ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Software HDD Encryption: Poll

    IT Discussion
    symantec mcafee sophos
    8
    112
    44.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      A Former User @Dashrender
      last edited by

      @Dashrender said:

      @thecreativeone91 said:

      @Dashrender said:

      @scottalanmiller said:

      Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?

      Do this is expensive and potentially difficult.

      It's the least expensive option.

      How would you build your least expensive option?

      What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.

      coliverC DashrenderD 2 Replies Last reply Reply Quote 2
      • scottalanmillerS
        scottalanmiller @Dashrender
        last edited by

        @Dashrender said:

        @scottalanmiller said:

        Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?

        Do this is expensive and potentially difficult.

        If I was to try to do this in my environment I'd have to start by building either RDS servers or VDI.

        Pretty basic first steps if security matters, though. If data is going on our laptops, security isn't a very high focus. You do RDS or VDI or just remote into desktops long, long before you talk encryption of laptops.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @A Former User
          last edited by

          @thecreativeone91 said:

          @Dashrender said:

          @scottalanmiller said:

          Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?

          Do this is expensive and potentially difficult.

          It's the least expensive option.

          Is it?

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @gjacobse
            last edited by

            @g.jacobse said:

            @scottalanmiller said:

            Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?

            As part of our contract with the State, we are required to.

            At this time we do not have another solution.

            You are contractually obligated to store sensitive data in risky places? Why would a contract mandate that?

            1 Reply Last reply Reply Quote 1
            • coliverC
              coliver @A Former User
              last edited by

              @thecreativeone91 said:

              @Dashrender said:

              @thecreativeone91 said:

              @Dashrender said:

              @scottalanmiller said:

              Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?

              Do this is expensive and potentially difficult.

              It's the least expensive option.

              How would you build your least expensive option?

              What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.

              That would be the least expensive, which is what was asked... but what stops them from copying files to disk?

              scottalanmillerS 1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @A Former User
                last edited by

                @thecreativeone91 said:

                What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.

                I'll admit that I hadn't considered forcing uses to only save to network share. But this only works on the assumption that users can't use person devices to access the data in the first place.

                With most EHRs today being web based this is simply impossible/impractical.

                All of my doctors require access to the EHR from any computer they are at. The best we can hope that they are using a 'trusted' computer, but that can't be promised.

                So to completely lock this down we'd have to prevent access from all web computers except the VDI/RDS ones, then have the users have a portal into our VDI/RDS solution that is web based. Then we could prevent them from downloading en masse data to whatever device they are on.

                If we don't lock the EHR servers to only the VDI/RDS ones and allow them access from any machine, then they can grab whatever reports are generate able to their local machine.

                ? scottalanmillerS 2 Replies Last reply Reply Quote 0
                • ?
                  A Former User @Dashrender
                  last edited by A Former User

                  @Dashrender said:

                  @thecreativeone91 said:

                  What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.

                  But this only works on the assumption that users can't use person devices to access the data in the first place.

                  Letting HIPAA data be stored on personal devices is a even bigger issue. It shouldn't be done. IMO BYOD and PHI do not go together.

                  scottalanmillerS DashrenderD 2 Replies Last reply Reply Quote 1
                  • scottalanmillerS
                    scottalanmiller @coliver
                    last edited by

                    @coliver said:

                    That would be the least expensive, which is what was asked... but what stops them from copying files to disk?

                    Might be the least expensive. Depends. Do these users ONLY have laptops?

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @Dashrender
                      last edited by

                      @Dashrender said:

                      @thecreativeone91 said:

                      What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.

                      I'll admit that I hadn't considered forcing uses to only save to network share. But this only works on the assumption that users can't use person devices to access the data in the first place.

                      With most EHRs today being web based this is simply impossible/impractical.

                      All of my doctors require access to the EHR from any computer they are at. The best we can hope that they are using a 'trusted' computer, but that can't be promised.

                      So to completely lock this down we'd have to prevent access from all web computers except the VDI/RDS ones, then have the users have a portal into our VDI/RDS solution that is web based. Then we could prevent them from downloading en masse data to whatever device they are on.

                      If we don't lock the EHR servers to only the VDI/RDS ones and allow them access from any machine, then they can grab whatever reports are generate able to their local machine.

                      If their EHR is web based, what's the concern? Problem solved on its own. No encryption needed. Well there is, but on the EHR, not on the laptop.

                      1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @A Former User
                        last edited by

                        @thecreativeone91 said:

                        @Dashrender said:

                        @thecreativeone91 said:

                        What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.

                        But this only works on the assumption that users can't use person devices to access the data in the first place.

                        Letting HIPAA data be stored on personal devices is a even bigger issue. It shouldn't be done. IMO BYOD and PHI do not go together.

                        Can't up vote enough.

                        1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @A Former User
                          last edited by Dashrender

                          @thecreativeone91 said:

                          @Dashrender said:

                          @thecreativeone91 said:

                          What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.

                          But this only works on the assumption that users can't use person devices to access the data in the first place.

                          Letting HIPAA data be accessed on personal devices is a even bigger issue. It shouldn't be done. IMO BYOD and PHI do not go together.

                          Currently it can't be prevented though - most physicians use their home personal computers to access the EHRs. I know it's done in every health system in my city. While some of them go to ridiculous lengths to provide VPN access, the endpoint is still easily compromised making the efforts to me seem pointless.

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • Q
                            QDesk
                            last edited by

                            That's a reason that we love making web-based SaaS applications. The only thing you have to protect from the end user standpoint is the login. As long as that is protected, all is well.

                            1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @Dashrender
                              last edited by

                              @Dashrender said:

                              Currently it can't be prevented though - most physicians use their home personal computers to access the EHRs. I know it's down in every health system in my city. While some of them go to ridiculous lengths to provide VPN access, the endpoint is still easily compromised making the efforts to me seem pointless.

                              How is that a concern? That IS prevented, isn't it? The data is all in the EHR, never on the physician's machine thanks to the web application being used rather than the VPN.

                              DashrenderD 1 Reply Last reply Reply Quote 1
                              • DashrenderD
                                Dashrender @scottalanmiller
                                last edited by

                                @scottalanmiller said:

                                @Dashrender said:

                                Currently it can't be prevented though - most physicians use their home personal computers to access the EHRs. I know it's down in every health system in my city. While some of them go to ridiculous lengths to provide VPN access, the endpoint is still easily compromised making the efforts to me seem pointless.

                                How is that a concern? That IS prevented, isn't it? The data is all in the EHR, never on the physician's machine thanks to the web application being used rather than the VPN.

                                It's a concern because as long as the user has the rights to run a report, they can run that report from any computer anywhere.

                                scottalanmillerS ? 2 Replies Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @Dashrender
                                  last edited by

                                  @Dashrender said:

                                  It's a concern because as long as the user has the rights to run a report, they can run that report from any computer anywhere.

                                  I'm still lost. Of course they can run the report from anywhere. But they don't store the data locally. If they do, that's on them 100% and has nothing to do with IT. That's data theft and a personal theft and exposure of data. IT's only role would be to provide evidence for prosecution. Nothing in this discussion prevents that in any way. Encrypted drives would have identical exposure.

                                  DashrenderD 1 Reply Last reply Reply Quote 1
                                  • ?
                                    A Former User @Dashrender
                                    last edited by A Former User

                                    @Dashrender said:

                                    @scottalanmiller said:

                                    @Dashrender said:

                                    Currently it can't be prevented though - most physicians use their home personal computers to access the EHRs. I know it's down in every health system in my city. While some of them go to ridiculous lengths to provide VPN access, the endpoint is still easily compromised making the efforts to me seem pointless.

                                    How is that a concern? That IS prevented, isn't it? The data is all in the EHR, never on the physician's machine thanks to the web application being used rather than the VPN.

                                    It's a concern because as long as the user has the rights to run a report, they can run that report from any computer anywhere.

                                    How would that be any different than them stealing data by printing it or writing it down at work? It's a HR issue not an IT issue.

                                    DashrenderD scottalanmillerS 2 Replies Last reply Reply Quote 1
                                    • DashrenderD
                                      Dashrender @scottalanmiller
                                      last edited by

                                      @scottalanmiller said:

                                      @Dashrender said:

                                      It's a concern because as long as the user has the rights to run a report, they can run that report from any computer anywhere.

                                      I'm still lost. Of course they can run the report from anywhere. But they don't store the data locally. If they do, that's on them 100% and has nothing to do with IT. That's data theft and a personal theft and exposure of data. IT's only role would be to provide evidence for prosecution. Nothing in this discussion prevents that in any way. Encrypted drives would have identical exposure.

                                      I agree FDE or file encryption could possibly still allow the user the ability to download the data locally, but the intent of HIPAA the way I read it is, the Dr has a reasonable reason to have said data local - don't ask me what that reason is, it just is - and now that he does, we need to have a way to secure it in case control of that data is lost, i.e. a USB stick is lost/stolen, a laptop is lost/stolen, etc.

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender @A Former User
                                        last edited by

                                        @thecreativeone91 said:

                                        How would that be any different than them stealing data by printing it or writing it down at work? It's a HR issue not an IT issue.

                                        Because I'm not talking about theft, I'm talking about legitimate download uses.

                                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                                        • MattSpellerM
                                          MattSpeller
                                          last edited by

                                          @g.jacobse What have you done? 😉

                                          istock_can-of-worms.jpg

                                          1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @A Former User
                                            last edited by

                                            @thecreativeone91 said:

                                            @Dashrender said:

                                            @scottalanmiller said:

                                            @Dashrender said:

                                            Currently it can't be prevented though - most physicians use their home personal computers to access the EHRs. I know it's down in every health system in my city. While some of them go to ridiculous lengths to provide VPN access, the endpoint is still easily compromised making the efforts to me seem pointless.

                                            How is that a concern? That IS prevented, isn't it? The data is all in the EHR, never on the physician's machine thanks to the web application being used rather than the VPN.

                                            It's a concern because as long as the user has the rights to run a report, they can run that report from any computer anywhere.

                                            How would that be any different than them stealing data by printing it or writing it down at work? It's a HR issue not an IT issue.

                                            Exactly. Once doctors are stealing data, you have a breach and you need to call HR and let them deal with discipline, fines, arrests, etc.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 4 / 6
                                            • First post
                                              Last post