5 Ways Health Care Can Achieve Stronger Data Security

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 Ways Health Care Can Achieve Stronger Data Security-3 Next

Enforce Policies on Lost or Stolen Devices

Forty-three percent of data breaches are due to lost or stolen devices, with smartphones and tablets outranking desktop and laptop computers as the devices most likely to go missing. There are numerous examples of employee negligence-related data leakage. At Oregon Health & Science University (OHSU) the PHI of approximately 1,000 patients was exposed when an unencrypted laptop was stolen from an employee's car. In a separate breach, also at OHSU, the PHI of 14,000 patients was compromised when an unencrypted thumb drive was stolen from an employee who brought it home without authorization.

Even when devices are stolen, encryption can prevent data getting into the wrong hands. This makes it vital for organizations to not only implement clearly-defined procedures for protecting mobile and employee-owned devices, but also to enforce them.

The world of health care has been drastically transformed through the development of electronic systems used to transmit data between physicians, diagnostic clinicians, lab techs and other practitioners. Although they have advanced patient care, these systems also make securing of protected health information (PHI) far more complicated than the old "lock and key" approach.

Although more than a year has passed since the cyber attack on health insurance giant Anthem, many industry experts are still asking questions: What went wrong? Who is at fault? Were there preventative measures that could've been taken? And while these questions have yet to be answered, immediate action must be taken to achieve better security. In this slideshow, Mark Hickman, COO at WinMagic, discusses the top five ways health care organizations can protect themselves from a data breach.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.