Free Essay. Challenges Facing Living Hope Facility Regarding Data Security: Email Phishing

Published: 2023-11-15
Free Essay. Challenges Facing Living Hope Facility Regarding Data Security: Email Phishing
Essay type:  Process essays
Categories:  Data analysis Cyber security Social issue
Pages: 6
Wordcount: 1650 words
14 min read

In the modern corporate world, various organizations have adopted the use of modern technology applications in improving the facility's practices and patients' service outcomes. Keeping health records is one of the sectors in healthcare that depends on the use of modern technology applications (Butt et al., 2019). Living Hope Facility has also applied the use of data management systems to keep the patients' records for proper healthcare service provision. However, the protection of data at the Living Hope Healthcare Facility has faced continuously significant challenges. Living Hope Facility faces numerous healthcare data security challenges such as email phishing that evolves continually due to the complications of the technology and providers working to stay current. Therefore, this practicum proposal portfolio evaluates the challenges encountered at Living Hope Facility concerning data security.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Vision and Mission Statement

For the completion of the practicum proposal portfolio, Living Hope Facility is the leading organization selected for the project. Living Hope Facility can be described as a small homecare agency whose main objective is patients' safety and quality care. The evaluation of the challenges facing Living Hope Facility related to data security is aligned to the idea that the facility is much focused on promoting the patient's safety and quality care through securing their health records and personal data. The focus of evaluating the challenges encountered by the organization concerning data security context would be applicable where the vision would be used in envisioning an adaptive practice for finding solutions to solve the problems on the patient's data security records (Alaba et al., 2019). The mission and vision of ensuring the organization provide excellent services for patient's safety, and quality care would be used purposely in generating the original idea and contexts of proper healthcare services to the targeted parties. Therefore, the project practicum proposal is much applicable in encouraging the mission and vision of the Living Hope Facility in promoting the patient's safety and quality care outcome.

Background of Project Impetus

The context of email phishing as a challenge of the data security faced at Living Hope Facility has developed into one of the significant challenges in proper healthcare service provisions. Emails are fast, highly effective, and low- priced communication means. Nonetheless, as a result of the high data flow recorded in the facility, attacks through phishing emails have developed into a common challenge in the organization (Alaba et al., 2017). The technological evolutions and availability of myriads' positive implications, email phishing is considered one of the significant challenges that the facility faces concerning the data security elements and continuous technology evolutions. The email phishing attacks that is the major threat and a challenge to the data security at Living Hope Facility. Email phishing is defined as the fraudulent attempt used in obtaining sensitive data or information such as passwords, usernames and credit card details through disguising a patient's trustworthy entity as displayed in the electronic communication.

Literature Review

Since email phishing is identified as one of the significant data security threats encountered by the Living Hope Facility, it is useful for the description of the practicum proposal portfolio to evaluate some common challenges in data management. Phishing emails can be detected through adequate validation of website authentication (Miah, 2019). Discovering a phishing website can be attained through the use of a web browser on the side of the client or detecting through a web browser on the bottom of the client or detection through some software used at the host. The accuracy and integrity of the email phishing detective schemes can be determined through the application of different parameters (Paul et al., 2018). Some of the influential parameters used in determining the email phishing concepts that are threats to the facility operations are applied. For instance, the parameters include marking the websites known as phishing (true positive), classification of legitimate sites market as genuine (real negative), incorrect classification of websites marked as phishing (false positive) and identification of websites used for phishing that is also identified as legitimate (false negative).

The detections of the phishing emails can also be categorized depending on the analysis of the email structure. For instance, emails received from a legitimate organization or individual would address the recipient by name. The presentation of a general condition is considered a valuable marker for detecting the phishing email (Faroqi et al., 2019). Also, the email content, such as salutation, suggests the authentication of the email. For instance, most authentic organizations do not use emails in requesting sensitive information from their users. Also, an email containing an external link or attachment and provisions requests would be used for providing confidential information for the service delivery. The legitimacy of the email can also be evaluated depending on the spelling of the email. Legitimate organizations keep their top attention on grammar thus, they rarely have spelling errors. Therefore, in the case where users encounter wrongly spelled emails, there is a possibility of a security threat in their data that they might share by mistake to the criminals (Faroqi et al., 2019). Therefore, the schemes applied in identifying the email phishing as data security threats remain vast. Nevertheless, the identification of the potential email phishing through email structure, machine learning, and website authentication are the conventional methods used in preventing the developing challenges encountered at Living Hope Facility relating to the data security challenges.

Gap Analysis

The availability of data is essential for ensuring proper healthcare service delivery. The Living Hope Facility considers safe data as one of the crucial steps needed in satisfying its mission and vision as an organization for the proper healthcare service provisions. The emerging challenge on data security management, such as email phishing, only threatens the general application and implementations of the ideas and contexts of operations that would only limit the organization's performances and management practices (Paul et al., 2018). Therefore, the Living Hope Facility primarily develops the most effective approach needed in identifying the potential threat to the email phishing that would put the healthcare service delivery by the facility at danger at a danger. Therefore, the users have to apply various methods in identifying the legitimate and risky engagement of the sites and criminals who might be intending to get the sensitive information they want for ruining the healthcare service provisions.

Project Charter, Scope, and Objective

The scope of a panel implementation is mainly influenced by the maintenance of all equipment, configurations, infrastructure, and user's awareness that would limit the exposure of the users and facility to the potential threats of email phishing as a challenge to the healthcare service delivery. Living Hope Facility applies the modern technological applications to ensure proper and effectively complete performances needed in supporting the detailed coordination of the events that should be used in providing the vision and mission of the facility is completely satisfied (Faroqi et al., 2019). Therefore, the evaluation of the email phishing threats as some of the sensitive security data threats encountered within the facility would be confidential and effectively applied in detailing some extensive and essential contexts to promote valid healthcare service deliveries. There are numerous approaches and evidence-based methods used significantly in realizing some useful practices to secure the users from potential criminals who might misuse their sensitive data (Miah, 2019). Therefore, the project team members and stakeholders must achieve the set objectives and evaluate the strategy for the project completion and implementation in general.

The tools that would be used in completing the project would include project conference training room, computers, dual docking stations, reliable data, and monitors that would all be incorporated to identify the data security challenges encountered within the organization. When assessing the project's approval, a matrix best performance index will be the most favorable (Paul et al., 2018). The reassigning and respondence to patient's issues regarding data security would be considered the critical baseline used in launching the project.

Implementation Plan

The creation of a planned strategy would mark the initial point needed in the initiation of the project implementation. Living Hope Facility would also play a significant role in developing stakeholders' consensus process among stakeholders on the issue of security challenges. The patient association would also be involved in the project implementation, where it would be accountable for the assessment of interests and concerns of the project creation and implementation plans (Alaba et al., 2017). The team involved in the project would be instrumental in brainstorming the ideas and supporting the healthcare staff who will help communicate the set plan of the project. The approach modification would be effectively used in describing the set method. Developing a set strategy would be the next project implementation plan context needed in facilitating the actual project that would ensure sufficient funding and support in the completion of the project.

Process and Procedure Involved

The completion of the project would mainly involve adequate brainstorming and communication of ideas with all healthcare members involved primarily from the Living Hope Facility engaged in data security management. Communication elements would be essential in the process of project development and application as it would address the data security, thus ensuring patients' safety and quality healthcare service provisions (Faroqi et al., 2019). The feedbacks of the patients and reactions to the provided information would result in the realization of the concepts of email phishing considered as the data security threats encountered at the Living Hope Facility.

Work Unit

Due to the advanced technology, the team would hold meetings for averagely fifty minutes through zoom links and other communication forms as part of the project implementation program. Sessions through zoom would include communication plans involving the stakeholders that would also intend the identification of the project's variations and progressive ideas. On the other hand, the information would be used in addressing areas of the project that need change, identification of the impacts that should be posed to the project, and identification of the proposed modification. The analysis of the cost-benefit follows, as well as a description of the improvement of project contexts.

Cite this page

Free Essay. Challenges Facing Living Hope Facility Regarding Data Security: Email Phishing. (2023, Nov 15). Retrieved from

Request Removal

If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism