Progressive Computer Systems, Inc.
Call us: (919) 929-3080
  • Home
  • About Us
    • Our Team
      • Under Attack! – Book Release
    • Awards
    • Community Involvement
    • Referral Program
    • Testimonials
    • Join Our Team
      • Job Postings
  • Services
    • Complete List
    • Managed Services
      • ProgressiveCARE Managed Services
    • Cybersecurity
    • HIPAA Compliance
    • Cloud Services
    • IT Consulting
    • Email & SPAM Protection
    • Cabling & Internet Services
    • IT Outsourcing
  • Solutions
    • Strategic Planning
    • Business Continuity
    • IT Infrastructure
      • Why Use Progressive?
    • Network Security
      • Security Concerns
    • Virtualization
    • Business Assessments
    • Unified Communications
    • Hardware & Software
      • Recommended Equipment
  • Partners
  • Industries
    • Life Sciences
    • Health Care
    • Professional Services
    • Government & Education
    • Non-Profit
  • Resources
    • Professional Network
    • Under Attack! with Lisa Mitchell – Book Release
    • Blog
    • Newsletter Archive
    • COVID-19 Resources
  • Contact Us
    • Referral Form
  • Portal
    • Client Portal Login
    • Online Payment
Search the site...

Data Protection for Healthcare: What You Must Know – Part 4 of 7

reading the word secure on digital computer screen with a magnifying glass internet security

Part 4 of 7
Cybersecurity against malicious attacks: Unfortunately, patients’ medical records and personal data are worth money on the black market to identity thieves and hackers. Stolen records can be sold to the highest bidder, who will use the information to open lines of credit, make purchases, or steal a patient’s assets without his/her immediate knowledge. To ensure that there is no open access to this private information, healthcare practices are expected to have security controls in place such as a proper firewall, Intrusion Detection Systems (IDS), and programs with auditing and logging to protect against unauthorized access to Joe’s confidential information. These controls will define the individual(s) who are authorized to view particular information and prevent others who are not directly involved with the patient’s care from having access to view his medical records. Auditing opens a window to track and recognize unauthorized data access or security breaches. It is especially essential to have logging controls in place for other areas where information can also be accessed outside of a medical facility such as a secure patient portal.

Cyber Insurance is added protection that many healthcare organizations purchase today. It is designed to protect them against data breaches; however, it is only effective if the organization has a Compliance Plan in place and is following regulations. Otherwise, full claim payouts may not be guaranteed.

YOUR GOAL IS BREACH PREVENTION
No organization wants to find itself in the position of having to defend a breach.  Preventing a breach is ideal and being proactive is necessary. Take these ideas under serious consideration:

• Hire a Managed Service Partner to monitor and manage your IT environment.
• Have regular consultations with a HIPAA knowledgeable attorney.
• Hire a HIPAA Consultant.
• Pay a professional to conduct a Comprehensive Risk Assessment.
• Mitigate the results of a Security Vulnerability Assessment.
• Implement and enforce HIPAA Security Policies/Procedures.
• Get Cyber Insurance and implement a full HIPAA Compliance Program.
• Invest in industry-standard encryption solutions.
• Have an Organizational Policy for addressing and monitoring mobile devices.
• Use Active Directory and Group Policies to enforce User Rights and Security Controls.
• Ensure that medical devices have up-to-date security patches and are malware-free.
• Implement and maintain strong firewalls with subscription services and an Intrusion Detection System (IDS).
• Cultivate a strong, ongoing Security and HIPAA Awareness Program.

Share this:

  • Share
  • Facebook
  • LinkedIn
  • Twitter
cybersecurity, HIPAA, HIPAA compliance

YOURS FREE!

The 7 Most Critical IT Security Protections Every Business Must Have In Place. PLUS: Healthcare & Data Security chapter from the Bestseller, "Under Attack!"

Sign Up Now

Under Attack!

Now Available on AMAZON!

Recent Posts

Click here to view our recent posts.

Archives

Subscribe to Our Blog via Email

  • (919) 929-3080
  • (919) 929-3087
  • PCSsales@pc-net.com
  • PCSsupport@pc-net.com
  • Contact Us
    • Linkedin
    • Twitter
    • Facebook
Mailing address:
Progressive Computer Systems
615 Eastowne Drive
Chapel Hill, NC 27514
Directions

YOURS FREE !

The 7 Most Critical IT Security Protections Every Business Must Have In Place. PLUS: Under Attack! Book Chapter.
Sign Up Now for Your Free Chapter

HP Virtualization

© 2020 Progressive Computer Systems