3 critical steps to business continuity of healthcare organizations in the Middle East
Source: Procre8 for Veeam Software , Author: Gregg Petersen
Posted: Thu September 6, 2018 2:29 pm

UAE. Gregg Petersen, Regional Vice President, Middle East & Africa at Veeam writes about the critical steps to business continuity for the healthcare sector in the region.

The Digitization of Health Care
Understanding the direct link between technology and patient care is critical, but can be overwhelming. Physicians rely on up-to-date patient information to make educated decisions on the best care. Access to patient data is critical to their care and can sometimes mean the difference between life and death.

Electronic Health Records (EHRs) flow from system to system, hospital to hospital, from the point of the patient registration to data gathered in different departments such as labs, radiology, cardiology and more, to discharge. Couple that with financial and insurance data collected, and we begin to see the sheer magnitude of the Availability impact on the health care industry.

Business Continuity—Keeping the Digital Life Alive
Downtime can have a catastrophic impact on digital life for caregivers, administrators, stakeholders and patients.

In a study published by the Journal of Biometrics, researchers stated that of the patient safety incidents reported to the U.S. Food and Drug Administration, 96% were related to technical issues[1]. Some incidents resulted in futile searches for test results, inability to read test results and duplicate orders for procedures.

On a broad scale, the WannaCry ransomware attack in May 2017 affected 230,000 computers and took down entire pillars of Britain’s National Health Service. WannaCry is a virus that exploits a known weakness in Microsoft Windows, a platform that is widely used in hospitals across the world. The virus blocks all data on computer systems until a ransom is paid, so every aspect of digital life for caregivers, administrators and patients is affected.

In this case, the virus infected medical devices, caused ambulances to be diverted, and shut down 16 hospitals in the U.K.[2] For other hospitals, with computer systems shut down, operations had to be cancelled and emergency services halted. In addition, patient records became inaccessible.

The Evolving Threat Landscape
Cyberthreats to health care include hackers, botnet attacks, exfiltration (stealing medical information) and malware such as ransomware. By all accounts, a cyberattack on a health care practice is a matter of when, not if. Cyberattacks can shut down health care practices and dramatically impact patient care. They can also severely damage the brand and incur steep regulatory penalties.

Securing Availability and Business Continuity in Health Care
There are critical units in hospitals and care centres that have no allowable downtime. Some surgical procedures depend on real-time data from digital diagnostic equipment. Sadly, there have been cases of patient death due to downtime events. According to a recent report, downtime delayed post-surgery treatment that led to a permanent disability for one patient, and death for another patient when images could not be transmitted for diagnosis[3].

In addition to the tragic loss of life, if a health care practice is not able to immediately restore access to data it faces regulatory fines, lost consumer trust and damaged employee morale. The key to surviving and thriving in the new health care landscape is a reliable, comprehensive business continuity plan. A keystone of a business continuity plan in this context of digital transformation is Availability.

Three Critical Steps to Health Care Business Continuity

With so much at stake, health care organizations must address business continuity, and they must do so quickly and thoughtfully. The three most critical steps to health care business continuity are:

1- Ensure continuity and availability
  - Optimized backup and recovery strategy: Organizations need fast, reliable, scalable backup and recovery tools designed especially for enterprises. They must be able to quickly restore backups to meet Health Insurance Portability and Accountability Act (HIPAA) and other regulatory requirements. A good guideline for backups is the 3-2-1 rule: Have at least 3 copies of your data, store the copies on 2 different media and keep 1 backup copy offsite
  - Ensure you can quickly recover entire machines to the application level: Verifiable recovery of every file, application and virtual server every time is a must-have.
  - Ensure data loss avoidance: Your Availability solution should enable you to achieve major improvements in recovery point and recovery time objectives (RTPO™) of less than 15 minutes for all applications and data.

2-Achieve digital transformation agility
  - Cloud-based workload mobility: To ensure you can quickly recover entire machines, deploy cloud workload mobility to better cope with change and manage data more easily. You also must have the ability to test all applications and upgrades before they go into production. For cloud-based workload mobility leverage Azure or other public clouds for test/dev environments. This provides an easy way to spin up servers and workloads quickly.
  - Workload mobility: The complex infrastructure of an enterprise involves physical and virtual machines, as well as private, public or hybrid cloud. To achieve an optimal setup, you need the right data management and Availability solution that provides a certain degree of flexibility, to manage and migrate data easily.

3- Enable analytics and visibility
  - Visibility and compliance to prevent system failure and downtime incidents: The visibility tool you choose should have real-time monitoring and reporting for any virtual environments in your infrastructure.
  - End-to-end visibility for both physical and virtual machines: To be effective, it must also have end-to-end visibility for both physical and virtual machines, in order to prevent possible failures of any type of application or system.
  -Creation of incidents based on events that happen in your environment: Finally, it must generate incident reports based on the events that happen in your environment so you can correct and modify as needed.

In conclusion, meeting the high digital expectations of next-generation patient care can feel like a moving target for health care IT. Downtime, data loss and data security breaches put everything that is important to a health care practice at risk. Downtime events can even put patient lives in danger.

The fact is, no health care organization can afford to be unprepared in the modern health care market. To be successful in the new landscape, health care practices must be confident in their business continuity strategy. A holistic Availability strategy may include deploying cloud workload mobility, increasing visibility and compliance, and optimizing backup and recovery strategy.

Photo Caption: Gregg Petersen, Regional Vice President, Middle East & Africa at Veeam

About Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management and ensuring the Hyper-Availability of data.

[1] “Measuring the effects of computer downtime on hospital pathology processes,” Journal of Biomedical Information, Wang, Ying, et al., Feb. 2016
[2] “NHS seeks to recover from global cyber-attack as security concerns resurface,” The Guardian, May 13, 2017
[3] Op. cit., Journal of Biomedical Information

 

MIDDLE EAST BUSINESS COMMENT & ANALYSIS

date:Posted: September 21, 2018
UAE. Analysts to explore AI developments and influence on businesses at the Gartner Symposium/ITxpo 2019, March 4-6 in Dubai, United Arab Emirates.
date:Posted: September 20, 2018
UAE. Research from Aruba and Ponemon Institute shows security teams view Machine Learning and network visibility for users and IoT devices essential for battling stealthy threats inside IT infrastructures.
date:Posted: September 19, 2018
UAE. Few are confident in spotting security risks and vulnerabilities in DevOps operated public cloud environments.
dhgate