Introduction the aim of reducing workflow activities, improving service

Introduction

Technology has helped to transform
the healthcare sector because it enables firms to successfully manage their
diverse information needs. Moreover, technology has assisted in the development
of agile, flexible, and scalable structures that help in accomplishing the
strategic objectives of organizations. Healthcare organizations have been
incorporating technology with the aim of reducing workflow activities,
improving service quality, and responding to the needs of their key
stakeholders. However, the advent of technology has created risks and
vulnerabilities to the networks used by healthcare organizations. The different
types of threats include viruses, Trojans, malicious programs, and malicious
intruders that might try to steal or alter the critical data of healthcare
organizations. The result is the need for comprehensive cybersecurity
strategies and network security approaches that can be used for protecting and
safeguarding the data of companies from a wide range of threats. Network
security should start with clear, precise, and specific goals. It should
involve the complete assessment of the network at periodic intervals in order
to identify vulnerabilities. Furthermore, network security is enhanced when
companies are able to use technology and administrative practices for achieving
the network security goals. Medical record companies need to be equipped with
the proper network security strategies. These strategies should focus on using
technology and best administrative practices that would mitigate the impact of
threats encountered in the network. Furthermore, it is critical that network
security should be continuously updated in accordance with the needs of the
organization as well as the changing threats.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 

 

Databases
to be Used

A database management
system ensures that information can be properly stored and retrieved by the
organization when it is needed for performing activities. Selecting the proper
database is an important part of the network security strategy for the medical
record company. The selected database is MS Access which is a Microsoft product
that offers robust performance for the company (Peltier, 2016). It can be used
for meeting the needs of the company because it has security features that can
be integrated with the anti-virus and intrusion detection system installed in
the company for network security.

Domain
Configuration

The network security
strategy will configure the domain in such a way that it strives to establish
rights and privileges for each user (Peltier, 2013). Furthermore, the network
security plan will focus on training the users so that they are aware about the
basic security protocols. The domain should be configured in such a way that it
is integrated with the network security strategy of the medical record company.

Operating
Systems for Client Computers

Windows 10 is the
latest version of Microsoft Windows which should be used for the client
computers of the medical record company. It has several types of security
features that could play a critical role in safeguarding against different
types of information security and cyber security threats (Peltier, 2016). It
can be run on PCs, tablets, smartphones, and other computing devices. It has a
superior system that allows mouse oriented interface and touchscreen optimized
interface to meet the needs of users. It has Windows Defender Smart Screen that prevents employees from accessing
any suspicious website over the Internet (Peltier,
2016).  

The Windows
Defender Application Guard is another built-in security feature that provides
added levels of protection to the network in the medical record company.

Data
Transmission Requirements

Data transmission is
one of the most important functions of the network security plan. The security
of information across networks is a major issue that is plaguing the entire
world. The medical record company needs to develop a proper plan for ensuring that
documents and information can be exchanged in a secure manner (Raiyn, 2014). Emails
are the primary method of communication in many firms as they help in the
transmission of information. The data transmission policy should ensure that
sensitive information is not sent through this method. Secure data transmission
can be undertaken through the use of web based email services that provide
encryption for email messages that are sent and received by the medical record
company (Raiyn, 2014). This strategy will be beneficial as it will enhance the
ability of the company to safeguard and protect its networks. The medical
record company should strive to use an enterprise level anti-virus system that
could provide further levels of protection to the entire network.

Protection
of Confidential Records and Authentication

The process for protection of
confidential records and authentication must be done by securing the key
assets. One of the key approaches is that the servers should be provided
physical security so that they can be safe from unauthorized access. Empirical
studies argue that accidental data loss or theft occurs due to missing devices
such as portable storage media, laptops, desktop computers, and hard drives taken
out from the entire networks (Raiyn, 2014).

           

Properly designated areas for the servers storing
the critical information are needed for the medical records company while it is
important to develop other policies for the success of the organization.  The strategy for protecting confidential records
and authentication should involve the use of proper passwords by the users. The
passwords must be used in such a manner that they are safeguarded by the
individuals while the passwords must not be stolen by potential intruders.

An access control system for the medical record
company should authenticate based on user names and passwords (Alpcan & Basar, 2010). Accessibility to
information for the staff should be based on their needs and privileges. File
access permissions should be set accordingly to meet the needs of the staff
members depending on their roles and privileges in the medical record company. The
additional role controls can be developed based on the role of the staff member
in the medical record company. Access permissions must be established based on
the above staff roles which will help to provide augmented levels of security
for the company (Alpcan & Basar, 2010).

Process for Storing Information
on Separate Databases

Database security has been considered to
be a vital goal of network security because databases allow users to store and
retrieve the confidential data and information of any company. The databases of
the medical record company can be vulnerable to unauthorized access or misuse
by potential intruders, users, and administrators. Another threat is that of
malware infections that can cause alteration or tampering of the critical data (Ahmad et al, 2014).   Database
security can be compromised by performance constraints and capacity issues as
users might be unable to access the systems. Finally, there is always the
threat the programming bugs and design flaws in specific database systems might
lead to problems for the medical record company (Ahmad
et al, 2014).

The database security strategy should
focus on storing information on multiple databases. This means that backup
systems should be in place for the security of the medical record company. This
will help to achieve the highest levels of success as the company will be able
to distribute the data and ensure that proper backup measures are in place in
order to ensure the safety and integrity of the critical data (Ahmad et al, 2014).  User access rights, log management, database
replication, and backups must be part of the network security strategy in the
company so that sound outcomes can be attained. The proper security policies
should seek to focus on achieving long term growth and development (Ahmad et al, 2014).

Conclusion

A database management
system ensures that information can be properly stored and retrieved by the organization
when it is needed for performing activities. Selecting the proper database is
an important part of the network security strategy for the medical record
company. The selected database is MS Access which is a Microsoft product that
offers robust performance for the company. Data transmission is one of the most
important functions of the network security plan. The security of information
across networks is a major issue that is plaguing the entire world. The medical
record company needs to develop a proper plan for ensuring that documents and
information can be exchanged in a secure manner. The strategy for
protecting confidential records and authentication should involve the use of
proper passwords by the users. The passwords must be used in such a manner that
they are safeguarded by the individuals while the passwords must not be stolen
by potential intruders. An access control system for the medical record company
should authenticate based on user names and passwords. Accessibility to
information for the staff should be based on their needs and privileges.