It is common for myths and speculation to surround cloud computing and healthcare as it is a fairly new combination. Many are confused regarding the technology and how it is utilized in the healthcare industry. Majority of the biased perceptions are due to misunderstandings which focus mainly on the issue of information security.

There are a lot of advantages that are offered by cloud computing that is not possible at all times with on-site solutions including a requirement for authentication before access control is granted, redundancy of the data center and its high level of availability, advanced encryption, multi-tenant segmentation, security in both software and physical system and regulatory compliance.

There are proofs that cloud services will soon be utilized by security industry and other industries.

According to the CEO of Biscom, Bill Ho, people are of the notion that when a company is investing on a certain service or a particular application then they are planning to provide higher level of experience and a dedicated expertise to their customers.

There are a lot of cloud provides that provides tools as well as integration points for their clients to make sure that their applications and data are given the highest level of protection. This is to ensure that there will be no data loss and breaches in the future. The security that the cloud provider offers is only half of the equation because the remaining half still depends on the hospital as it is their responsibility to make sure their data assets are fully secured.

But according to the product marketing manager of a software company, Krishnan Subramanian, data isolation is not the way to prevent malware and threats from occurring. The number of hospitals that are transitioning to cloud computing is slowly increasing thus the security and IT department should be well aware that the responsibility for cyber security is delineating.

There should be a joint effort between the provider of cloud computing and healthcare in order to make sure that the data stored are all secured and no undesirable breaches are to happen in the future. Each of the party is responsible for securing their part of the equation.