High Profile Healthcare Security Hacks - How to prevent them

[vc_row][vc_column][vc_column_text]9.8

On Thursday, September 4, huffingtonpost.com reported how a hacker successfully broke into HealthCare.gov and installed malicious software on one of its servers.
The security of HealthCare.gov is a sensitive issue and risk assessments are being taken to address the vulnerabilities and increase security. These recent high-profile data breaches are leading healthcare industries to modify their approach with new security software and processes.
"Data was not transmitted outside the agency, and the website was not specifically targeted," said Kevin Griffis, a senior adviser at the Department of Health and Human Services. "We have taken measures to further strengthen security."

Steps to prevent security hacks:

  • Risk Assessment: Remind employees to be watchful of electronic devices and/or paper records left unattended. More often than not data breaches occur due to theft of these items from a home, office or vehicle. While it is IT’s job to safeguard patient information, employees should be reminded to do their part in keeping data safe as well.
  • Sub-networks: Ensure that networks made available for public use do not expose private patient information. One way of achieving this is to create sub-networks dedicated to guest activity and separate more secure networks for medical devices and applications that transmit and carry sensitive patient data.
  • Identity: With so many members of the healthcare system frequently accessing patient information, it is important to carefully manage identity of users. For instance, make sure users at each level are only granted access to information pertinent to their position and that log on/off procedures are easy on shared machines. Automation of this system helps create a “paper trail” and ensures efficiency and safety for all involved.


Considering outsourcing your IT needs? In search of a Managed Service Provider? Fill out the contact form below or call us at 800-550-3795 to speak with an expert.

[/vc_column_text][vc_raw_js]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[/vc_raw_js][/vc_column][/vc_row]

Continued Reading

Compliance

Managed Solution Team Takes The ALS Ice Bucket Challenge

The Ice Bucket Challenge has a special meaning to one […]

LEARN MORE

Mobile Security - Password 123

[vc_row][vc_column][vc_column_text] Mobile security and password protection are popular topics in […]

LEARN MORE

Contact us Today!

Chat with an expert about your business’s technology needs.