Over years, hospitals have adopted computerized data handling but with little emphasis on computer security. A hospital workstation stores administrative documents, patient data, analysis, research findings, among other digital documentation. It thus means that computers and workstations play a critical role in a hospitals general management and operations. To ensure safety and security of such data or information, it is essential to secure and safeguard the computers employed for such work. One of the most vulnerable points a workstation can be attacked is through way of information disclosure and physical accessibility ( Barrett et al., 2016) . A workstation not encrypted is easily accessible to a third party who can steal or manipulate already stored data. Malware is another opportunity through which a third party can access a workstation through trickery. A user in a workstation without a safe browsing application stands the chance of fraud from a malicious program thus compromising the security of the machine. The third risk is the end user who may attempt to access unauthorized software. By way of ignoring group policy and unrestricted users overriding safety command, a workstation could easily be compromised. Some of these actions include reconfiguring passwords, installing unknown applications and lack of passwords in critical accesses.
However, to ensure the safety of a personal computer in a workstation, the above risks can be minimized through application of several strategies and steps. These include configuring a write-protect password and hiding the screen saver option as the first step. Passwords ensure that a user’s accessibility is limited to a few applications. In the third step, a workstation needs to be patched by use of necessary security patches such as the Windows Server Update Service. Finally, end users can also be trained on best practices to safeguard the personal computer from viruses, malware, and malicious programs on the web ( Barrett et al., 2016) . Other essential security measures applicable to workstations in a hospital include not opening suspicious emails. Additional suggestions include limiting access to the personal computer, regular back up and communicating security measures with authorized personnel only.
Delegate your assignment to our experts and they will do the rest.
References
Barrett, J. G., Wright, C. J., Blake, V. R., Stehnach, T., & Jalan, R. (2016). U.S. Patent No. 9,288,218 . Washington, DC: U.S. Patent and Trademark Office.