loader from loading.io

The Final Logoff - Streamlining Secure Departures

Shut The Backdoor

Release Date: 02/22/2025

The Final Logoff - Streamlining Secure Departures show art The Final Logoff - Streamlining Secure Departures

Shut The Backdoor

"Everyone who's part of a health care organization or health care tech has access to really private information. And getting that access removed from somebody who's leaving the organization is key." Key Moments 02:23 Streamlining Through Automation 05:55 Streamlining Tool Access and Security 08:54 Centralize Identity with Single Sign-On 11:41 Automated Offboarding: Quick and Secure 13:25 Automating Environment-Specific Challenges 17:10  Streamline Access to Protect Data 19:51 Streamlined Process vs. Disorganization Streamlining secure departures is not just an operational necessity;...

info_outline
A Trojan Horse - Hiring Malicious Actors show art A Trojan Horse - Hiring Malicious Actors

Shut The Backdoor

"Everybody in the hiring pipeline should really be looking out for this. Every person that touches a candidate has a chance to pick this up before someone gets hired." Key Moments 00:42 Insider Threats for Financial Gain 06:10 High-Profile Cybersecurity Incident Reporting 09:16 Healthcare Data Extortion Risks 10:40 Spotting Red Flags in Hiring 14:14 Security and HR Collaboration in Hiring 17:23 Identifying Security Red Flags 19:51 Verifying Candidate Authenticity Steps 23:34 On-Camera Hiring Best Practices There is a new security concern that is catching many off guard: hiring malicious...

info_outline
Introduction to Shut The Backdoor show art Introduction to Shut The Backdoor

Shut The Backdoor

Welcome to the debut episode of Shut the Back Door, a healthcare security podcast by Redox, hosted by Jody Mayberry alongside Redox’s own Matt Mock, CISO, and Megan McLeod, Security Engineer. This podcast is dedicated to protecting healthcare data one episode at a time. In this introduction, Megan and Matt explain Redox's mission as a leader in healthcare interoperability, enabling providers, payers, and health tech organizations to power better care through accelerated, real-time data solutions.  The podcast aims to bring Redox’s behind-the-scenes data security expertise to the...

info_outline
 
More Episodes

"Everyone who's part of a health care organization or health care tech has access to really private information. And getting that access removed from somebody who's leaving the organization is key."

Key Moments

02:23 Streamlining Through Automation

05:55 Streamlining Tool Access and Security

08:54 Centralize Identity with Single Sign-On

11:41 Automated Offboarding: Quick and Secure

13:25 Automating Environment-Specific Challenges

17:10  Streamline Access to Protect Data

19:51 Streamlined Process vs. Disorganization

Streamlining secure departures is not just an operational necessity; it’s a pivotal component of our organization's security framework. During our latest discussion, we explore how automating the final logoff process can transform the way we handle employee departures. Bill Easton, a skilled staff security engineer at Redox, joins to highlight practices that can enhance our security posture.

The overarching theme is that automation is king. Bill emphasizes that efficient offboarding begins with a central access system integrated with our HR information system. By automating access removal, we significantly reduce the chances of oversight and enhance security resilience. A streamlined, repeatable process ensures no system is left vulnerable due to manual mishaps.

Megan McLeod highlights the importance of role-based access rather than one-off permissions. This approach not only simplifies automation but also ensures that access can be efficiently managed across various roles within the company.

Bill shared his experience at Redox, where continuous improvement in automation is a priority. Even though achieving full automation is a journey, each step forward makes a difference. We’re currently at an 80:20 ratio, and the push for seamless automation continues.

To further safeguard our operations, Bill advises centralizing identity management through single sign-on (SSO). This strategy not only enhances user experience but also fortifies security by consolidating access control.

As we steadily build this framework, let’s ensure our team is aligned with these processes and ready to tackle future security challenges with precision and efficiency. As always, it’s about locking the back door to safeguard our most sensitive information.