Why App Modernization Enhances Healthcare Security
Health systems rely on countless applications to keep administrative and clinical operations running, but many of them may be outdated or not secured. An estimated 73% of healthcare organizations still use legacy systems, according to a 2021 Healthcare Information and Management Systems Society survey.
“As these systems get older, cybercriminals poke holes in them and find vulnerabilities they can exploit,” says Andy Stone, CTO for the Americas at Pure Storage. He explains that application modernization gives IT teams the opportunity to eliminate those vulnerabilities.
He compares it to renovating an old house. “Maybe you have to replace the roof because it leaks. When you do, everything becomes waterproof again. Application modernization works the same way,” Stone says. “You’ve taken a holistic look and resealed your systems with the latest and greatest materials.”
READ MORE: Healthcare organizations benefit from a Strategic Application Modernization Assessment?
How Health IT Teams Can Factor in Security
Strategies for enhancing cybersecurity via application modernization include:
Build Security Measures from the Start
Atif Chaughtai, head of emerging industries at Red Hat, says healthcare IT teams must build cybersecurity measures directly into applications from the beginning. Teams should also run security tests throughout development.
“It’s a cultural shift,” he says. “In the past, software engineers focused on functionality, and security was an afterthought. Now, there’s an understanding that security needs to be baked in.” This approach can also make it easier to maintain the organization’s security posture.
Factor in Flexibility
Flexibility is another important factor to consider. Healthcare organizations use hundreds or thousands of third-party vendors, including multiple public cloud vendors. Chaughtai recommends building applications that can function on multiple platforms and easily be updated.
“If you build an application to be very specific to a particular cloud model, and then the vendor updates their security posture, now you have another technical debt,” he explains. “Instead, create a modular approach, where you can plug in or replace security controls whenever you need to.”