Skip to content
Home » Explore » “What security measures are required for “medical DX”? Held a webinar on the theme

“What security measures are required for “medical DX”? Held a webinar on the theme

“What security measures are required for “medical DX”? Held a webinar with the theme “ ​
Magicemi Co., Ltd. Press release: September 27, 2024 “What security measures are required for “medical DX”? Held a webinar on the theme Majisemi Co., Ltd. asks, “What security measures are required for medical DX? We will be holding a webinar on the theme.
https://prcdn.freetls.fastly.net/release_image/54842/2766/54842-2766-a32e8f462ade9560ac35cac9f71c7269-1280×720.jpg

Click here for details and to apply ​ ■ Medical institutions targeted by ransomware must strengthen security due to revised guidelines Digital transformation (DX) is currently
progressing in many industries and industries. Similarly, the medical industry is accelerating the use of ICT in order to improve
operational efficiency in preparation for the introduction of online qualification confirmation, which will become mandatory from April 2023, and overtime regulations for doctors in 2024. Masu. On the other hand, the number of security incidents in which medical institutions are targeted by cyber attacks such as “ransomware attacks” is rapidly increasing. There are also reports that people have actually suffered great damage from the infection. Under these circumstances, the Ministry of Health, Labor and Welfare formulated the “Guidelines for Information Systems in the Medical Field Version 6.0” in May 2023 as a guideline for security incident countermeasures including
cyber-attacks in the medical industry, and established concrete measures for information security. It describes the requirements regarding. Security measures are now required in all medical institutions. ■“EDR” is becoming increasingly necessary as a countermeasure against cyber attacks, but there are also operational issues The latest version of the guidelines, version 6.0, indicates that from the perspective of network security, a combination of “Zero Trust thinking” should be taken in addition to the traditional perimeter defense type. We recommend security measures based on the idea of ​​“no trust” (zero trust) in those who access the IT assets and information that should be protected, and specifically include measures such as internal threat monitoring and “EDR (Endpoint Detection and Response).” It is clearly stated that it is effective to take the following steps. By introducing EDR, it is possible to quickly detect threats that have invaded internal systems and take countermeasures before actual damage occurs. Furthermore, even in the unlikely event that an incident occurs, EDR has been shown to be effective in quickly identifying the infection route and scope of impact. On the other hand, EDR solutions can be expensive and can be a hurdle to implementation. Additionally, effectively operating EDR requires specialized knowledge and skills, and it is necessary to incorporate appropriate operational processes to quickly respond after a threat is detected. ■Momentum is growing for “system infrastructure innovation” to optimize IT costs Cyber ​​attacks have become a threat to the business continuity of medical institutions, but in the medical industry, where human life is the top priority, security measures are never a high priority in IT investment. As a result, vulnerable old system devices can be attacked. Under these circumstances, many medical institutions are working on “renovating their system infrastructure,” which includes reducing hardware costs, as a way to optimize IT costs. Increasingly, companies are migrating electronic medical records and departmental systems to virtualized environments, and introducing HCI (Hyper-Converged Infrastructure), which integrates storage, networking, and computing. ■Strengthening security in accordance with guidelines and explaining tips for building and operating a highly reliable system Following the revision of the “Guidelines for Safety Management of Medical Information Systems,” what can we do to respond to cyber-attacks, including ransomware, which are becoming increasingly dangerous? This seminar will be held primarily for those who are involved in the operation of information systems at regional core hospitals. In addition to explaining tips for implementing security measures in line with the Ministry of Health, Labor and Welfare’s guidelines, we also propose the optimal EDR introduction and operation method as a first step toward zero trust security measures. Furthermore, we will introduce actual examples of system infrastructure renovation aimed at optimizing IT costs. If you are thinking, “I want to know what is needed to strengthen security measures,” “I want to know how to solve EDR operational issues,” or “I want to reduce my hospital’s system operating costs,” please join us. ■Sponsor Alphatech Solutions Co., Ltd. ​ ■Cooperation Open Source Utilization Research Institute Co., Ltd. ​Magicemi Co., Ltd. Click here for details and to apply ​ Magisemi will continue to hold webinars that are “useful to participants.” Public materials of past seminars and other recruiting seminars are available at ▶Click here You can view it here.
https://prcdn.freetls.fastly.net/release_image/54842/2766/54842-2766-76191bf88a45b51b9a55fe647355d539-400×400.jpg Magisemi Co., Ltd. 3rd floor, Shiodome Building, 1-2-20 Kaigan, Minato-ku, Tokyo 105-0022 Contact:
https://majisemi.com/service/contact/
https://img.youtube.com/vi/pGj3koorgSY/sddefault.jpg
https://www.youtube.com/watch?v=pGj3koorgSY

Leave a Reply

This article was partly generated by AI. Some links may contain Ads. Press Release-Informed Article.