Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
3
4
5
7
8
10
11
12
15
16
17
18
19
21
24
25
26
27
30
31
1
2
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Adva Med 2014 The MedTech Conference
2014-10-06    
All Day
Adva Med 2014 The MedTech Conference October 6-8, 2014 McCormick Place Chicago, IL For more information, visit, advamed2014.com For Registration details, click here  
Public Health Measures Meaningful Use
2014-10-09    
12:00 pm - 12:45 pm
Public Health Measures Meaningful Use: Reporting on Public Health Measures Join Meaningful Use expert Jim Tate for a three part series of webinars addressing MU [...]
2014 Hospital & Healthcare I.T. Conference
2014-10-13    
All Day
Join us at our 2014 Hospital & Healthcare I.T. Conference and experience the following: Up to 125 Hospital & Healthcare I.T. executives from America’s most prestigious [...]
Connected Health Care 2014
Key Trends That will be Discussed at the Conference! Connected Healthcare 2014 is set to explore the crucial topics that are revolutionizing the connected health industry: [...]
HealthTech Conference
2014-10-14    
All Day
HealthTech Capital is a group of private investors dedicated to funding and mentoring new "HealthTech" start ups at the intersection of healthcare with the computer [...]
Health Informatics & Technology Conference (HITC-2014)
2014-10-20    
All Day
Information technology has ability to improve the quality, productivity and safety of health care mangement. However, relatively very few health care providers have adopted IT. [...]
HIMSS Amsterdam 2014
2014-10-20    
12:00 am
About HIMSS Amsterdam 2014 This year, the second annual HIMSS Amsterdam event will be taking place on 6-7 November 2014 at the Hotel Okura. The [...]
Patient Portal Functionality and EMR Integration Demonstration
2014-10-22    
2:00 pm - 3:30 pm
This purpose of this webcast is to present a demonstration to show how the Patient Portal integrates with EMR, as well as discuss how this [...]
Connected Health Symposium 2014
Symposium 2014 - Connected Health in Practice: Engaging Patients and Providers Outside of Traditional Care Settings Collaborating with industry visionaries, clinical experts, patient advocates and [...]
CHIME College of Healthcare Information Management Executives
2014-10-28 - 2014-10-31    
All Day
The Premier Event for Healthcare CIOs Hotel Accomodations JW Marriott San Antonio Hill Country 23808 Resort Parkway San Antonio, Texas 78761 Telephone: 210-276-2500 Guest Fax: [...]
The Myth of the Paperless EMR
2014-10-29    
2:00 pm - 3:00 pm
Is Paper Eluding Your Current Technologies; The Myth of the Paperless EMR Please join Intellect Resources as we present Is Paper Eluding Your Current Technologies; The Myth [...]
Events on 2014-09-30
Events on 2014-10-02
Events on 2014-10-06
Events on 2014-10-09
Events on 2014-10-13
Events on 2014-10-14
Connected Health Care 2014
14 Oct 14
San Diego
HealthTech Conference
14 Oct 14
San Mateo
Events on 2014-10-20
HIMSS Amsterdam 2014
20 Oct 14
Amsterdam
Events on 2014-10-23
Events on 2014-10-28
Events on 2014-10-29
Articles

5 Ways to Avoid a Healthcare Data Leak

Exclusive Article By Lindsey Patterson at EMRIndustry

If you are in the healthcare industry, you need to protect your data. If it is leaked, you are putting patients’ information on the open market. Not only is this bad for your records, but it could get you into legal trouble. Here are five ways to avoid being hacked:
1. Assess Your Data Threat Model

The first step to keeping a leak from happening is understand that you are vulnerable. Even major governments can be hacked. And you need to understand your threat model. This means where the threats are coming from.

There are various places your threat could come from. The first is inside your company. The employees that work for you have access to a lot of data. If they become disgruntled, they could decide to destroy it or even sell it to the black market.

The other threat vector is ransomware. This is a virus that a hacker puts on your system. They then steal your data and threaten to lock you out of your system or sell your information if you don’t pay them a huge ransom.
2. Phishing Training

One of the ways that hackers can get to your information to leak it is through the phishing scam. This is an email strategy where they impersonate people in your company and trick other workers into clicking on a link that appears to be authentic, such as a file of patient information. When they click it, it runs software that sucks data out of the system and posts it online. Make sure you have phishing training to identify what kind of links are suspicious and what to do if they are uncertain that someone is who they say they are.
3. IT Staffing

Protecting your data involves a lot of network administration. You need to use the right code and the right setup. Therefore you need to invest in the IT staff you have on hand. Hire more workers if you feel that you are understaffed. And make sure to verify employment information to see that they have the right certifications and no criminal background.
4. Monitor Your Network

If you don’t monitor your network, you won’t know that something strange is going on. When someone hacks your system to get to your data, they will often hide low once they gain access. Then they will extract the data slowly or watch your data from the inside of the system. Then, they will attempt to move it to another server to leak it completely. Hired managed detection and response providers can watch your network and respond by locking down the network or analyzing the threat before it gets to be too late to stop the data from leaking.
5. Upgrade Your Equipment

If you have old equipment, it could threaten your ability to keep your data safe. Older equipment has been on the market longer so there are more threats that have been designed to get around it. It might not have the right security protocol already built in or the power to keep up with advanced viruses that hackers would use to target it.

 

It is always worth upgrading your hospital’s equipment to ensure they are protecting your data at all levels. All it takes is one leak to wreak havoc on your entire business in a few minutes.

 

The healthcare industry is one of the most vulnerable to data hacks. If your data is leaked or locked down for ransom, the money needed to clean up the mess could bankrupt you. So use the best practices above and enjoy the peace of mind that your data is protected.