Strategies

As Healthcare Industry Transforms Overnight, Tech Community Must Act

The healthcare industry is adopting a decade of digital transformation in a matter of months, with the risk exposure to match. F5 Labs' Preston Hogue writes for SecurityWeek, discussing the vital need for security expertise to lend a hand.
May 27, 2020
1 min. read

Today everyone is in Agile mode, but no one more so than the overburdened healthcare industry.

We have seen images of doctors and nurses on the front lines, but there are heroic efforts happening behind the scenes too as hospitals and health systems innovate at warp speed to solve new logistical and data challenges. We are watching an entire industry undergo a decade of digital transformation in a matter of months.

What is happening during this crisis will not just change the landscape in healthcare today—it will change the way that we deliver and experience healthcare forever. The impact will be felt for years if not decades.

So it’s imperative that the technology industry come together to help healthcare meet this challenge, both to support the healthcare system when it’s needed most, as well as to ensure that new digital infrastructure is implemented the best possible way.

Given the situation, it is almost certain that we are generating a massive risk exposure. One risk to a single link in an application’s chain of custody has the potential to allow exploitation of the entire system. Even in a crisis, there will absolutely be people eager to exploit those risks for any number of reasons.

Read the full article published May 6, 2020 here: https://www.securityweek.com/healthcare-industry-transforms-overnight-tech-community-must-act by SecurityWeek.

Join the Discussion
Authors & Contributors
Preston Hogue (Author)

More from Learning Center

What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
article 13 min. read
What Is Access Control?
What Is Access Control?
article 15 min. read
What is Multi-Cloud and How Does It Affect Security?
What is Multi-Cloud and How Does It Affect Security?
article 13 min. read