Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Articles

How Hospitals Can Increase Data Security

increase data security

How Hospitals Can Increase Data Security

Data security is an ever-growing concern for businesses as more and more data moves online. Because hospitals store tons of highly sensitive data, they have a greater concern than most for ensuring their data is secure. It’s rare for a hospital to take every security measure they possibly could, and every weakness in the shell is another opportunity to improve defenses. Here are a few ways hospitals can start creating a nearly fireproof layer of security.

1. Solid Security Culture

No amount of security measures are going to keep a hospital safe from data breaches if everyone isn’t on board. The weakest link in any line of defense when it comes to cybersecurity is going to be the user, which means that anyone with access to sensitive data needs to have some level of training on best practices. Once in a while, someone will get a little sloppy and use a weak password or click on a link without checking to make sure it’s safe first.

To make sure this doesn’t happen frequently enough to be a problem, a culture of security has to be established within the hospital staff. There should be policies that are taught, upheld, and then enforced with extreme consistency, as integral to employee training as learning about the average 401k return. Some key policies include things like using multi-factor authentication, using strong passwords, and changing passwords regularly. Training on new software and ongoing education about cybersecurity should be ongoing, and employees should be encouraged to take responsibility for their own conduct.

2. Computer “Hygiene”

In an ideal world, a hospital would be able to employ IT experts to help them start and use their computers with efficiency and safety. But, in reality, it’ll be mostly healthcare employees without much expertise in that area. That’s why it’s very possible for computers to be used for years before anyone realizes that there is no antivirus software installed or tons of background apps are running for no reason.

There should be some guidelines established for making sure any employee can effectively start and use a hospital computer. It’s also important to regularly maintain and update your hardware and software and ensure that appropriate antivirus and anti-malware apps are installed. Over time, it’ll become necessary for any hospital to clean out old information, such as old employee accounts. Any data that is no longer being used should either be gotten rid of or archived, and any computer that is thrown out should be sanitized beforehand.

3. Mobile Device Protection

More and more healthcare operations are moving onto mobile devices, which has been a great innovation in making healthcare more accessible. However, mobile devices are automatically at greater risk than a stationary computer, because they’re more likely to be lost or stolen. Information contained on cell phones or laptops can also be corrupted more easily by electromagnetic interference, and information can easily be accidentally shown to unauthorized individuals.

That’s why it’s important for hospitals to assess whether the action is worth the risk – if there isn’t a good enough justification for sending sensitive information via mobile device, then it should probably be kept to computers. If the hospital goes forward with the data transfer, it’s important for that data to be encrypted, ensuring that if it is intercepted it will be impossible to steal. There should be concrete policies regarding taking hospital devices out of the building, such as for an employee working from home.

4. Emergency Plans

Lastly, it’s important for hospitals to be prepared in case a data breach does occur. Part of this is performing regular backups to external data servers so the information is safe no matter what. There should also be an order of operations and a clear line of authority established so that everyone knows their role in case of an emergency. The faster a situation can be resolved, the faster healthcare workers can get back to treating patients and saving lives.