I watched the “Security 101: Security Risk Analysis” video for this week’s discussion post. A risk-management system strengthens how an organization identifies potential risks and how to prevent them from happening (., 2018). The first step in managing a risk-management system is to perform a security risk analysis. In a security risk analysis, it is crucial to identify how information is stored (i.e. hard drives, CDs, mobile devices), where the information goes (i.e. providers within and outside the organization, backup hard drives), and how information is transmitted (i.e. e-mail, fax, ). Once this data is collected, the next step is to identify and document possible threats, such as hackers, natural disasters, and power outages, and weaknesses in the security controls. After assessing current security measures and calculating probabilities of potential risks, strategies are developed to prevent those threats from occurring and to correct such actions should those threats occur. (The Office of the National Coordinator for , 2014)
To improve my knowledge of security basics, I will continue to watch the other videos provided by the HealthIT.gov website and explore other resources that the website has to offer. I will also review chapters in our class textbook that discuss information security in the healthcare setting.
Hebda, T. L., Czar, P., & Hunter, K. (2018). Handbook of Informatics for Nurses & Healthcare Professionals (6th ed.). Pearson Education (US).
The Office of the National Coordinator for Health Information Technology. (2014, April 17).Security 101: Security risk analysis. HealthIT.gov. Retrieved October 9, 2022, from