The Security Scrutinizer with Howard Anderson

Intrusion Detection Pays Off

Intrusion Detection Pays Off

He related in a recent interview:

"We had a gentleman that came into the hospital to sit with his mother sometime back, and he was an IT professional. On our internal intrusion detection system up popped his laptop. So we started hunting him down, and I found him and he was sitting in his mother's room in critical care and had unplugged the PC and plugged his laptop into the network. So when I walked in and introduced myself as the CIO and the chief security officer, he said, "How did you find me?" I said, "Well I have my ways." I asked him to unplug his laptop and please not do that any more.

When I walked in and introduced myself as the CIO and the chief security officer, he said, 'How did you find me?' I said, 'Well I have my ways.' 

The next day, the staff saw him bringing his laptop into the hospital inside of a pillowcase, and so we collected that from him until he left. So that is the level of diligence that we try to do."

Christian points out that his hospital has a separate computer network that visitors and patients can use.

"We can provide those guest services to our visitors and our patients if they need to be able to do work--and keep that off of our network." But beware of visitors carrying very heavy pillowcases.



About the Author

Howard Anderson

Howard Anderson

Former News Editor, ISMG

Anderson was news editor of Information Security Media Group and founding editor of HealthcareInfoSecurity and DataBreachToday. He has more than 40 years of journalism experience, with a focus on healthcare information technology issues. Before launching HealthcareInfoSecurity, he served as founding editor of Health Data Management magazine, where he worked for 17 years, and he served in leadership roles at several other healthcare magazines and newspapers.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.