In support of Cybersecurity Awareness Month, we've shared tips so far for "Owning It" with remote access security, "Securing It" with multi-factor authentication, and today I want to talk about "Protecting It" and the potential costs of a HIPAA violation if you aren't able to protect it (with "it" being PHI).
October is National Cybersecurity Awareness Month and the emphasis focuses on the mantras of Own IT, Secure IT, Protect IT. In last week's blog, I focused on "Own IT" as it relates for Remote Access Security. This week I will focus on "Secure IT". A key to securing it (and in this case, "it" refers to Protected Health Information) is realizing that there are tools for healthcare IT available to help us live and work in a mobile society.
October is National Cybersecurity Awareness Month and the emphasis focuses on the mantras of Own IT, Secure IT, Protect IT. This is the first in a series of weekly blogs this month where we will be diving into these topics, specifically in how they relate to Healthcare IT. Today, I will be expanding on the “Own It” mantra as it relates to securing remote access to your network with remote vendors and employees.
Healthcare Privacy is tied to a growing number of rules, regulations, policies and procedures. For the average healthcare employee, it can be difficult to keep track of everything they need to know. Therefore, organizations should prioritize awareness as a part of their privacy strategy. Awareness is the process of educating your staff, not only on these policies and procedures, but why they are important. Awareness is a vital step in influencing a positive privacy culture.
Let me begin by saying, I live on the Atlantic coast, just north of Jacksonville, FL. Because it’s hurricane season in this area, I have been keeping a keen eye on hurricane updates. Recently, I have tracked and monitored Hurricane Dorian and the impact it might have on my family.
Each week we read about the number of breaches and cybersecurity attacks that cripple healthcare organizations. Now we are seeing articles and research about the impact cybersecurity breaches and attacks are having on the financial health of healthcare organizations.
I grew up being told “there are consequences to your actions young man!” Sometimes those consequences I faced were small and moved past me without much fanfare, while others seemed to knock me down. Often, these consequences came from wrong choices, and at times they came when I made the right choice but didn’t put my heart into it and do enough. One thing I can attest to is those consequences, great or small, helped make me a better person today.
I think I want to stay in bed…Have you ever had one of those weeks when everything went wrong all week and every day was a Monday? The week of May 13 th was one of those weeks for IT and cybersecurity. As I was reading throughout the week, I found articles about:
The Two Tales of Remote Access Security: Protection from Hackers, and Meeting Regulatory Requirements.
It’s all over the news - a new healthcare breach here, a new healthcare IT study there, that talks about how healthcare IT security needs to be a focus in 2019. Yet, we are already seeing more breaches in 2019 than ever before.
All hospitals know that they need to have some form of security plan in place to protect patients and their information. The problem is that the changing requirements and increase in breaches means that this plan has to always be evolving. Hospitals likely have goals for what they would like to change in the future to make sure they are adapting to the ever-changing threat landscape.