News

Open Medical Founder Harry Lykostratis Offers Expert Advice on Cyber security for Healthcare Industry

Open Medical Founder Harry Lykostratis Offers Expert Advice on Cyber security for Healthcare Industry
Cyber Security, Digital Health, Digital Technologies, Thought Leadership
Member News

The article covers the advice and insights regarding cuber security in healthcare provided by Harry Lykostratis, the founder of Open Medical, a digital transformation scale-up. As the healthcare industry becomes increasingly reliant on technology, it is essential to ensure that patient data is protected from cyber threats. Cyber security breaches in healthcare can lead to significant consequences, including compromising sensitive patient information, disrupting medical services, and causing financial losses. Harry Lykostratis’ insights can help healthcare providers strengthen their cyber security measures and better protect patient data.

Protecting your Digital Domain: Advice from a Healthtech CEO

Harry Lykostratis, the founder, managing director, and lead engineer at Open Medical, shares valuable insights on cyber security.

My background

I’m a practising orthopaedic surgeon, but I’ve been designing and selling software programmes since I was 14 years old. I’ve always had an interest in computer programming, but I’ve also always appreciated medicine. So I studied medicine in university and specialised in orthopaedic surgery, but I kept programming on the side, which turned out to be rather handy later in life.

I arrived at work on a Saturday in 2011 to find a blank whiteboard instead of the trauma list. It had been wiped by mistake. It made me realise the impracticality of maintaining a trauma list on a whiteboard. A week later, at the trauma meeting, I presented eTrauma, a comprehensive digital solution for trauma workflow, and it took off. Open Medical was founded 2 years after, and eTrauma and Open Medical’s digital solutions are now deployed in over 100 healthcare organisations across the UK and Ireland.

Cyber threats are not just data breaches

Many companies implement security as a compliance measure, but it should be viewed as a risk management effort and allocated sufficient resources. Threats no longer consist just of data breaches and ransomware; as we shift to more sophisticated models and infrastructure complexity increases, so do the threats.

For example, at Open Medical, we recently had to migrate our systems because our primary cloud provider was going out of business. We felt an immediate threat to the service, company, and the data in our custody. Migration was executed immediately. Over 3 days, the team at Open Medical migrated 60 systems, which is an immense amount of data. We didn’t cut any corners, and data confidentiality was ensured with continuous system integrity tests. We informed the users with proper documentation, but they probably wouldn’t have realised it was happening otherwise. For us, the migration was a massive undertaking, but for the users, availability of services was unaffected. 

Zero-trust environment

Systems need to adapt with security threats and always be ahead with a measured approach. Which is why tech organisations need to adopt a zero-trust environment.

Large organisations are progressively establishing a zero-trust environment; never trust and always verify. The work required to plan for inherent mistrust in technology raises the cost of transformation, engineering, and design, but it’s fundamental. 

How it looks in practice

At Open Medical, we process sensitive data and are always aware of its location, nature, and destination. This has been our practice from the company’s inception; it is a procedure that must be implemented very early on because it is difficult to revert. We reduce our attack surface area by employing multi-level networks and effectively concealing it within the deeper layers. We employ effective security parameters and regulate the identities of both our staff and users using adaptive identity governance, ensuring identities are never forgotten. We employ granular access control, and within our platforms, particular access has played a central role. Following the zero-trust paradigm, every data-containing request is always subject to access governance. Every time a request is made to receive or input data, our systems verify the identity and access level. Data is never stored in a database and is always accessed via a non-bypassable access system; data cannot be acquired without traversing the access layer. It is privilege access and we always vet users prior to granting access. Implementing a zero-trust environment is challenging but essential, and must consist of 3 layers.

The layers to a zero-trust environment
  1. Authentication: Requiring multiple verifications depending on the circumstance or access management. It is essential to adjust authentication to the user pattern and environment, a strategy that has become widespread in industries such as banking. You know precisely who is being authenticated and if they are who they claim to be, reducing the chance of misappropriated identity.
  2. Access control: Once authentication is completed, restrict user access. This must expand beyond role-based access and into adaptive and dynamic access. When a user has access to sensitive data, it is important to monitor how frequently and with what context the data is accessed.
  3. Governing the access reason: This is still primitive to some degree. Identity and access can be managed, but establishing the reason for access on each occasion is extremely challenging. There are some existing methods, such as by analysing existing threat strategies. Soon, artificial intelligence (AI) will control traffic and detect threats, as well as determine the context and purpose of access to sensitive data.

AI: two sides of the same coin

Touching on AI, it is quite intriguing because, as it grows more prominent in organisations, it will also pose more challenges. AI can be used to detect threats and optimise adaptive access, but adversarial AI can also be used to organise an attack and breach a system. 

One of the greatest dystopian worries is an attack on the AI itself. If the knowledge of the AI is hacked, then all of its information is compromised. Even if AI complexity increases, lower levels of AI complexity can still be jeopardised, such as corrupting the information disseminated to users. Take ChatGPT as an example. Information can be tainted, and ChatGPT will accept corrupted information as genuine and feed you the fruit from the poison tree.

The current state of threat detection is like searching for a needle in a haystack, but I expect that AI will make it easier to detect threats. There’s a fine line between understanding what constitutes a threat and what does not while avoiding false positives.

Final message

Don’t stop sharing; security isn’t about restricting the accessibility, usefulness, or transparency of information; it’s about ensuring that the correct information at the right level reaches the right people in the context in which they need it. Being secure is simple when isolated, the challenge is being secure while transparent.

Discover more about Open Medical

Open Medical’s unique approach to the healthcare industry has enabled it to deliver outstanding results, able to innovate and develop new products that provide value to its customers without compromising quality. The company’s ability to generate revenue and grow organically is a clear reflection of its strength and potential. Open Medical’s success proves that with the right business model and team, it is possible to achieve remarkable outcomes that provide genuine value to the healthcare industry. Open Medical is a revolutionary force in healthcare.

NEWS​

Related News

Accelerate Your Health Innovations with ECHAlliance

25 Jul 2024
Join ECHAlliance to scale your health solutions through our extensive network.

July 2024 ECHAlliance Newsletter

24 Jul 2024

Cross-sector collaboration positions West Yorkshire as global leader in healthtech innovation

24 Jul 2024
West Yorkshire’s health, care and academic leaders signed a Memorandum of Understanding with with the Association of British HealthTech Industries (AB...

Strata Health Launches Booking and Referral Standard (BaRS) at NHS East Lancashire Hospitals

24 Jul 2024
Thousands of referrals have passed through our integration to create appointments in Strata PathWays, which has already made a huge impact within the ...

Envisioning seamless sharing of digital meds data in Wales

24 Jul 2024
Digital Health and Care Wales (DHCW) is embarking on the creation of a shared medicines record for the whole of the country. The Digital Medicines Tra...

One of Europe’s leading university hospitals selects Better technology for its core data platform

24 Jul 2024
Following a framework procurement issued in 2023, one of Europe's leading university hospitals has completed the first call-off for openEHR software, ...

Become a member

Join ECHAlliance to amplify your organisation’s message, grow your networks, connect with innovators and collaborate globally.
 
First name *
Last Name *
Email Address *
Country *
Position *
First name *
Last Name *
Email Address *
Country *
Position *