Health Care Data Breaches: 5 Tips for Protecting Sensitive Information

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Health Care Data Breaches: 5 Tips for Protecting Sensitive Information-4 Next

Establish KPIs

Establish key performance indicators to continually ensure all parties are complying with those SLAs.

SLAs can help you keep tabs on third parties and eliminate any confusion about who's responsible for what, but it can be tricky to determine if all parties are actually complying with the responsibilities and policies outlined in the SLAs. Establishing mutually agreed upon KPIs with all participating parties can help you gauge their impact and improve communication. By objectively measuring items like service-delivery effectiveness, performance efficiency or agility (i.e., ability to respond to changes), you can begin to prioritize the KPIs that matter most to your organization. You can also better detect early warning signs of problems with SLAs, and use your KPIs as the basis for a discussion about improving or expanding your SLA with a third party.

After high-profile data breaches at Anthem and Premera and a continual string of breaches at several smaller health care organizations, cybersecurity experts around the globe are dubbing 2015 the year of the health care data breach.

Why are all of these breaches happening? Simply put, the sensitive nature of personal health information makes this data a goldmine for attackers. Not only is the data itself appealing to obtain, but because of health care's extensive partner network — made up of providers, administrators, insurance companies, billing partners and more — health care data is often vulnerable at many points throughout the business process. According to a report from the Shared Assessments Program and Protiviti, third-party risk programs in the health care industry lack maturity and put confidential patient data at risk.

Additionally, with more and more health care organizations taking advantage of the accessibility and scalability of the cloud, the lack of focus on third-party security only creates more risk. Case in point: In September 2015, insurance claim data and other highly sensitive patient information was inadvertently posted on Amazon Web Services after an error was made by claims administration software provider Systema Software. So, what steps can health care organizations take to ensure their partner networks are not putting them at risk? In this slideshow, Brian Ahern, CEO of Threat Stack, provides five tips health care organizations can use to improve their security posture and better protect sensitive patient information.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.