Cybersecurity, Healthcare, and You.

How much would you spend to get your life back? What about those of your patients? These are questions that many healthcare providers must ask themselves at one point or another. The healthcare sector has become one of the most popular among hackers and cyber criminals alike, simply because medical identity theft is an incredibly lucrative business. Millions of patient medical records were exposed in 2016 alone, and that number is projected to rise this year. In an industry moving towards value-based payment models, quality care must now include protecting patient health information using safe record-keeping practices. 

Cyber security is different for every organization
Healthcare data security is by no means "one size fits all." A small, rural practice will invest differently than a large, metropolitan hospital. Based on your business and your particular needs, you should identify what data is most important to protect, then plan your safety measures accordingly. Perhaps you'll realize that technoloy isn't what's needed, but people and processes instead. 

We're our own worst enemy
According to a recent study by the Information Systems Security Association (ISSA) and Enterprise Strategy Group (ESG), top contributors to cybersecurity risk areas are caused by the users rather than technological issues because many employees forget to follow basical cyber safety rules. It happens because of a wide range of reasons: lack of training and/or cybersecurity personnel, or simply that policies aren't truly enforced by the organization. Following your safeguards plays an important role in forming a trusting relationship between provider and patient. It's not just a collection of data you're protecting, it's someone's life. Let's discuss a few tips to get your organization's record-keeping practices on the right track. 

Establish a security culture
There's a major human blindspot with respect to information security: overconfidence. The "it will never happen to me" mindset. No matter the level of education or experience, the weakest link in any computer system is almost always the user. So, what can be done to ensure an organization-wide security culture?
Frequent education and training - Ongoing mitigation steps allowing for discipline, documentation and compliance. 
  • Avoid exceptionalism - You shouldn't have a get-out-of-jail-free card as an executive. Those who manage and advise should set an example and take every precaution needed - the same as everyone else - to safeguard sensitive information. 
  • Information security as a core value - It should without a doubt take a seat at the table of core values within your organization. When staff embraces accountability and willingness to take responsibility over information security, you know you truly have a shared vision.
Change STRONG passwords on a regular basis
Passwords are your first line of defense when preventing hacks into any computer. No matter what type of operating system, it should require a password to login. A strong password may not be able to completely deter a hacker, but it will definitely slow down their progress. Don't choose passwords that
        • Are found in a dictionary
        • Match your username
        • Include personal information - Your name, birthday, family member names, pet names, etc. 
        • Refer to anything on your social media pages - Anything found on your social pages like Facebook and Twitter should never be used as a password, whether your profiles are private or not. Anything you post on social media CAN be found and potentially used against you. 

        • What does a strong password look like?
                        • At least eight characters in length. The longer, the better! 
                        • A combination of upper AND lowercase letters, numbers, and at least one special character, like a punctuation mark. 

                        • Maintain good habits
                          Similar to eating fruits and vegetables or walking up the stairs instead of using the escalator in efforts to be healthier, a little goes a long way in system maintenance regimen. It's necessary to maintain the health of your systems and reduce risk of breach.
                                          • Uninstall software applications that aren't essential to running your practice - games, messaging applications, photo-sharing, etc. 
                                          • Don't simply accept default options when installing software on your device.
                                          • Read through your options and understand the choices thoroughly before accepting. 
                                          • Disable your file sharing and printing from remote staff. That could potentially result in accidental sharing of information along unauthorized locations. 
                          Plan for the unexpected: Use firewalls and anti-virus
                          Unless your practice is completely disconnected from the Internet, you should always use firewall and anti-virus to protect against malicious intrustions. The firewall inspects all messages coming in from the outside and decides whether or not the message should be allowed in based on pre-determined criteria. Anti-virus actually stops malicious software that has already surpassed your safety measures and entered the system. 

                          Control access to PHI - Both virtually and physically
                          Never forget that the devices that hold sensitive information should also be secured from unauthorized access. Believe it or not, the most common way that electronic health information is compromised is not through virtual attacks,but throught the loss of the physical device itself, both accidental and theft. Thumb and flash drives, CDs, DVDs, laptops, handhelds, desktops, hard drives, backup tapes, and even entire network servers can be physically removed and compromised. Securing these devices in locked rooms only accessible to limited staff members, managing physical keys, and restricting staff from moving devices from a secure area is a great start. 

                          In an industry that's shifting towards value-based care and payment models, true quality care cannot be accomplished without also taking the security of your patients' health information into consideration. Protecting patients through data security practice should become second-nature to your entire staff and executive team. Once it becomes of your organization's core values and you begin to anticipate the worst, you will truly create a long-lasting security environment both beneficial to the health and safety of your patients and your business. 

                          Want to learn more about protecting sensitive data with patients, employees, and third-party vendors? Join the Imagine Team for a free webinar TOMORROW, January 19, at 2PM EST! You can sign up here
                                                  .

Subscribe to our newsletter

First Name(*)

Last Name(*)

Company(*)

Email Address


Subscribe to Newsletter
Invalid Input