Posts Tagged ‘data security’

Infographic: Phishing in Healthcare

September 2nd, 2019 by Melanie Matthews

Healthcare employs more people than any other industry and is a portal to email addresses, Social Security numbers, credit card numbers and other information phishing attackers steal for profit, according to a new infographic by Cofense.

The infographic looks at the impact of phishing attacks on the healthcare industry along with five ways healthcare organizations can protect themselves from phishing attacks.

2018 Healthcare Benchmarks: Telehealth & Remote Patient MonitoringArtificial intelligence. Automation. Blockchain. Robotics.

Once the domain of science fiction, these telehealth technologies have begun to transform the fabric of healthcare delivery systems. As further proof of telehealth’s explosive growth, the use of wearable health-tracking devices and remote patient monitoring has proliferated, and the Centers for Medicare and Medicaid Services (CMS) has added several new provider telehealth billing codes for calendar year 2018.

2018 Healthcare Benchmarks: Telehealth & Remote Patient Monitoring delivers the latest actionable telehealth and remote patient monitoring metrics on tools, applications, challenges, successes and ROI from healthcare organizations across the care spectrum. This 60-page report, now in its fifth edition, documents benchmarks on current and planned telehealth and remote patient monitoring initiatives as well as the use of emerging technologies in the healthcare space.

Get the latest healthcare infographics delivered to your e-inbox with Eye on Infographics, a bi-weekly, e-newsletter digest of visual healthcare data. Click here to sign up today.

Have an infographic you’d like featured on our site? Click here for submission guidelines.

Infographic: Protecting Patient Data in Today’s Digital Healthcare World

April 19th, 2017 by Melanie Matthews

The healthcare industry continues to ride the digital wave to improve patient care and organizational efficiency while reducing costs. Hospitals and health systems are relying on electronic health records, the cloud, and the Internet of Things (IoT) more than ever. While these technologies are convenient, efficient, and enable a higher degree of patient-centric care, they can be jeopardized by cybercriminals, according to a new infographic by Fortinet.

The infographic examines how healthcare organizations can protect their patients’ data in a digital healthcare landscape.

2016 Healthcare Benchmarks: Data Analytics and IntegrationThe 2016 Healthcare Benchmarks: Data Analytics and Integration assembles hundreds of metrics on data analytics and integration from hospitals, health plans, physician practices and other responding organizations, charting the impact of data analytics on population health management, health outcomes, utilization and cost.

2016 Healthcare Benchmarks: Data Analytics and Integration examines the goals, data types, collection processes, program elements, challenges and successes shared by healthcare organizations responding to the January 2016 Data Analytics survey by the Healthcare Intelligence Network. Click here for more information.

Get the latest healthcare infographics delivered to your e-inbox with Eye on Infographics, a bi-weekly, e-newsletter digest of visual healthcare data. Click here to sign up today.

Have an infographic you’d like featured on our site? Click here for submission guidelines.

Infographic: Health Security in the Internet of Things

March 27th, 2015 by Melanie Matthews

With the growing trend toward the Internet of Things (IoT) in healthcare, including wearables, embedded devices and other health and wellness monitoring devices, there is no doubt that networked healthcare offers numerous benefits, not only to the individuals involved, but to the healthcare industry as a whole, according to a new infographic by McAfee.

However, less than 60 percent of healthcare providers have implemented security controls or a basic risk assessment for their IoT devices.

The infographic outlines the benefits and risks of IoT deployment in healthcare.

E-Healthcare Systems and Wireless Communications: Current and Future ChallengesThe goal of E-Healthcare Systems and Wireless Communications: Current and Future Challenges is to explore the developments and current/future challenges in the successful deployment of future e-Healthcare Systems. The book combines the research efforts in different disciplines from pervasive wireless communications, wearable computing, context-awareness, sensor data fusion, artificial intelligence, neural networks, expert systems, databases, security and privacy.

Get the latest healthcare infographics delivered to your e-inbox with Eye on Infographics, a bi-weekly, e-newsletter digest of visual healthcare data. Click here to sign up today.

Have an infographic you’d like featured on our site? Click here for submission guidelines.

Guest Post: Following Anthem Breach, 5 Preventive Steps to Protect Businesses Against Electronic Data Theft

February 19th, 2015 by Kevin Watson

Kevin Watson is CEO of Netsurion, a provider of cloud-managed IT solutions.

The country’s second largest health insurer, Anthem Inc., has confirmed it is the latest to join a growing list of major corporations to have suffered a serious data breach. Kevin Watson, CEO of Netsurion, outlines some of the consequences of stolen healthcare data and suggests five steps businesses can take to protect themselves from electronic data theft.

Unlike many recent data breaches, Anthem was quick to publicly announce the breach only days after discovering that personal information on as many as 80 million of its customers and employees had been stolen. In this case, it appears the hackers used rather sophisticated methods, managing to gather names, dates of birth, social security numbers, addresses and email addresses. Although it does not appear any medical information or financial records were exposed, the information that was taken is more than enough to steal the identities of the affected individuals.

For so long, the focus of data breaches has been on credit card data, as stolen credit card data can so readily be turned into cash or goods. However, with the increasing popularity of EMV or chip and pin enabled credit cards, the prevalence of data breaches involving personal information may again rise to the forefront. This is especially true when one realizes the value of a stolen identity can often be far greater over the long term than the value of a stolen credit card.

If access to insurance plan information were to have been stolen along with identity information, data thieves would have a good indicator as to which identities were of higher value based on the value of the insurance plan. If thieves focus on the individuals with the highest plan costs, these are likely the people who are more established in their lives, have families, higher incomes and better credit, meaning their identities are worth even more on the black market.

This breach highlights that data security is not an issue limited to those processing credit cards. Businesses of all types must think of the type of information stored in their systems and realize they are only as secure as their weakest system. The following checklist outlines simple methods can help protect businesses from electronic data theft:

1. Protect a Location’s Incoming Internet Traffic

The first step in stealing data is finding an avenue into the targeted business. All of a business’ data circuits and its Internet connections must be protected by a robust and adaptable firewall; protecting the business from unwanted incoming traffic.

2. Implement Secure Remote Access

When permitting remote access to a network, it is essential that this access is restricted and secure. At a minimum, access should only be granted to individual (not shared) user accounts using two-factor authentication and strong passwords. Remote access activities should also be logged so that an audit trail is available.

3. Keep Anti-Malware Software Up-to-Date

It is critical to keep all anti-virus/anti-malware software up to date with the latest versions and definitions. The companies that make anti-malware software monitor threats constantly and regularly update their packages to include preventive measures and improvements to thwart malware seen in other attacks.

4. Update all Operating Systems as Security Patches are Released

Much like anti-virus/anti-malware updates, designers of operating systems are constantly improving their software to prevent hackers from stealing data, especially if a criminal manages to bypass the built-in security. It is essential that the latest security releases and patches be installed on all systems.

5. Limit Outbound Internet Traffic

In addition to blocking unwanted traffic from getting into a location, it is always a good practice to selectively block outgoing traffic as well. Many modern breaches involve software that becomes resident on a company network and then tries to send sensitive data to the hacker’s system via the Internet. No system can completely prevent unwanted malware or viruses, so a good last line of defense is making sure secure data doesn’t leave the network without prior knowledge. The same firewall used in Step One should be configured to monitor outgoing traffic as well as incoming.

Netsurion is a leading provider of cloud-managed IT security services that protect small- and medium-sized businesses’ information, payment systems and on-premise public and private Wi-Fi networks from data breaches and other risks posed by hackers. Netsurion’s patented remote installation technology and PCI compliant cloud-based solutions simplify the implementation process and ongoing support. Any sized branch or remote office, franchise or sole proprietor operation can use Netsurion without the costs of onsite support. The company serves the retail, hospitality, healthcare, legal and insurance sectors.

HIN Disclaimer: The opinions, representations and statements made within this guest article are those of the author and not of the Healthcare Intelligence Network as a whole. Any copyright remains with the author and any liability with regard to infringement of intellectual property rights remain with them. The company accepts no liability for any errors, omissions or representations.