Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
3
4
5
7
8
10
11
12
15
16
17
18
19
21
24
25
26
27
30
31
1
2
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Adva Med 2014 The MedTech Conference
2014-10-06    
All Day
Adva Med 2014 The MedTech Conference October 6-8, 2014 McCormick Place Chicago, IL For more information, visit, advamed2014.com For Registration details, click here  
Public Health Measures Meaningful Use
2014-10-09    
12:00 pm - 12:45 pm
Public Health Measures Meaningful Use: Reporting on Public Health Measures Join Meaningful Use expert Jim Tate for a three part series of webinars addressing MU [...]
2014 Hospital & Healthcare I.T. Conference
2014-10-13    
All Day
Join us at our 2014 Hospital & Healthcare I.T. Conference and experience the following: Up to 125 Hospital & Healthcare I.T. executives from America’s most prestigious [...]
Connected Health Care 2014
Key Trends That will be Discussed at the Conference! Connected Healthcare 2014 is set to explore the crucial topics that are revolutionizing the connected health industry: [...]
HealthTech Conference
2014-10-14    
All Day
HealthTech Capital is a group of private investors dedicated to funding and mentoring new "HealthTech" start ups at the intersection of healthcare with the computer [...]
Health Informatics & Technology Conference (HITC-2014)
2014-10-20    
All Day
Information technology has ability to improve the quality, productivity and safety of health care mangement. However, relatively very few health care providers have adopted IT. [...]
HIMSS Amsterdam 2014
2014-10-20    
12:00 am
About HIMSS Amsterdam 2014 This year, the second annual HIMSS Amsterdam event will be taking place on 6-7 November 2014 at the Hotel Okura. The [...]
Patient Portal Functionality and EMR Integration Demonstration
2014-10-22    
2:00 pm - 3:30 pm
This purpose of this webcast is to present a demonstration to show how the Patient Portal integrates with EMR, as well as discuss how this [...]
Connected Health Symposium 2014
Symposium 2014 - Connected Health in Practice: Engaging Patients and Providers Outside of Traditional Care Settings Collaborating with industry visionaries, clinical experts, patient advocates and [...]
CHIME College of Healthcare Information Management Executives
2014-10-28 - 2014-10-31    
All Day
The Premier Event for Healthcare CIOs Hotel Accomodations JW Marriott San Antonio Hill Country 23808 Resort Parkway San Antonio, Texas 78761 Telephone: 210-276-2500 Guest Fax: [...]
The Myth of the Paperless EMR
2014-10-29    
2:00 pm - 3:00 pm
Is Paper Eluding Your Current Technologies; The Myth of the Paperless EMR Please join Intellect Resources as we present Is Paper Eluding Your Current Technologies; The Myth [...]
Events on 2014-09-30
Events on 2014-10-02
Events on 2014-10-06
Events on 2014-10-09
Events on 2014-10-13
Events on 2014-10-14
Connected Health Care 2014
14 Oct 14
San Diego
HealthTech Conference
14 Oct 14
San Mateo
Events on 2014-10-20
HIMSS Amsterdam 2014
20 Oct 14
Amsterdam
Events on 2014-10-23
Events on 2014-10-28
Events on 2014-10-29
Articles

Protect Yourself and Your Patients Protected Health Information

data security technologies

Protect Yourself and Your Patients Protected Health Information

Social engineering sounds so pleasant, like someone making introductions at a party. Unfortunately, it’s actually the practice of manipulating someone to disclose confidential information. If you work for a large company you may have been warned about social engineering in the form of people trying to find out more about your business or break into areas of your company to which they should not have access, like thieves dressed as computer repair man walking out with a company’s servers. What you might not consider is that social engineering can be aimed directly at you, as an individual, or to your medical provider to fraudulently acquire your personal information including protected health information. Here are some scams to be aware of as both a medical employee and a private individual, and ways to protect your personal information.

The Call

One method frauds use to try to get your data is through neighbor spoofing. Once again, this fun term isn’t what it sounds. Instead, the thieves will copy part of a phone number you recognize in the hopes you will think it is the number of a company with which you do business. This call can be to an individual patient, or to a medical provider. The caller will pretend to be whoever you expected and use this expectation to get you to reveal personal information they can use to steal your identity.

If you are a medical provider and want to prevent your number from being used in this way, it is important to make sure your numbers will always show up on a caller ID as your business name. You may also want to consider third-party help to see if this has already happened to your numbers and how you can manage it. If you are the person answering the phone, verify who is calling. If the caller ID didn’t clearly identify the caller, ask to call them back through their mainline, not a number the caller provides. If it will be difficult to reach the person, let them know you will call them back directly on the line they’ve given after you’ve verified their details with the business.

Never reveal your social security number over the phone. One company used numbers similar to a hospital’s but then switched the script when their calls were answered, offering a bogus credit card application that required applicants to give all their personal information. Other times the caller may indicate that there is some sort of time-sensitive emergency to throw you off balance and throw out common sense. There is always time to verify before you give out information.

The Email

Phishing is another form of social engineering that affects email. Scammers can again act like someone they are not. Protect yourself by double-checking the email address itself, not just the name that pops up with the email. Often these email addresses will look “off” in some way or have an excess of jumbled numbers and letters. While responding to scam emails isn’t a good idea, the worst option is clicking on any links they send. Right now ransomware attacks on protected health information are exploding. Ransomware holds your patients’ information hostage, threatening to reveal it and make it available for any fraudster to use. Of course, the best way to avoid this type of attack is to have effective network security and email filters, but the fact is that there is no way to avoid all scam emails. Make certain you and your staff are trained on what to look for in these phishing attempts.

No matter what, if a provider is contacting you, they shouldn’t need excessive personal information to verify who you are. Work with them ahead of time to know what data they need to verify who you are before they give you personal information by phone. If you are a provider your employees need to use these same common sense tactics to protect your patient’s data.