Systems Adminstrator
As your systems administrator person I am responsible for the
upkeep, configuration, and reliable operation of computer
systems; especially multi-user computers, such as servers.
The system administrator seeks to ensure that
the uptime, performance, resources, and security of the
computers he or she manages meet the needs of the users,
without exceeding the budget.
To meet these needs, a system administrator may acquire,
install, or upgrade computer components and software; provide
routine automation; maintain security policies; troubleshoot;
train or supervise staff; or offer technical support for projects.
Infrustructure of IT
Infrastructure components
Data center infrastructure often includes the power, cooling and
building elements necessary to support data center hardware.
The data center hardware infrastructure usually involves
servers; storage subsystems; networking devices, like switches,
routers and physical cabling; and dedicated network appliances,
such as network firewalls.
A data center infrastructure also requires careful consideration
of IT in
frastructure security.
This can include physical security for the building, such as
electronic key entry,
But in this case
Infrustucture management
an IT infrastructure must provide a suitable platform for all the
necessary IT applications and functions an organization or
individual requires. This means the design and implementation
of any IT infrastructure must also support
efficient infrastructure management.
The healthcare industry is going through tremendous change due
to the automation of patient care, causing huge impacts on IT
organizations. The entire system managing the interaction
between healthcare professionals and patients is dramatically
evolving, and will completely impact the way a hospital does
business.
Mobility continues to trend upward in healthcare, as doctors
make use of tablet devices at the bedside to access
Computerized Physician Order Entry systems (CPOE). These
orders are communicated over thenetwork to the medical staff in
other departments, such as radiology, giving them treatment
instructions on a specific patient. After these large images are
captured, they are stored and made available for analysis by the
physician, even at the bedside.
Ssecurity Breaches will affect these departments :
Human Resources
Finance
Accunts payable
Billing
Schedule
The Healthcare Organization as a System
Good leadership is important for the success of any
organization.
In a healthcare organization, good leadership is more than just
important—it is absolutely critical to the organization’s
success. Why is it so critical—but also challenging—in
healthcare organizations?
Breach in information Why Should Good Leaders Be
Concerned?
A recent Phonemon Institute survey reveals that, “for the first
time, criminal attacks are the number-one root cause of
healthcare data breaches.”5 “Cyber criminals recognize two
critical facts about the healthcare industry:
healthcare organizations manage a treasure trove of financially
lucrative personal information and
2) they do not have the resources, processes, and technologies
to prevent and detect attacks and adequately protect healthcare
data.”6
The reality is that the healthcare industry and those who have
access to or hold protected health information (PHI) have been
identified as prime targets and the attacks are becoming more
and more sophisticated.
In 2014 the FBI warned healthcare organizations that their
security is lax and that they are vulnerable to cyberattacks.
“The healthcare industry is not as resilient to cyber intrusions
compared to the financial and retail sectors, therefore the
possibility of increased cyber intrusions is likely . . . .”10
Healthcare information provides the necessary data to create
profiles for financial theft, access to bank accounts, as well as
to impersonate patients and obtain controlled substances.11
For the people whose data was compromised in the breach
it matters little who acquired their data or even how it was
acquired.
What matters most is that an organization they trusted with their
data didn’t do enough to protect it.”
Consumers/patients don’t care why or how you were breached.
Their only concern is what you are doing to fix it and why you
let this happen
Systems AdminstratorAs your systems administrator  person I am.docx

Systems AdminstratorAs your systems administrator  person I am.docx

  • 1.
    Systems Adminstrator As yoursystems administrator person I am responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers he or she manages meet the needs of the users, without exceeding the budget. To meet these needs, a system administrator may acquire, install, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train or supervise staff; or offer technical support for projects. Infrustructure of IT Infrastructure components Data center infrastructure often includes the power, cooling and building elements necessary to support data center hardware. The data center hardware infrastructure usually involves servers; storage subsystems; networking devices, like switches, routers and physical cabling; and dedicated network appliances, such as network firewalls. A data center infrastructure also requires careful consideration of IT in
  • 2.
    frastructure security. This caninclude physical security for the building, such as electronic key entry, But in this case Infrustucture management an IT infrastructure must provide a suitable platform for all the necessary IT applications and functions an organization or individual requires. This means the design and implementation of any IT infrastructure must also support efficient infrastructure management. The healthcare industry is going through tremendous change due to the automation of patient care, causing huge impacts on IT organizations. The entire system managing the interaction between healthcare professionals and patients is dramatically evolving, and will completely impact the way a hospital does business. Mobility continues to trend upward in healthcare, as doctors make use of tablet devices at the bedside to access Computerized Physician Order Entry systems (CPOE). These orders are communicated over thenetwork to the medical staff in other departments, such as radiology, giving them treatment instructions on a specific patient. After these large images are
  • 3.
    captured, they arestored and made available for analysis by the physician, even at the bedside. Ssecurity Breaches will affect these departments : Human Resources Finance Accunts payable Billing Schedule The Healthcare Organization as a System Good leadership is important for the success of any organization. In a healthcare organization, good leadership is more than just important—it is absolutely critical to the organization’s success. Why is it so critical—but also challenging—in healthcare organizations? Breach in information Why Should Good Leaders Be Concerned? A recent Phonemon Institute survey reveals that, “for the first time, criminal attacks are the number-one root cause of healthcare data breaches.”5 “Cyber criminals recognize two critical facts about the healthcare industry: healthcare organizations manage a treasure trove of financially lucrative personal information and 2) they do not have the resources, processes, and technologies to prevent and detect attacks and adequately protect healthcare data.”6
  • 4.
    The reality isthat the healthcare industry and those who have access to or hold protected health information (PHI) have been identified as prime targets and the attacks are becoming more and more sophisticated. In 2014 the FBI warned healthcare organizations that their security is lax and that they are vulnerable to cyberattacks. “The healthcare industry is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely . . . .”10 Healthcare information provides the necessary data to create profiles for financial theft, access to bank accounts, as well as to impersonate patients and obtain controlled substances.11 For the people whose data was compromised in the breach it matters little who acquired their data or even how it was acquired. What matters most is that an organization they trusted with their data didn’t do enough to protect it.” Consumers/patients don’t care why or how you were breached. Their only concern is what you are doing to fix it and why you let this happen