Health Care Data Breaches: 5 Tips for Protecting Sensitive Information

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Health Care Data Breaches: 5 Tips for Protecting Sensitive Information-7

After high-profile data breaches at Anthem and Premera and a continual string of breaches at several smaller health care organizations, cybersecurity experts around the globe are dubbing 2015 the year of the health care data breach.

Why are all of these breaches happening? Simply put, the sensitive nature of personal health information makes this data a goldmine for attackers. Not only is the data itself appealing to obtain, but because of health care's extensive partner network — made up of providers, administrators, insurance companies, billing partners and more — health care data is often vulnerable at many points throughout the business process. According to a report from the Shared Assessments Program and Protiviti, third-party risk programs in the health care industry lack maturity and put confidential patient data at risk.

Additionally, with more and more health care organizations taking advantage of the accessibility and scalability of the cloud, the lack of focus on third-party security only creates more risk. Case in point: In September 2015, insurance claim data and other highly sensitive patient information was inadvertently posted on Amazon Web Services after an error was made by claims administration software provider Systema Software. So, what steps can health care organizations take to ensure their partner networks are not putting them at risk? In this slideshow, Brian Ahern, CEO of Threat Stack, provides five tips health care organizations can use to improve their security posture and better protect sensitive patient information.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.