Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Yeshim Deniz, Liz McMillan, Pat Romanski, Jason Bloomberg

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Containers Expo Blog, Release Management , Cloud Security, @DXWorldExpo

@CloudExpo: Article

Healthcare Data on the Cloud – The Reality of Sensitive Information Online

Secure any organization’s sensitive data, including consumer healthcare data, before it is sent to the cloud

The convenience, efficiency and cost benefits cloud computing offers organizations has made moving healthcare data and records to the cloud make sense for hospitals, physicians and other healthcare providers. Security and data breaches are a concern for any industry utilizing the cloud, but healthcare unfortunately seems to be particularly vulnerable to attacks. The Washington Post recently reported that The Department of Homeland Security is fearful that the health industry is "inviting" an attack with its out-of-date policies and lack of oversight.

A recent WIRED article discussed the current state of healthcare information in the cloud, including specifics on the vulnerabilities facing healthcare providers using cloud applications and why consumers should be concerned about their healthcare data being on the cloud.

The Value of Healthcare Data
According to the article, hackers are particularly interested in healthcare information because of its comparatively substantial dollar value. An individual's medical identity can be worth as much as $50, a significant amount considering a social security number is worth just $1. With personal medical information in hand, thieves are able to commit medical identity theft by using someone else's personal information to receive goods or services, potentially wreaking havoc on that person's records and creating liabilities for service providers and increasing costs for everyone.

This security issue is not just a concern for healthcare-specific applications. Some of today's popular cloud applications, including Box and Dropbox, are being used to store healthcare data and they have not been able to remain secure from cyber-attack. A large healthcare system being hacked would result in costly consequences for consumers and their medical providers. But despite the apparent risks, cloud usage for health records is expected to grow quickly. One reason is that electronic medical records are a key part of the Affordable Care Act (being implemented in 2014).

Does Healthcare Data Belong on the Cloud?
The article seems to assert that putting data on the cloud means that it is inevitable that healthcare providers and therefore individual consumers are going experience a breach or attack. The facts cited are certainly disturbing and medical identity theft presents unique and costly consequences to everyone involved. No organization wants to experience a data breach, especially of such potentially sensitive information, and according to the article, there doesn't seem to be any real solutions in sight.

But some forward-thinking healthcare organizations are realizing that the online vulnerabilities of the healthcare field do not necessitate a slowing adoption of the cloud. These healthcare companies, providers, hospitals, doctors and others are protecting sensitive healthcare data by using Cloud Encryption Gateways to fully secure sensitive information before it leaves their control and goes to the cloud for processing and storage. These gateways are designed to preserve the end-user's experience with the cloud application while also providing security of data going to the cloud.

Our solution, the PerspecSys Cloud Protection Gateway, was built to secure any organization's sensitive data, including consumer healthcare data, before it is sent to the cloud. Any cloud application a healthcare organization needs to use to store and share patient information is therefore secure from attacks or breaches (because the sensitive data is no longer stored or processed in the cloud). The solution is installed inside the organization itself and allows full data control to stay within its walls. With the sensitivities and amount of security needed in the healthcare field, the solution is ideal for any organization moving patient data to the cloud.

While the WIRED article rightly points out the real problems many healthcare organizations and their patients face with putting data on the cloud, it stops short in its understanding of all solutions available. Any organization concerned about putting highly sensitive data on the cloud should learn more about the PerspecSys Cloud Protection Gateway and find out how their data can be secured.


PerspecSys Inc. is a leading provider of cloud data security and SaaS security solutions that remove the technical, legal and financial risks of placing sensitive company data in the cloud. PerspecSys accomplishes this for many large, heavily regulated companies by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. Based in Toronto, PerspecSys Inc. is a privately held company backed by investors that include Intel Capital and GrowthWorks.

Read the original blog entry...

More Stories By Gerry Grealish

Gerry Grealish is Vice President, Marketing & Products, at PerspecSys. He is responsible for defining and executing PerspecSys’ marketing vision and driving revenue growth through strategic market expansion and new product development. Previously, he ran Product Marketing for the TNS Payments Division, helping create the marketing and product strategy for its cloud-based payment gateway and tokenization/encryption security solutions. He has held senior marketing and leadership roles for venture-backed startups as well as F500 companies, and his industry experience includes enterprise analytical software, payment processing and security services, and marketing and credit risk decisioning platforms.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by researching target group and involving users in the designing process.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to advisory roles at startups. He has worked extensively on monetization, SAAS, IoT, ecosystems, partnerships and accelerating growth in new business initiatives.
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments that frequently get lost in the hype. The panel will discuss their perspective on what they see as they key challenges and/or impediments to adoption, and how they see those issues could be resolved or mitigated.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O'Reilly author.
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like "How is my application doing" but no idea how to get a proper answer.