News

Open Medical Founder Harry Lykostratis Offers Expert Advice on Cyber security for Healthcare Industry

Open Medical Founder Harry Lykostratis Offers Expert Advice on Cyber security for Healthcare Industry
Cyber Security, Digital Health, Digital Technologies, Thought Leadership
Member News

The article covers the advice and insights regarding cuber security in healthcare provided by Harry Lykostratis, the founder of Open Medical, a digital transformation scale-up. As the healthcare industry becomes increasingly reliant on technology, it is essential to ensure that patient data is protected from cyber threats. Cyber security breaches in healthcare can lead to significant consequences, including compromising sensitive patient information, disrupting medical services, and causing financial losses. Harry Lykostratis’ insights can help healthcare providers strengthen their cyber security measures and better protect patient data.

Protecting your Digital Domain: Advice from a Healthtech CEO

Harry Lykostratis, the founder, managing director, and lead engineer at Open Medical, shares valuable insights on cyber security.

My background

I’m a practising orthopaedic surgeon, but I’ve been designing and selling software programmes since I was 14 years old. I’ve always had an interest in computer programming, but I’ve also always appreciated medicine. So I studied medicine in university and specialised in orthopaedic surgery, but I kept programming on the side, which turned out to be rather handy later in life.

I arrived at work on a Saturday in 2011 to find a blank whiteboard instead of the trauma list. It had been wiped by mistake. It made me realise the impracticality of maintaining a trauma list on a whiteboard. A week later, at the trauma meeting, I presented eTrauma, a comprehensive digital solution for trauma workflow, and it took off. Open Medical was founded 2 years after, and eTrauma and Open Medical’s digital solutions are now deployed in over 100 healthcare organisations across the UK and Ireland.

Cyber threats are not just data breaches

Many companies implement security as a compliance measure, but it should be viewed as a risk management effort and allocated sufficient resources. Threats no longer consist just of data breaches and ransomware; as we shift to more sophisticated models and infrastructure complexity increases, so do the threats.

For example, at Open Medical, we recently had to migrate our systems because our primary cloud provider was going out of business. We felt an immediate threat to the service, company, and the data in our custody. Migration was executed immediately. Over 3 days, the team at Open Medical migrated 60 systems, which is an immense amount of data. We didn’t cut any corners, and data confidentiality was ensured with continuous system integrity tests. We informed the users with proper documentation, but they probably wouldn’t have realised it was happening otherwise. For us, the migration was a massive undertaking, but for the users, availability of services was unaffected. 

Zero-trust environment

Systems need to adapt with security threats and always be ahead with a measured approach. Which is why tech organisations need to adopt a zero-trust environment.

Large organisations are progressively establishing a zero-trust environment; never trust and always verify. The work required to plan for inherent mistrust in technology raises the cost of transformation, engineering, and design, but it’s fundamental. 

How it looks in practice

At Open Medical, we process sensitive data and are always aware of its location, nature, and destination. This has been our practice from the company’s inception; it is a procedure that must be implemented very early on because it is difficult to revert. We reduce our attack surface area by employing multi-level networks and effectively concealing it within the deeper layers. We employ effective security parameters and regulate the identities of both our staff and users using adaptive identity governance, ensuring identities are never forgotten. We employ granular access control, and within our platforms, particular access has played a central role. Following the zero-trust paradigm, every data-containing request is always subject to access governance. Every time a request is made to receive or input data, our systems verify the identity and access level. Data is never stored in a database and is always accessed via a non-bypassable access system; data cannot be acquired without traversing the access layer. It is privilege access and we always vet users prior to granting access. Implementing a zero-trust environment is challenging but essential, and must consist of 3 layers.

The layers to a zero-trust environment
  1. Authentication: Requiring multiple verifications depending on the circumstance or access management. It is essential to adjust authentication to the user pattern and environment, a strategy that has become widespread in industries such as banking. You know precisely who is being authenticated and if they are who they claim to be, reducing the chance of misappropriated identity.
  2. Access control: Once authentication is completed, restrict user access. This must expand beyond role-based access and into adaptive and dynamic access. When a user has access to sensitive data, it is important to monitor how frequently and with what context the data is accessed.
  3. Governing the access reason: This is still primitive to some degree. Identity and access can be managed, but establishing the reason for access on each occasion is extremely challenging. There are some existing methods, such as by analysing existing threat strategies. Soon, artificial intelligence (AI) will control traffic and detect threats, as well as determine the context and purpose of access to sensitive data.

AI: two sides of the same coin

Touching on AI, it is quite intriguing because, as it grows more prominent in organisations, it will also pose more challenges. AI can be used to detect threats and optimise adaptive access, but adversarial AI can also be used to organise an attack and breach a system. 

One of the greatest dystopian worries is an attack on the AI itself. If the knowledge of the AI is hacked, then all of its information is compromised. Even if AI complexity increases, lower levels of AI complexity can still be jeopardised, such as corrupting the information disseminated to users. Take ChatGPT as an example. Information can be tainted, and ChatGPT will accept corrupted information as genuine and feed you the fruit from the poison tree.

The current state of threat detection is like searching for a needle in a haystack, but I expect that AI will make it easier to detect threats. There’s a fine line between understanding what constitutes a threat and what does not while avoiding false positives.

Final message

Don’t stop sharing; security isn’t about restricting the accessibility, usefulness, or transparency of information; it’s about ensuring that the correct information at the right level reaches the right people in the context in which they need it. Being secure is simple when isolated, the challenge is being secure while transparent.

Discover more about Open Medical

Open Medical’s unique approach to the healthcare industry has enabled it to deliver outstanding results, able to innovate and develop new products that provide value to its customers without compromising quality. The company’s ability to generate revenue and grow organically is a clear reflection of its strength and potential. Open Medical’s success proves that with the right business model and team, it is possible to achieve remarkable outcomes that provide genuine value to the healthcare industry. Open Medical is a revolutionary force in healthcare.

NEWS​

Related News

Cost Effectiveness of Cervical Cancer Screening in Kenya

18 Apr 2024
Africa Health Business conducted a study to evaluate the cost- effectiveness of various cervical cancer detection methods. The study delved into the f...

Insights from the 4P-CAN Project Event at the European Parliament

18 Apr 2024
Discover latest cancer prevention insights at the European Parliament. Explore Horizon Europe Mission impact, Beating Cancer Plan, and collaborative s...

Transforming Antimicrobial Resistance: The Role of Digital Integration in AMR EDUCare

17 Apr 2024
As a leading organisation in the digital health space, ECHAlliance supports this project as a beneficiary, contributing to various project work packag...

Spain – Basque Health Ecosystem is ECHAlliance Ecosystem of the Month – April

17 Apr 2024
This month we are featuring our Spain - Basque Health Ecosystem as our Ecosystem of the Month.

The Miguel Delibes Cultural Center has been the epicenter of the Sectoral Meeting on Care and Innovation that commemorates the 10th Anniversary of the SIVI Cluster

16 Apr 2024
This conference, organized by the SIVI Cluster, was presented as a space for reflection, exchange and recognition of the advances and outstanding cont...

CRANE: pre-commercial procurement project. FundeSalud participate in the co-creation sessions of the CRANE Project in Copenhagen

16 Apr 2024
Three European companies are designing a prototype of a possible technological solution for patients with chronic diseases (Diabetes, Cardiovascular D...

Become a member

Join ECHAlliance to amplify your organisation’s message, grow your networks, connect with innovators and collaborate globally.
 
First name *
Last Name *
Email Address *
Country *
Position *
First name *
Last Name *
Email Address *
Country *
Position *