Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
27
28
29
30
1
3
5
6
8
9
10
11
12
14
15
16
17
18
20
21
22
23
24
25
27
28
29
30
63rd ACOG ANNUAL MEETING - Annual Clinical and Scientific Meeting
2015-05-02 - 2015-05-06    
All Day
The 2015 Annual Meeting: Something for Every Ob-Gyn The New Year is a time for change! ACOG’s 2015 Annual Clinical and Scientific Meeting, May 2–6, [...]
Third Annual Medical Informatics World Conference 2015
2015-05-04 - 2015-05-05    
All Day
About the Conference Held each year in Boston, Medical Informatics World connects more than 400 healthcare, biomedical science, health informatics, and IT leaders to navigate [...]
Health IT Marketing &PR Conference
2015-05-07 - 2015-05-08    
All Day
The Health IT Marketing and PR Conference (HITMC) is organized by HealthcareScene.com and InfluentialNetworks.com. Healthcare Scene is a network of influential Healthcare IT blogs and health IT career [...]
Becker's Hospital Review 6th Annual Meeting
2015-05-07 - 2015-05-09    
All Day
This ​exclusive ​conference ​brings ​together ​hospital ​business ​and ​strategy ​leaders ​to ​discuss ​how ​to ​improve ​your ​hospital ​and ​its ​bottom ​line ​in ​these ​challenging ​but ​opportunity-filled ​times. The ​best ​minds ​in ​the ​hospital ​field ​will ​discuss ​opportunities ​for ​hospitals ​plus ​provide ​practical ​and ​immediately ​useful ​guidance ​on ​ACOs, ​physician-hospital ​integration, ​improving ​profitability ​and ​key ​specialties. Cancellation ​Policy: ​Written ​cancellation ​requests ​must ​be ​received ​within ​120 ​days ​of ​transaction ​or ​by ​March ​1, ​2015, ​whichever ​is ​first. ​ ​Refunds ​are ​subject ​to ​a ​$100 ​processing ​fee. ​Refunds ​will ​not ​be ​made ​after ​this ​date. Click Here to Register
Big Data & Analytics in Healthcare Summit
2015-05-13 - 2015-05-14    
All Day
Big Data & Analytics in Healthcare Summit "Improve Outcomes with Big Data" May 13–14 Philadelphia, 2015 Why Attend This Summit will bring together healthcare executives [...]
iHT2 Health IT Summit in Boston
2015-05-19 - 2015-05-20    
All Day
iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging for more. 3. [...]
2015 Convergence Summit
2015-05-26 - 2015-05-28    
All Day
The Convergence Summit is WLSA’s annual flagship event where healthcare, technology and wireless health communication leaders tackle key issues facing the connected health community. WLSA designs [...]
eHealth 2015: Making Connections
2015-05-31    
All Day
e-Health 2015: Making Connections Canada's ONLY National e-Health Conference and Tradeshow WE LOOK FORWARD TO SEEING YOU IN TORONTO! Hotel accommodation The e-Health 2015 Organizing [...]
Events on 2015-05-04
Events on 2015-05-07
Events on 2015-05-13
Events on 2015-05-19
Events on 2015-05-26
2015 Convergence Summit
26 May 15
San Diego
Events on 2015-05-31
Articles

5 Ways to Avoid a Healthcare Data Leak

Exclusive Article By Lindsey Patterson at EMRIndustry

If you are in the healthcare industry, you need to protect your data. If it is leaked, you are putting patients’ information on the open market. Not only is this bad for your records, but it could get you into legal trouble. Here are five ways to avoid being hacked:
1. Assess Your Data Threat Model

The first step to keeping a leak from happening is understand that you are vulnerable. Even major governments can be hacked. And you need to understand your threat model. This means where the threats are coming from.

There are various places your threat could come from. The first is inside your company. The employees that work for you have access to a lot of data. If they become disgruntled, they could decide to destroy it or even sell it to the black market.

The other threat vector is ransomware. This is a virus that a hacker puts on your system. They then steal your data and threaten to lock you out of your system or sell your information if you don’t pay them a huge ransom.
2. Phishing Training

One of the ways that hackers can get to your information to leak it is through the phishing scam. This is an email strategy where they impersonate people in your company and trick other workers into clicking on a link that appears to be authentic, such as a file of patient information. When they click it, it runs software that sucks data out of the system and posts it online. Make sure you have phishing training to identify what kind of links are suspicious and what to do if they are uncertain that someone is who they say they are.
3. IT Staffing

Protecting your data involves a lot of network administration. You need to use the right code and the right setup. Therefore you need to invest in the IT staff you have on hand. Hire more workers if you feel that you are understaffed. And make sure to verify employment information to see that they have the right certifications and no criminal background.
4. Monitor Your Network

If you don’t monitor your network, you won’t know that something strange is going on. When someone hacks your system to get to your data, they will often hide low once they gain access. Then they will extract the data slowly or watch your data from the inside of the system. Then, they will attempt to move it to another server to leak it completely. Hired managed detection and response providers can watch your network and respond by locking down the network or analyzing the threat before it gets to be too late to stop the data from leaking.
5. Upgrade Your Equipment

If you have old equipment, it could threaten your ability to keep your data safe. Older equipment has been on the market longer so there are more threats that have been designed to get around it. It might not have the right security protocol already built in or the power to keep up with advanced viruses that hackers would use to target it.

 

It is always worth upgrading your hospital’s equipment to ensure they are protecting your data at all levels. All it takes is one leak to wreak havoc on your entire business in a few minutes.

 

The healthcare industry is one of the most vulnerable to data hacks. If your data is leaked or locked down for ransom, the money needed to clean up the mess could bankrupt you. So use the best practices above and enjoy the peace of mind that your data is protected.