Securing patients’ electronic protected health information (ePHI) continues to be a top priority for healthcare practices of all sizes. The need for vigilance in data security is emphasized by reports suggesting that a complete health record can fetch between $250 and $1,000 on the darknet.[1]
Ongoing cyberattacks attacks on healthcare systems only further illustrate the need for healthcare leaders and staff members to take proactive steps to prevent theft of patient information and other sensitive data.
As healthcare practices devise their security strategies, they will want to make sure their approaches are flexible and resilient to address threats that are likely to be constantly evolving and multi-pronged. [2]
The risk tips listed in this publication focus on technology-based strategies to prevent cyberattacks and protect patients’ ePHI. For more information about physical safeguards for preventing data breaches, see MedPro’s Risk Tips: Using Physical Safeguards to Prevent Security Breaches.
Conduct a security risk assessment to determine potential areas of vulnerability and to identify system and process gaps that compromise the privacy and security of ePHI and other proprietary information. (Note: The HIPAA Security Rule requires covered entities and their business associates to conduct risk assessments.[3])
Ensure that antivirus software and firewalls are properly installed on the practice’s computer network and are up to date. Contractual arrangements with technology and security vendors should specify the security results the practice hopes to achieve with its systems.
Install password protection on all computers in the practice, and require users to establish strong passwords (i.e., passwords that have a minimum number of characters and require letters, numbers, and symbols) or passphrases.
Determine under what circumstances and how often you want to require system users to change their passwords. Although periodically changing passwords has long been considered a best practice, some guidance suggests it doesn’t improve security and actually may compromise it.[4] All policies should comply with state and federal regulations.
Consider two-factor or multi-factor authentication technology for an added layer of protection at login. This method involves a password and at least one other identifying technique, such as an electronic identification card, key fob, or fingerprint recognition.
Ensure that the practice’s computer operating systems, software applications, and network-connected devices are updated routinely and that security patches are installed when they become available.
Implement controls that block malicious websites or consider even stricter limitations, such as allowing access only to websites that are known to be secure (a process known as “whitelisting”).
Restrict user permissions on systems to prevent employees from downloading and installing software. Permissions should align with the functionality and access employees need to perform their jobs.
Review the practice’s email security settings and spam filters to ensure the system is blocking emails with suspicious attachments and/or links.
Consider implementing software to restrict access to USB ports and removable devices, which can help prevent unauthorized copying of data and transfer of computer viruses.
Use encryption technology to protect stored and transmitted data. Consider anti-theft technology that can remotely delete or disable information from a device in the event of loss or theft.
Tailor employees’ access to computer systems and electronic health records based on their roles and responsibilities. Limit users who can log in to your network via a remote connection.
Enable system timeouts and record locks to prevent unauthorized access to patient data. Set a limit on how many times users can attempt to log in to the network before they are locked out of their accounts.
Back up system data to a separate server on a regular basis so it can be restored if an incident, such as a ransomware attack, occurs. Keep backup information in a secure, locked location – preferably offsite. (Note: Only public information should be sent via anonymous file transfer protocol.)
Provide education on, and raise awareness of, the practice’s security policies and safeguards as well as best practices for cybersecurity and data protection. Conduct training during orientation and at least annually as part of in-service education. Develop written guidance to prevent loss and theft of patient information.
Report any suspicious activity, possible security breaches, or thefts (e.g., suspicious computer activity and missing records) to the appropriate authorities and organizations (e.g., law enforcement, the Office for Civil Rights, your professional liability company, etc.).
Have an incident response team in place, and conduct incident response drills to identify potential security and policy gaps. The team should periodically review the practice’s incident response plan and procedures for handling cyberattacks, privacy violations, and other situations (such as physical theft or loss of data) that can result in data breaches.
Information brought to you by our partner carrier The Medical Protective / ChiroPreferred
Comments