Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
30
5
6
7
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
Federles Master Tutorial On Abdominal Imaging
2020-06-29 - 2020-07-01    
All Day
The course is designed to provide the tools for participants to enhance abdominal imaging interpretation skills utilizing the latest imaging technologies. Time: 1:00 pm - [...]
IASTEM - 864th International Conference On Medical, Biological And Pharmaceutical Sciences ICMBPS
2020-07-01 - 2020-07-02    
All Day
IASTEM - 864th International Conference on Medical, Biological and Pharmaceutical Sciences ICMBPS will be held on 3rd - 4th July, 2020 at Hamburg, Germany . [...]
International Conference On Medical & Health Science
2020-07-02 - 2020-07-03    
All Day
ICMHS is being organized by Researchfora. The aim of the conference is to provide the platform for Students, Doctors, Researchers and Academicians to share the [...]
Mental Health, Addiction, And Legal Aspects Of End-Of-Life Care CME Cruise
2020-07-03 - 2020-07-10    
All Day
Mental Health, Addiction Medicine, and Legal Aspects of End-of-Life Care CME Cruise Conference. 7-Night Cruise to Alaska from Seattle, Washington on Celebrity Cruises Celebrity Solstice. [...]
ISER- 843rd International Conference On Science, Health And Medicine ICSHM
2020-07-03 - 2020-07-04    
All Day
ISER- 843rd International Conference on Science, Health and Medicine (ICSHM) is a prestigious event organized with a motivation to provide an excellent international platform for the academicians, [...]
04 Jul
2020-07-04    
12:00 am
ICRAMMHS is to bring together innovative academics and industrial experts in the field of Medical, Medicine and Health Sciences to a common forum. All the [...]
6th Annual Formulation And Drug Delivery Congress
2020-07-08 - 2020-07-09    
All Day
Meet and learn from experts in the pharmaceutical sciences community to address critical strategic developments and technical innovation in formulation, drug delivery and manufacturing of [...]
7th Global Conference On Pharma Industry And Medical Devices
2020-07-08 - 2020-07-09    
All Day
The Global Conference on Pharma Industry and Medical Devices GCPIMD is to bring together innovative academics and industrial experts in the field of Pharmacy and [...]
IASTEM - 868th International Conference On Medical, Biological And Pharmaceutical Sciences ICMBPS
2020-07-09 - 2020-07-10    
All Day
IASTEM - 868th International Conference on Medical, Biological and Pharmaceutical Sciences ICMBPS will be held on 9th - 10th July, 2020 at Amsterdam, Netherlands . [...]
2nd Annual Congress On Antibiotics, Bacterial Infections & Antimicrobial Resistance
2020-07-09 - 2020-07-10    
All Day
EURO ANTIBIOTICS 2020 invites all the participants from all over the world to attend 2nd Annual Congress Antibiotics, Bacterial infections & Antimicrobial Resistance to be [...]
Events on 2020-06-29
Events on 2020-07-02
Articles

Nov 13: Five EHR security considerations for healthcare CIOs, CISOs

healthcare cios

Though EHR security is just one component of a healthcare C-level executive’s job description, securing EHRs has various sub-components and best practices as well. Depending on which day it is, a healthcare CIOs or CISO may focus on the EHR Meaningful Use Program’s certification standards, data encryption methods or how the organization technical infrastructure is going to affect data security. Read through these five EHR security considerations and learn the different approaches organizations take to data security.

1. Auditing for EHR Meaningful Use Certification Standards

Many healthcare organizations have already taken advantage of the federal EHR Meaningful Use Program and will continue to do so. But a key aspect to EHR certification under this program is data security. For example, David Sheidlower, CISO of Health Quest, recently told HealthITSecurity.com that Health Quest is well into Stage 1 Meaningful Use and completed some go-lives with our hospital EMR, it has a little more breathing room to work on the security framework for Stage 2 Meaningful Us. Any initiative around meaningful use is centered around meaningful use-compliant applications, balancing responsibilities isn’t easy. “With a risk assessment, evaluation of controls and a security framework, while I’m laser-focused on meaningful use requirements, I need to make sure I’m not ignoring other parts of the organization,” he said.

For Shafiq Rab, CIO and Vice President of Hackensack University Medical Center, meaningful use audits serve as a solid baseline for his overall security program. Rab explained that Hackensack University Medical Center has been through Stage 1 Meaningful Use security analyses and now it’s getting ready for Stage 2 Meaningful Use.

“We know that one day we’ll be audited and because of that we look to see if there are any deficiencies. From a few different risk assessments to multiple penetration tests to data loss prevention (DLP), we have put all those things in place,” he said. “And through those tests, we have a risk mitigation process where a committee meets every month and helps [uphold high security standards].”

2. Endpoint security

Every EHR security framework is (or should be) multi-layered and, as Ron Mehring, director of information security for Texas Health Resources, explained back in February, securing end points is an important consideration. Texas Health Resources views its architecture in layers and then applies non-technical and technical security approaches to each layer to protect information and systems.

We have a boundary layer security area with firewalls and intrusion prevention systems and an endpoint security layer where we’re securing different end points such as desktops, servers and mobiles devices.  We have that layer that resides, more or less, in between the boundary and endpoint security layers where we’re doing things such as database activity monitoring, managing privileged access, and integrity monitoring on specific high-value systems.

How does endpoint security fit into your architecture?

3. Going virtual

Infrastructure plans effect EHR security and vice-versa and C-level executives need to make the best operational and security decisions possible. Bruce Forman, Chief Information Security Officer (CISO) of UMass Memorial Medical Center, for example, said that UMass is moving toward a virtual desktop environment (VDI). This decision grants him more centralized access to the information, as it essentially never leaves the data center. But it also helps with UMass’s BYOD security initiative for laptops and for tablets since they will enter the environment in the same manner.

We encrypt all of our laptops and USB devices and have even started encrypting desktop devices because they’re getting smaller and smaller and easy enough to walk away with. With VDI, though, it matters less that the device is encrypted because you don’t attach to your own internal network and you can’t download the data virtually.

4. Encrypting data at rest and in motion

The onus is on a CIO or CISO to encrypt EHR data in a strong manner. There are a number of routes that these organizations can take toward encrypting data at rest and in motion. Vic Wadhawan, Chief Security Officer at the Drayer Physical Therapy Institute, said he uses a security vendor that supports Secure/Multipurpose Internet Mail Extensions (S/MIME) email encryption and Privacy (PGP) to alleviate some burden of managing keys and certificates.

But if organizations are looking for firm guidance on encryption, they can look at National Institute of Standards and Technology (NIST) publications on encryption. For example, the Department of Health and Human Services (HHS) uses NIST Special Publication 800-52 Revision 1 as a foundation for encrypting healthcare data in motion. And HHS still employs NIST Special Publication 800-111 for full disk encryption, volume and virtual disk encryption and file/folder encryption best practices.

5. EHR security audits

Just who’s going in and out of a healthcare organization’s network and potentially gaining access to EHR data? Nancy Davis, system director of privacy and security for Ministry Health Care, explained that her organization does EHR access auditing through a combination of internal and external auditing applications. Davis said step one should be to have an external auditing tool and then to continually examine audit reports. “Take care not to create audit reports and let them stack up without reviewing,” Davis said. “There should be a policy and auditing plan in place.”  source