Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Articles

5 Ways to Avoid a Healthcare Data Leak

Exclusive Article By Lindsey Patterson at EMRIndustry

If you are in the healthcare industry, you need to protect your data. If it is leaked, you are putting patients’ information on the open market. Not only is this bad for your records, but it could get you into legal trouble. Here are five ways to avoid being hacked:
1. Assess Your Data Threat Model

The first step to keeping a leak from happening is understand that you are vulnerable. Even major governments can be hacked. And you need to understand your threat model. This means where the threats are coming from.

There are various places your threat could come from. The first is inside your company. The employees that work for you have access to a lot of data. If they become disgruntled, they could decide to destroy it or even sell it to the black market.

The other threat vector is ransomware. This is a virus that a hacker puts on your system. They then steal your data and threaten to lock you out of your system or sell your information if you don’t pay them a huge ransom.
2. Phishing Training

One of the ways that hackers can get to your information to leak it is through the phishing scam. This is an email strategy where they impersonate people in your company and trick other workers into clicking on a link that appears to be authentic, such as a file of patient information. When they click it, it runs software that sucks data out of the system and posts it online. Make sure you have phishing training to identify what kind of links are suspicious and what to do if they are uncertain that someone is who they say they are.
3. IT Staffing

Protecting your data involves a lot of network administration. You need to use the right code and the right setup. Therefore you need to invest in the IT staff you have on hand. Hire more workers if you feel that you are understaffed. And make sure to verify employment information to see that they have the right certifications and no criminal background.
4. Monitor Your Network

If you don’t monitor your network, you won’t know that something strange is going on. When someone hacks your system to get to your data, they will often hide low once they gain access. Then they will extract the data slowly or watch your data from the inside of the system. Then, they will attempt to move it to another server to leak it completely. Hired managed detection and response providers can watch your network and respond by locking down the network or analyzing the threat before it gets to be too late to stop the data from leaking.
5. Upgrade Your Equipment

If you have old equipment, it could threaten your ability to keep your data safe. Older equipment has been on the market longer so there are more threats that have been designed to get around it. It might not have the right security protocol already built in or the power to keep up with advanced viruses that hackers would use to target it.

 

It is always worth upgrading your hospital’s equipment to ensure they are protecting your data at all levels. All it takes is one leak to wreak havoc on your entire business in a few minutes.

 

The healthcare industry is one of the most vulnerable to data hacks. If your data is leaked or locked down for ransom, the money needed to clean up the mess could bankrupt you. So use the best practices above and enjoy the peace of mind that your data is protected.