Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesLogical SecurityHospitals & Medical Centers

Safely unlocking the value of clinical data

By Chris Hansen
medical professionals looking at computer

Image via Unsplash

July 5, 2023

Clinical trials undoubtedly continue to be essential to advancements in medicine; however, clinical trials often face challenges in participation. There are a myriad of hurdles to patient enrollment, and security is very much one of them. Before outlining these concerns, let’s zoom out and discuss why some of the broad challenges in unlocking the value of clinical data, and then address the role security plays in alleviating them.

A recent study found that around 20% of cancer clinical trials fail because of insufficient patient enrollment. Unlocking the value of real world data (RWD), or data extracted from sources such as patient medical records or health information, has emerged as another means of gaining insights from patient populations for the betterment of healthcare. In fact, the FDA has acknowledged the importance of the growth in RWD, which can ultimately support FDA regulatory decisions. Yet, many hospitals and health systems still have not adequately prioritized the management of its clinical data to better serve public health. So, what are the factors hindering hospital and health systems from sharing their clinical data to fulfill its potential?

According to one recent survey, concerns over the protection of patient data is an existing barrier to the sharing of RWD. In this survey of professionals holding managerial, executive, or other leadership roles at hospitals and health systems throughout the United States, 26% of respondents stated that protecting patient data was preventing their facility or health system from currently using and/or sharing real world data with other organizations. In addition, 31% of respondents cited concerns about protecting patient data when selecting the biggest barriers their facility or health system faced in its efforts to effectively use or share real world data in clinical research. These concerns are not unwarranted; the number of attacks on U.S. hospitals each year doubled between 2016 and 2021, according to the Journal of the American Medical Association. With these attacks only continuing to increase, patient data is especially at risk of exploitation and misuse. 

As clinical data becomes more vulnerable to cyberattacks while simultaneously gaining importance in the advancement of healthcare, hospitals must begin prioritizing updating and implementing data security strategies. Common security measures that can improve protection include encryption for healthcare data both at rest and in transit, backup mechanics and data recovery systems, and two-factor login authentication to ensure only users with permission can access private data. Replacing outdated IT infrastructure is also imperative to best protecting sensitive patient information. Lastly, healthcare executives should also choose partners that leverage protective measures to defend systems against cyberattacks through programs such as System and Organization Controls (SOC) and Health Information Trust Alliance (HITRUST). 

Another aspect of clinical data security is the concept of data de-identification, or the process of removing data elements in order to keep the patient’s personal information anonymous, but retaining his or her value for research. This enables hospitals, healthcare systems and/or researches to conduct queries around various categories like age, city and diagnosis, without revealing the individual’s specific birth date, address or healthcare issue. Patient de-identification facilitates comprehensive, informative clinical research without jeopardizing privacy. 

These steps and others are what enable secure, confidential data management by complying organizations. Without these measures, hospitals and health systems may continue to be at risk to malicious actors, further delaying the benefits of clinical data which in turn reduces the likelihood of positive patient outcomes.

Integrating modern IT infrastructure and adopting comprehensive security measures will only continue to become important as cyberattacks and malware become more threatening. The value of clinical data cannot be understated, and it is time that hospitals and health systems leverage their information to improve patient outcomes and inform medical innovation. By making key updates to security infrastructure and taking action, the healthcare industry as a whole can embrace a better future. 

KEYWORDS: cyber attack cyberattack data security FDA health care security healthcare cybersecurity regulations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris Hansen is the Head of Data Engineering at Q-Centrix.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • Digital Trust

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • risk management freepik

    The value of better data in third-party risk assessments

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing