Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
1
2
5
6
7
9
10
12
13
14
17
18
19
20
22
23
25
26
29
1
2
3
4
5
2014 OSEHRA Open Source Summit: Global Collaboration in Health IT
2014-09-03 - 2014-09-05    
8:00 am - 5:00 pm
OSEHRA is an alliance of corporations, agencies, and individuals dedicated to advancing the state of the art in open source electronic health record (EHR) systems [...]
Connected Health Summit
2014-09-04    
All Day
The inaugural Connected Health Summit: Engaging Consumers is the only event focused exclusively on the consumer-focused perspective of the fast-growing digital health/connected health market. The [...]
Health Impact MidWest
2014-09-08    
All Day
The HealthIMPACT Forum is where health system C-Suite Executives meet.  Designed by and for health system leaders like you, it provides an unmatched faculty of [...]
Simulation Summit 2014
2014-09-11    
All Day
Hilton Toronto Downtown | September 11 - 12, 2014 Meeting Location Hilton Toronto Downtown 145 Richmond Street West Toronto, Ontario, M5H 2L2, CANADA Tel: 416-869-3456 [...]
Webinar : EHR: Demand Results!
2014-09-11    
2:00 pm - 2:45 pm
09/11/14 | 2:00 - 2:45 PM ET If you are using an EHR, you deserve the best solution for your money. You need to demand [...]
Healthcare Electronic Point of Service: Automating Your Front Office
2014-09-11    
3:00 pm - 4:00 pm
09/11/14 | 3:00 - 4:00 PM ET Start capitalizing on customer convenience trends today! Today’s healthcare reimbursement models put a greater financial risk on healthcare [...]
e-Patient Connections 2014
2014-09-15    
All Day
e-Patient Connections 2014 Follow Us! @ePatCon2014 Join in the Conversation at #ePatCon The Internet, social media platforms and mobile health applications are enabling patients to take an [...]
Free Webinar - Don’t Be Denied: Avoiding Billing and Coding Errors
2014-09-16    
1:00 pm - 2:00 pm
Tuesday, September 16, 2014 1:00 PM Eastern / 10:00 AM Pacific   Stopping the denial on an individual claim is just the first step. Smart [...]
Health 2.0 Fall Conference 2014
2014-09-21    
12:00 am
We’re back in Santa Clara on September 21-24, 2014 and once again bringing together the best and brightest speakers, newest product demos, and top networking opportunities for [...]
Healthcare Analytics Summit 14
2014-09-24    
All Day
Transforming Healthcare Through Analytics Join top executives and professionals from around the U.S. for a memorable educational summit on the incredibly pressing topic of Healthcare [...]
AHIMA 2014 Convention
2014-09-27    
All Day
As the most extensive exposition in the industry, the AHIMA Convention and Exhibit attracts decision makers and influencers in HIM and HIT. Last year in [...]
2014 Annual Clinical Coding Meeting
2014-09-27    
12:00 am
Event Type: Meeting HIM Domain: Coding Classification and Reimbursement Continuing Education Units Available: 10 Location: San Diego, CA Venue: San Diego Convention Center Faculty: TBD [...]
AHIP National Conferences on Medicare & Medicaid
2014-09-28    
All Day
Balancing your organization’s short- and long-term needs as you navigate the changes in the Medicare and Medicaid programs can be challenging. AHIP’s National Conferences on Medicare [...]
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Events on 2014-09-04
Connected Health Summit
4 Sep 14
San Diego
Events on 2014-09-08
Health Impact MidWest
8 Sep 14
Chicago
Events on 2014-09-15
e-Patient Connections 2014
15 Sep 14
New York
Events on 2014-09-21
Health 2.0 Fall Conference 2014
21 Sep 14
Santa Clara
Events on 2014-09-24
Healthcare Analytics Summit 14
24 Sep 14
Salt Lake City
Events on 2014-09-27
AHIMA 2014 Convention
27 Sep 14
San Diego
Events on 2014-09-28
Events on 2014-09-30
Events on 2014-10-02
Articles

6 Ways Healthcare Facilities Can Address Cybersecurity Threats

cybersecurity

6 Ways Healthcare Facilities Can Address Cybersecurity Threats

Healthcare institutions are responsible not only for the physical health of patients but for their personal data. The Health Insurance Portability and Accountability Act requires facilities to guard the confidentiality of protected health information, which includes contact information as well as medical records, and imposes penalties on entities that fail to do so. Data breaches can be costly not only in terms of fines and reparations to affected patients but to reputation.

Not only that, but a cyberattack can also affect doctors’ and hospitals’ ability to provide care to patients. Like almost every other industry, health care facilities now rely heavily on computers and other internet-connected devices. While these are convenient, they also increase vulnerability to cyberattack. The last few years have seen the rise of ransomware, a type of malicious software that encrypts all the records in a system with a message that the creator of the malware will only reverse the encryption upon receiving a hefty payment. With the system inaccessible, it becomes difficult, if not impossible, for doctors to perform imaging studies and surgeries, even on critically ill patients.

Cybersecurity for healthcare facilities is therefore a life-and-death matter. While 92% of organizations that operate such facilities are confident in their ability to respond appropriately to an online attack, it never hurts to perform an audit and look for ways to improve.

1. Control Access to PHI

No one should have the ability to view protected health information unless he or she has a reason to see it. Therefore, access in the form of passwords and clearance should never be provided to unauthorized personnel. Systems should have different types of authentication in place to prevent unauthorized access from either inside or outside the facility, whether on purpose or by accident.

2. Protect Connected Devices

Any portable electronic device used to store, access, or share patient information with authorized personnel should be carefully protected, including devices such as tablets, smartphones, and laptops. This means cybersecurity measures, such as antivirus software and firewalls, but it also involves physical safeguards. For example, all such devices should be password protected and encrypted in case they fall into the wrong hands.

3. Use Strong Passwords

People often create weak passwords, or just keep the defaults, because they are easier to remember. However, these are easier for unauthorized personnel to figure out. Therefore, they do not provide adequate protection. Employees of a healthcare facility should receive instruction on how to create a strong password, what to do with the password once created, and how often to switch to a new password. Weak passwords are responsible for over half of all healthcare data breaches.

4. Maintain Antivirus Software

Those who launch cyberattacks are always looking for vulnerabilities in antivirus software that they can exploit. Therefore, the software is not something that a healthcare facility can just install once and then forget about. To provide adequate protection, it requires occasional updates so that it is ready to meet and defend against the most recent threats.

5. Prepare for the Unexpected

Despite the best efforts of the facility’s management and staff, data breaches and other cyberattacks may happen occasionally. Health care organizations can mitigate the damage done by backing up all files and records in a system separate from the main network in case of a ransomware attack. This means that the information will be accessible and patients can receive the care they need when they need it.

6. Limit Network Access

Do not allow just anyone to install applications or software on computers and other devices connected to the system. Require that they receive the permission from the proper organizational authorities first.

Rarely, if ever, do health care employees or management intentionally cause a data breach or leave the system vulnerable to cyberattack. Rather, it is the result of thoughtlessness or carelessness. Nevertheless, the consequences are significant for the patients and the facility alike. Facilities should be diligent about fostering a culture of security among all staff members.