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/\"},\"author\":{\"name\":\"Admin Consileon\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/142cd0b9e0d35d179685fd8ba7bac96e\"},\"headline\":\"IT security in hospitals\",\"datePublished\":\"2020-05-29T13:39:10+00:00\",\"dateModified\":\"2023-03-30T15:20:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/\"},\"wordCount\":358,\"image\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/datenzugriff.jpg\",\"articleSection\":[\"Healthcare\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2020\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/\",\"name\":\"IT security in hospitals | | Consileon\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/datenzugriff.jpg\",\"datePublished\":\"2020-05-29T13:39:10+00:00\",\"dateModified\":\"2023-03-30T15:20:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/142cd0b9e0d35d179685fd8ba7bac96e\"},\"description\":\"According to Report Mainz, the blackmail of a German politician based on his hacked health data occurred in 2019.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/datenzugriff.jpg\",\"contentUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/datenzugriff.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Codierung\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2020\\\/05\\\/29\\\/it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security in hospitals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#website\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/\",\"name\":\"Consileon Business Consultancy GmbH | Management- und IT-Beratung\",\"description\":\"Consileon ist eine Management- und IT-Beratung, die mit rund 450 Mitarbeitern Unternehmen aller Branchen, von lokalen Organisationen bis DAX-Konzernen, ber\u00e4t.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.consileon.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/142cd0b9e0d35d179685fd8ba7bac96e\",\"name\":\"Admin Consileon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/413893b2e1d850e21d87bf997783d4a97b882cc2d512006b5a8a3ec9b0aa8872?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/413893b2e1d850e21d87bf997783d4a97b882cc2d512006b5a8a3ec9b0aa8872?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/413893b2e1d850e21d87bf997783d4a97b882cc2d512006b5a8a3ec9b0aa8872?s=96&d=mm&r=g\",\"caption\":\"Admin Consileon\"},\"url\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/author\\\/it-support\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT security in hospitals | | Consileon","description":"According to Report Mainz, the blackmail of a German politician based on his hacked health data occurred in 2019.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT security in hospitals","og_description":"According to Report Mainz, the blackmail of a German politician based on his hacked health data occurred in 2019.","og_url":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/","og_site_name":"Consileon Business Consultancy GmbH | Management- und IT-Beratung","article_published_time":"2020-05-29T13:39:10+00:00","article_modified_time":"2023-03-30T15:20:27+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.consileon.de\/wp-content\/uploads\/2020\/05\/datenzugriff.jpg","type":"image\/jpeg"}],"author":"Admin Consileon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin Consileon","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/#article","isPartOf":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/"},"author":{"name":"Admin Consileon","@id":"https:\/\/www.consileon.de\/#\/schema\/person\/142cd0b9e0d35d179685fd8ba7bac96e"},"headline":"IT security in hospitals","datePublished":"2020-05-29T13:39:10+00:00","dateModified":"2023-03-30T15:20:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/"},"wordCount":358,"image":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2020\/05\/datenzugriff.jpg","articleSection":["Healthcare"],"inLanguage":"en-US","copyrightYear":"2020","copyrightHolder":{"@id":"https:\/\/www.consileon.de\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/","url":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/","name":"IT security in hospitals | | Consileon","isPartOf":{"@id":"https:\/\/www.consileon.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2020\/05\/datenzugriff.jpg","datePublished":"2020-05-29T13:39:10+00:00","dateModified":"2023-03-30T15:20:27+00:00","author":{"@id":"https:\/\/www.consileon.de\/#\/schema\/person\/142cd0b9e0d35d179685fd8ba7bac96e"},"description":"According to Report Mainz, the blackmail of a German politician based on his hacked health data occurred in 2019.","breadcrumb":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/#primaryimage","url":"https:\/\/www.consileon.de\/wp-content\/uploads\/2020\/05\/datenzugriff.jpg","contentUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2020\/05\/datenzugriff.jpg","width":1920,"height":1280,"caption":"Codierung"},{"@type":"BreadcrumbList","@id":"https:\/\/www.consileon.de\/en\/blog\/2020\/05\/29\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.consileon.de\/en\/"},{"@type":"ListItem","position":2,"name":"IT security in hospitals"}]},{"@type":"WebSite","@id":"https:\/\/www.consileon.de\/#website","url":"https:\/\/www.consileon.de\/","name":"Consileon Business Consultancy GmbH | Management- und IT-Beratung","description":"Consileon ist eine Management- und IT-Beratung, die mit rund 450 Mitarbeitern Unternehmen aller Branchen, von lokalen Organisationen bis DAX-Konzernen, ber\u00e4t.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.consileon.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.consileon.de\/#\/schema\/person\/142cd0b9e0d35d179685fd8ba7bac96e","name":"Admin Consileon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/413893b2e1d850e21d87bf997783d4a97b882cc2d512006b5a8a3ec9b0aa8872?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/413893b2e1d850e21d87bf997783d4a97b882cc2d512006b5a8a3ec9b0aa8872?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/413893b2e1d850e21d87bf997783d4a97b882cc2d512006b5a8a3ec9b0aa8872?s=96&d=mm&r=g","caption":"Admin Consileon"},"url":"https:\/\/www.consileon.de\/en\/blog\/author\/it-support\/"}]}},"_links":{"self":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts\/29719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/comments?post=29719"}],"version-history":[{"count":2,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts\/29719\/revisions"}],"predecessor-version":[{"id":68988,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts\/29719\/revisions\/68988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/media\/6325"}],"wp:attachment":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/media?parent=29719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/categories?post=29719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/tags?post=29719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}