Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesLogical SecurityHospitals & Medical Centers

Safely unlocking the value of clinical data

By Chris Hansen
medical professionals looking at computer

Image via Unsplash

July 5, 2023

Clinical trials undoubtedly continue to be essential to advancements in medicine; however, clinical trials often face challenges in participation. There are a myriad of hurdles to patient enrollment, and security is very much one of them. Before outlining these concerns, let’s zoom out and discuss why some of the broad challenges in unlocking the value of clinical data, and then address the role security plays in alleviating them.

A recent study found that around 20% of cancer clinical trials fail because of insufficient patient enrollment. Unlocking the value of real world data (RWD), or data extracted from sources such as patient medical records or health information, has emerged as another means of gaining insights from patient populations for the betterment of healthcare. In fact, the FDA has acknowledged the importance of the growth in RWD, which can ultimately support FDA regulatory decisions. Yet, many hospitals and health systems still have not adequately prioritized the management of its clinical data to better serve public health. So, what are the factors hindering hospital and health systems from sharing their clinical data to fulfill its potential?

According to one recent survey, concerns over the protection of patient data is an existing barrier to the sharing of RWD. In this survey of professionals holding managerial, executive, or other leadership roles at hospitals and health systems throughout the United States, 26% of respondents stated that protecting patient data was preventing their facility or health system from currently using and/or sharing real world data with other organizations. In addition, 31% of respondents cited concerns about protecting patient data when selecting the biggest barriers their facility or health system faced in its efforts to effectively use or share real world data in clinical research. These concerns are not unwarranted; the number of attacks on U.S. hospitals each year doubled between 2016 and 2021, according to the Journal of the American Medical Association. With these attacks only continuing to increase, patient data is especially at risk of exploitation and misuse. 

As clinical data becomes more vulnerable to cyberattacks while simultaneously gaining importance in the advancement of healthcare, hospitals must begin prioritizing updating and implementing data security strategies. Common security measures that can improve protection include encryption for healthcare data both at rest and in transit, backup mechanics and data recovery systems, and two-factor login authentication to ensure only users with permission can access private data. Replacing outdated IT infrastructure is also imperative to best protecting sensitive patient information. Lastly, healthcare executives should also choose partners that leverage protective measures to defend systems against cyberattacks through programs such as System and Organization Controls (SOC) and Health Information Trust Alliance (HITRUST). 

Another aspect of clinical data security is the concept of data de-identification, or the process of removing data elements in order to keep the patient’s personal information anonymous, but retaining his or her value for research. This enables hospitals, healthcare systems and/or researches to conduct queries around various categories like age, city and diagnosis, without revealing the individual’s specific birth date, address or healthcare issue. Patient de-identification facilitates comprehensive, informative clinical research without jeopardizing privacy. 

These steps and others are what enable secure, confidential data management by complying organizations. Without these measures, hospitals and health systems may continue to be at risk to malicious actors, further delaying the benefits of clinical data which in turn reduces the likelihood of positive patient outcomes.

Integrating modern IT infrastructure and adopting comprehensive security measures will only continue to become important as cyberattacks and malware become more threatening. The value of clinical data cannot be understated, and it is time that hospitals and health systems leverage their information to improve patient outcomes and inform medical innovation. By making key updates to security infrastructure and taking action, the healthcare industry as a whole can embrace a better future. 

KEYWORDS: cyber attack cyberattack data security FDA health care security healthcare cybersecurity regulations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris Hansen is the Head of Data Engineering at Q-Centrix.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • Digital Trust

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • risk management freepik

    The value of better data in third-party risk assessments

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing