The Cloud
The structured and dynamic business processes have been analyzed; however, our structured business process which is inventory uses Point Click Care as an information system, and it is a cloud-based Software-as-a-Service (SaaS) platform. The operating systems that Point Click Care supports are Microsoft Windows, specifically IE 11 on Windows 10, and Microsoft Edge as the default browser, which is set up for all the desktops at the company. Preferred Care at Wall also outsources Microsoft 365 to communicate by Outlook email, as well as other applications such as Word, Excel, PowerPoint, Access, and secure cloud services such as OneDrive. Preferred Care at Wall has a Local Area Network (LAN) that connects all the computers in the company.
As stated previously, Preferred Care at Wall website URL contains a protocol and a domain name. The type of protocol it uses is https, which is a secured version of http, and indicates that a web browser is using SSL/TLS protocol to provide secure communication.
Information Systems Security
The three types of threats to IS security are human errors which include accidental problems caused by both employees and nonemployees, computer crime where employees and former employees intentionally destroy data or other system components, and natural events and disasters which include fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature. Fortunately referred Care has not had to face any of these types of threats to any of their systems.
The types of IS losses include unauthorized data disclosure, incorrect data modification, faulty service, denial of service, and loss of infrastructure. There have been a few instances at Preferred where employees will incorrectly modify an employee’s scheduled days to have more vacation days; these employees were terminated immediately after discovering their wrongdoings. Faulty services have also occurred in the past where patients received the wrong medications or treatments due to accurately giving them to the correct individual.
At Preferred Care their security policies include computerized medical records to ensure every staff member is on the same page and information about each resident is clearly recorded. Pre-packaged medication is used to prevent overmedication along with ensuring nobody can take medication without authorization. They use cameras, motion detectors, and locked doors as a way to secure the building and technology. Have all employees go under training to Understand and be compliant with HIPAA rules and regulations. If an employee receives a suspicious e-mail, phone call, or text message, or a computer is displaying unusual behavior, they notify the IT department immediately. Lastly, they enforce a strong password policy for their employees when using PCC.
When it comes to safeguards, Preferred uses many types of Human safeguards such as employee training, education, and procedure design to ensure the reliability of their employees. They also use
technical safeguards to protect patient information in their systems. Preferred Care uses its IT department which certified employees to address any security incidents.
Recommendations
Preferred Care at Wall faces some problems such as not many users interacting on social media, sometimes inefficient and lacking access to the limited number of computers with PCC, and when entering inventory information into PCC there is a possibility of inputting duplicate medications. Therefore, we suggest some recommendations:
- First impressions are everything, so having an easy-to-navigate website definitely provides an edge.
- Preferred Care at Wall should consider implementing sign-ups for a tour of the facilities available on their website. Currently, the consumer has to call the company in order to schedule a tour. By having there be a scheduling system online, the phone system would not be backed up, and it would be easy for a consumer to schedule an appointment. This allows the process for when a patient comes in to run more smoothly because everything is already scheduled.
- As for information security recommendations, Preferred Care at Wall should Implement vendor-supported operating systems and browsers to protect from online threats.
- Purchase mobile devices such as tablets to be able to use PCC in many different locations.
- About information system security, having pre-planned incident response steps would help for an immediate and more organized response and can spare many unnecessary business impacts and associated reputational harm. When a security incident occurs, every second matters.