Keeping Your Data Protected: Information Security Management

Data breaches dominate the headlines lately. With so much information stored online—banking information, shopping habits, social media accounts, health information—consumers are at a higher risk than ever before.

At Fairview, our Information Security Management team is on the front lines of protecting patient information.

“Securing sensitive and classified information is everyone’s responsibility,” says Jennifer Reicherts, information security analyst. “So the really awesome part about my job is that I get to work with everybody in the Fairview system depending on the need or the event.”

Safe and secure

The goal of our information security analysts is straightforward—keep Fairview safe and secure from cybersecurity threats and vulnerabilities—but the work to make sure that happens is anything but.

Jennifer says her team supports and seeks to continually strengthen Fairview’s information security policies, standards and practices.

“It feels pretty great to me to witness that ‘ah-ha!’ moment when we explain why we take such meaningful steps to determine if something is relatively low risk to add to our environment,” says Jennifer.

Patients come first

Jennifer says she’s had a longstanding interest in new technology in the delivery of health care. As she learned more about that area, she discovered an even greater interest: cybersecurity and the risks that exist within the health care industry.

After more than 10 years working in a technical support role in Fairview operating rooms, Jennifer made the jump into information security management.

“I’ve had the pleasure of seeing firsthand the incredible work the care delivery teams do for patients every day,” she says. “I know it can make it even more complicated when something in the technical environment doesn’t work as expected, so I appreciate the need to keep clinical care the number one priority, and that remains my number one goal today.”

What you should know

To keep your own information safe, you should be aware of two of the biggest security threats: social engineering and phishing scams.

“Social engineering can be a phone call from someone who says they are from a reputable company and need access to your computer, or an email with a link that infects your computer with a virus,” says Jennifer.

Phishing emails are usually worded in a way that makes the user feel like something bad will happen, and quickly, to either their paycheck or their email account unless the user follows their instructions—usually clicking on a link or entering their username and password.

“The really important part to remember with social engineering of all types is that these bad guys are really good at trying to trick users into giving away personal information,” she says. “The best way to stop them is to never open an email from a sender who you don’t know or are not expecting a message from.”

Related Articles