Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
1
2
3
4
5
6
7
8
10
11
12
13
14
15
16
19
11:00 AM - Charmalot 2025
20
21
22
23
24
25
26
27
29
1
2
3
4
5
Oracle Health and Life Sciences Summit 2025
2025-09-09 - 2025-09-11    
12:00 am
The largest gathering of Oracle Health (Formerly Cerner) users. It seems like Oracle Health has learned that it’s not enough for healthcare users to be [...]
MEDITECH Live 2025
2025-09-17 - 2025-09-19    
8:00 am - 4:30 pm
This is the MEDITECH user conference hosted at the amazing MEDITECH conference venue in Foxborough (just outside Boston). We’ll be covering all of the latest [...]
AI Leadership Strategy Summit
2025-09-18 - 2025-09-19    
12:00 am
AI is reshaping healthcare, but for executive leaders, adoption is only part of the equation. Success also requires making informed investments, establishing strong governance, and [...]
OMD Educates: Digital Health Conference 2025
2025-09-18 - 2025-09-19    
7:00 am - 5:00 pm
Why Attend? This is a one-of-a-kind opportunity to get tips from experts and colleagues on how to use your EMR and other innovative health technology [...]
Charmalot 2025
2025-09-19 - 2025-09-21    
11:00 am - 9:00 pm
This is the CharmHealth annual user conference which also includes the CharmHealth Innovation Challenge. We enjoyed the event last year and we’re excited to be [...]
Civitas 2025 Annual Conference
2025-09-28 - 2025-09-30    
8:00 am
Civitas Networks for Health 2025 Annual Conference: From Data to Doing Civitas’ Annual Conference convenes hundreds of industry leaders, decision-makers, and innovators to explore interoperability, [...]
TigerConnect + eVideon Unite Healthcare Communications
2025-09-30    
10:00 am
TigerConnect’s acquisition of eVideon represents a significant step forward in our mission to unify healthcare communications. By combining smart room technology with advanced clinical collaboration [...]
Pathology Visions 2025
2025-10-05 - 2025-10-07    
8:00 am - 5:00 pm
Elevate Patient Care: Discover the Power of DP & AI Pathology Visions unites 800+ digital pathology experts and peers tackling today's challenges and shaping tomorrow's [...]
Events on 2025-09-09
Events on 2025-09-17
MEDITECH Live 2025
17 Sep 25
MA
Events on 2025-09-18
OMD Educates: Digital Health Conference 2025
18 Sep 25
Toronto Congress Centre
Events on 2025-09-19
Charmalot 2025
19 Sep 25
CA
Events on 2025-09-28
Civitas 2025 Annual Conference
28 Sep 25
California
Events on 2025-10-05
Articles

3 EHR Security Lessons from Anthem’s Security Breach

3 ehr security

Exclusive Article by Ronald Vatalaro at EMRIndustry.com

As the medical industry goes high-tech with the implementation of electronic health records (EHR), credit card companies are not the only targets catching the eye of cybercriminals.

A massive security breach made public in February at Anthem, the nation’s second largest health insurer, sheds light on the importance of security and vigilance as healthcare providers and others bring sensitive patient information into the world of e-healthcare.

About the Anthem Breach

The breach at Anthem, the medical insurer of one in nine Americans, occurred on Dec. 10, 2014. The compromise went undetected until Jan. 27, 2015, when a database administrator became aware of someone using his credentials to perform a suspicious query.

Just two days later, Anthem reported the findings of its internal investigation to federal authorities and the breach was made public on Feb. 4.

Anthem’s breach makes it very clear that vigilance is necessary as EHRs are implemented in practices and facilities across the country.

Safe data storage with networks and security processes designed to protect patient information that includes account numbers, names, addresses, Social Security numbers and more, must be created.

3 Key Takeaways

The highly publicized breach at Anthem teaches lessons all healthcare-related providers using EHRs can benefit from.

Three main takeaways from the cyberattack pinpoint the responsibilities providers and support agencies, such as insurance companies, have in safeguarding their patient and/or client information:

System Considerations

Selection of systems to handle the need for EHR must go beyond program features and bells and whistles. Organizations must seek out products that deliver security features consistent with their needs and the sensitivity of the information stored on patients’ behalf.

Sound EHRs offer the ability to limit access and provide screening controls so only authorized staff can access sensitive information.

In addition, user activity logging features provide audit trails that record all navigation in the system while features that require users to justify manual printing of information limit the potential for unauthorized screen printing and unauthorized downloading of information.

Seeking out and demanding informatics systems that offer these safeguards and more is fast becoming critical.

Recommendations for HIM Professionals

Health Information Management professionals find themselves in not just the role of organizing, collecting and managing patient data, but also making sure it is protected.

With that in mind, HIM professionals must ensure their EHRs offer the functionality necessary for the organization to meet regulatory and operational requirements while safeguarding patient information.

Recommendations for doing so include:

  • Identifying the location of information in the organization to verify state-specific guidelines
  • Identifying functions in the system that create risk and working to limit or restrict their use
  • Identifying security features that deliver higher levels of protection and implementing their use to safeguard sensitive information
  • When choosing an EHR system, it falls on HIM professionals to systematically and independently evaluate the system without relying on vendor information to gauge system functionality
  • Creating partnerships with IT counterparts to ensure the best functionality and security on a day-to-day basis

Security Features to Consider

Making sure EHRs deliver the necessary level of security to avoid breaches such as Anthem’s requires inclusion of a number of security features in the system itself.

These distinct features can make a difference in providing appropriate levels of protection:

  • Role-based security that restricts access to information based on pre-established categories of patients, encounters and documents based on specific job requirements of the user
  • VIP status indicators that enable restriction of identified patients and encounters to only those with VIP permissions
  • Ability to create an alias to mask patient identity
  • Ability to restrict physician access to only those patients the doctor serves as the physician of record for
  • Blocking abilities for specific progress notes or lab results
  • Ability to track and mask sensitive entries for release of information

Where to Turn for More Assistance

HIM professionals and others interested in learning more about how to safeguard sensitive patient data will find the federal government provides a clearinghouse of information on privacy and security via HealthIT.gov.

This website provides step-by-step plans for ensuring patient privacy and security, offers advice on how to integrate privacy and security into a medical practice and discusses privacy and security in regard to meaningful use, among other crucial topics.

As EHRs take the practice of medicine further into the high-tech world, cybercriminals are taking note. Safeguarding sensitive information is critical for protecting patients and their identities.

As the Anthem breach demonstrates, this brave new world is giving rise to potential pitfalls that HIM professionals must serve as sentinels against.

Ron Vatalaro works at Bisk Education with the USF Health online and writes about health informatics. Ron holds an advanced degree in Business Administration with a concentration in technology.

Take the USF Health Online 2015 Health IT Industry Survey .