Frequent cyberattacks are a grim reality of our tech-savvy society. The healthcare industry is particularly vulnerable to these attacks, in light of the wealth of information found in medical records, including personal identifiers, insurance details and prescription numbers.

Safeguarding electronic protected health information (ePHI) is more complex than ever—that's because providers have an increasing amount of digital information and are under pressure to share it, while, at the same time, cybercrime activity is rising. Last June, insurance giant Anthem paid the largest healthcare data breach settlement fine in history—$115 million—for a 2015 cyberattack that affected nearly 80 million plan holders.

How do providers avoid falling victim to more of these massive attacks?

To start, evaluate the evolving healthcare data security landscape and consider the following obstacles.

Minimal cybersecurity awareness
Many of the cybersecurity problems health facilities face stem from a lack of awareness. They see data security as an issue that affects the IT department rather than the entire organization. Because of this mindset, they fail to build a culture of security where everyone understands and values secure data, equipment and processes. And this leads to weak passwords and authentication practices, as well as participation in what’s known as shadow IT—where employees access sensitive patient data using unauthorized devices and apps.

Widespread lack of awareness makes the people working at a healthcare facility the weakest security link. To combat security flaws introduced by employees, make it a top priority to boost awareness through comprehensive training and adoption of strict authorization and authentication policies.

Outdated software systems
The healthcare industry historically lags behind other industries when it comes to adopting technology. Hospitals and medical practices often use outdated operating systems, elementary backup systems and consumer-grade routers. Additionally, they offer unsecured guest networks for patients and visitors.

Using modern software and equipment, and habitualizing updates to systems and apps is key to protecting facilities from cybercrime. Outdated software exposes data to recent bugs and cyberattacks through antiquated features and missing protections.

High phishing vulnerability
Healthcare organizations are highly vulnerable to email phishing attacks, thanks to email address availability and above-average email traffic. Healthcare email addresses tend to be less protected than email addresses in other industries. Additionally, healthcare professionals receive a large volume of emails because they collaborate with other providers and order drugs or equipment for treatment, so they are more likely to open a phishing email.

Healthcare professionals must exercise extreme caution when opening unsolicited email attachments and accessing the Internet on facility networks. To limit an organization’s phishing vulnerability, provide training sessions that offer tips for spotting phishing attacks and limiting Internet activity while logged into the organization’s systems.

Lax access controls
According to the Department of Health and Human Services, access to ePHI should be limited to the “minimum necessary” for employees to do their jobs and care for patients. This is where many organizations fail. It’s all too common for health facilities to share large datasets across the organization simply because they lack the resources or time to manage access properly.

Considering the number of healthcare data breaches that result from internal staff errors, IT security executives can significantly reduce an organization’s risk by introducing data access controls. On top of limiting who has access to sensitive patient data, organizations should also keep detailed documentation of authorized access so appropriate action can be taken when an authorized employee leaves the organization.

Wide use of mobile devices
Laptops, tablets, and mobile medical devices are increasingly being used to treat patients and record data, but spreading sensitive information across all these devices exposes facilities to even greater security risks. In the first few weeks of 2018, the HHS received five healthcare data breach reports related to the theft or loss of a laptop or other portable electronic device. And other reports indicate that a high percentage of mobile healthcare apps lack privacy policies. Additionally, mobile devices can be used to insecurely transfer sensitive data over public Wi-Fi networks.

Mobile devices require the same security measures used to protect desktop computers. In fact, some malicious malware is formatted to specifically target mobile devices. To safeguard a facility from the risks introduced by laptops and other electronic portable devices, require data encryption on all devices and adopt technology that enables an organization to remotely wipe a device if it is lost or stolen. Additionally, only allow certain information to be housed on approved devices and restrict use of personal laptops and smartphones on facility networks.

Register or login for access to this item and much more

All Health Data Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access