Call Us +1-555-555-555
Optisave Logo

IT Security

January 8, 2021
lock with chains on top of laptop keyboard

Any CIO at a hospital or health system will tell you that one of the main things which keeps them up at night is securing critical patient and organizational information. Featured prominently in their nightmares are both internal and external IT security threats including:


  • Phishing
  • Malware
  • Distributed Denial of Service (DDoS)
  • Brute Force or Hacking
  • Ransomware
  • TrojanVirus and Worms
  • Spyware
  • Keyloggers
  • Disgruntled employees


In addition, data breach, device misconfiguration, Bring Your Own Device (BYOD), insecure interfaces and APIs, and malicious insider threats are among the top security threats that will continue to haunt firms failing to invest in a robust IT security strategy. The objective of an IT security policy is the preservation of confidentiality, integrity, and availability of systems and information used by an organization’s members.Optisave professionals have the expertise and experience to assist CIOs and their staff in evaluating solutions to mitigate risks associated with IT security threats and optimize client solutions to assure maximum vendor value. 


KEY IT SECURITY EXPOSURE AREAS:  


Voice and Data Network

Protecting the network involves both hardware, and software as well as configuration management. This also includes internal and remote access. Typical items are firewalls, intrusion detection equipment and remote access software.


Client Devices and Servers

For the most part, protecting these devices involves software, and configuration management. This includes antivirus/antimalware software, password management software, encryption software, email protection and software management solutions. Additionally, education is important to make end users aware of the various threats and how to protect against them.


Bring Your Own Device (BYOD)

With the movement to a BYOD environment in many organizations, hospitals must recognize there are real vulnerabilities that need to be addressed. A typical solution is software which can be installed on these devices to manage and protect corporate information, for example:


  • Secure texting 
  • VPN to encrypt outbound communication
  •  MDM – Mobile Device Management 


Wearable Medical Devices

While increased use of networked wearable medical devices is an exciting healthcare development, it creates new and serious security exposure. In 2019, the U.S. Food and Drug Administration (FDA) issued a warning about security flaws affecting dozens of implantable cardiac defibrillators. Cyberattacks can be initiated by introduction of malware into equipment or unauthorized access to configuration settings and data—not only in the devices, but also in hospital or other networks to which they are connected.


Working from Home

The sudden lockdowns in March 2020 drove millions to work from home. But hackers quickly found new ways to target companies by focusing on the employees themselves. Bugs in enterprise software left corporate networks open to attack. The flood of personal devices logging onto the network — and the influx of malware with it — introduced a unique havoc.


Vendor Strategy

Should you reduce the number of security software and service vendors and move towards more complete suites to reduce costs or use a multiple vendor approach for different points of view? Hybrid solutions for connected on-premises and cloud software are driving new license models and metrics that need to be carefully managed to prevent explosive growth in costs.


Optisave IT Security Optimization Success Stories:


  • Assisted a very large West Coast healthcare system with over 120,000 users by negotiating an agreement including on-premises, cloud, and hybrid security that eliminated more than 12 security applications that simplified administration, reduced complexity of onboarding/off-boarding, and lowered annual costs by more than $2 million annually


  • Developed a technology roadmap including applications and security for a global furniture manufacturer and negotiated an agreement with a key supplier to provide consolidated security for on-premises, IAAS, PAAS, and SAAS solutions, reducing annual costs more than $450,000 per year.


  • Negotiated best of breed approach of on-premises and cloud security providers for a South Central regional healthcare provider, lowering annual costs by over $300,000.



Contact us now to learn more about optimizing your IT Security Solutions.

Additional Blog Posts


November 26, 2024
Most health systems pay for support and/or maintenance on hardware and software on an annual or multi-year basis. This includes clinical and financial software applications and desktop and network equipment, as well as data center hardware and software. Usually, support is manufacturer-provided and purchased either directly or through a Value Added Reseller (VAR). Third Party Maintenance (TPM) - Original Equipment Manufacturer (OEM)-authorized/OEM-independent maintenance – is increasingly common in the hardware and software support market, with a thriving ecosystem of independent support providers for specific software, server, storage and networking equipment. IT organizations selectively use TPM providers to cost-effectively extend IT asset life and control OEM-forced upgrades. TPM, also known as aftermarket hardware and/or software support or post-warranty support, is popular when equipment warranty or service agreements end. TPM can be a cost-effective alternative to OEM support. TPM can offer multiple benefits: Cost: TPM providers are typcially significantly less expensive than the OEM Flexibility: TPM can be more flexible than OEM support. Responsiveness: TPM can often be more responsive to issues than OEM support. Communication: TPM providers are directly linked to OEM Level 3 support. Expertise: TPM providers offer broad expertise in hardware/software brands and manufacturers. Remote monitoring: TPM can provide remote monitoring to help identify potential network issues that could expose company data to cyber threats. TPM services can include: Software support including security patching Hardware support to include Replacement or repair of hardware On-site engineering assistance Remote monitoring Operating support Data backup CASE STUDIES A Southwest children’s hospital was renewing hardware support on its data storage equipment. After thorough evaluation of its requirements, they decided to identify and solicit bids for 3rd party support for one year. One requirement was that the selected vendor had certified engineers and replacement hardware, if needed. Additionally, the vendor needed to have the ability to integrate into the hospital’s trouble ticket system. With Optisave’s guidance, an appropriate 3rd party vendor was selected, and at a 60% lower cost than OEM support. The Microsoft Unified Support agreement was coming up for renewal at large Mid-Atlantic health system. Renewal cost was far greater than the health system had budgeted so they were willing to look outside Microsoft for support. Several qualified vendors were identified and an RFI was issued. Ultimately the health system worked with Optisave experts to select a vendor that not only had a significant amount of experience with health systems, but was also more than half the cost of what Microsoft was going to charge for the renewal. Optisave works with healthcare, financial services, manufacturing, and other complex organizations to determine whether Third Party Maintenance is right for them and select the ideal provider. Contact us today to start a conversation.
two women in call center
May 2, 2023
Contact Centers play a crucial role in achieving superior customer service. This may include Digital Front Door, Internal Help Desk, and all other communications contacts, internal or external to the organization, inbound, outbound, or blended.
blue puzzle pieces on black background
July 15, 2022
Optisave’s integrated advisory services provide solutions to key IT issues challenging organizations today. With consolidation and reorganization in complex industries such as healthcare, manufacturing and financial services, an important, yet often overlooked factor is how to optimize IT products and services after organizational transition.
Show More
Share by: