Cybersecurity as it relates to perfusion

网络安全与灌注的关系

阅读:3

Abstract

Perfusionists must maintain strong digital security habits, know the inherent risks of devices in use, and have a healthy respect for the consequences of a security breach at a hospital. While perfusion has largely been able to operate without much interaction with cybersecurity experts, the relentless advancement of the digital age means that perfusionists cannot remain oblivious to the intersection of their devices and hospital digital security. This article provides a historical overview of healthcare cybersecurity with specific recommendations for perfusion teams looking to ensure best practices for protected health information (PHI). Critical recommendations include keeping physical copies of downtime procedures, routine practice of downtime procedures, discussion with the hospital information technology (IT) team to confirm perfusion-based asset lists, and the creation of an American Society of Extracorporeal Technology (AmSECT) standard or guideline regarding attention to cybersecurity.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。