On [H]IT Security

Reviewing the Tools of Prevention

By www.SEO.com

Join Our Mailing List

There are a number of tools to fight negligence, including education, executing best practices and vigilance. More challenging is increasing [health] data protection [PHI] amid the surge in malicious attacks coming from inside and outside the organization.

Assessment

What’s encouraging? The Ponemon Institute says more companies are being proactive about data protection.

The infographic above, produced by SEO.com for Dell, gives a bit more context for the threat environment.

Conclusion

Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.

Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com

OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:

   Product Details 

4 Responses

  1. ”Rather than a library, [healthcare providers] have to think of themselves as running a bank and that may include using security cameras and guards to defend certain medical records.”

    – Abner Weintraub
    President of HIPAA Group Inc., a compliance consultancy to healthcare organizations. September 9, 2011.

    http://www.networkworld.com/news/2011/090911-hipaa-250659.html?page=1

    D. Kellus Pruitt DDS

    Like

  2. Stanford Hospital Breach Exposes 20,000 ER Records

    Spreadsheet uploaded to homework-help website exposed sensitive patient data for almost a year.

    http://www.informationweek.com/news/security/attacks/231601110

    Lou

    Like

  3. HIT Security

    For medical providers using mobile devices, Julie K. Taitsman MD JD from the Office of the Inspector General at the Department of Health and Human Services (HHS), cited these recommendations from the Office of the National Coordinator for Health Information Technology security:

    • Use encryption, a password or other user authentication.
    • Ensure wiping and/or remote disabling in case a device is stolen or lost.
    • Don’t use file-sharing. Do use firewalls.
    • Use security software to detect viruses, spyware, malware, and keep it current.
    • Don’t download apps casually; research them.
    • Don’t let your devices out of your control.
    • Use security when using public Wi-Fi.
    • Wipe devices clean before discarding them.

    Any other suggestions.

    Caleb

    Like

  4. It’s all shits and giggles until someone giggles and shits

    “Assessing The Financial Impact Of 4.5 Million Stolen Health Records – Within hours of the formal announcement to the SEC, the first putative class action law suit was filed against CHS in the state of Alabama (here ‒ subscription required). That suit, which will likely be one of many on behalf of 4.5 million patients, signals what will amount to millions of dollars in cost that CHS will incur as the result of the data breach. As a footnote, earlier this month, CHS settled a Department of Justice investigation into billing practices for $98 million. Clearly this has not been the best month for the 206 hospital system with over 31,000 beds in 29 states.”

    Dan Munro for Forbes, August 24, 2014

    http://www.forbes.com/sites/danmunro/2014/08/24/assessing-the-financial-impact-of-4-5-million-stolen-health-records/

    Darrell Pruitt DDS

    Like

Leave a comment