17 Measures Every Health Care Organization Should Consider To Reduce The Risk Of Cyber-Intrusions

The importance of privacy in the health care industry starts at the most basic level between a patient, a doctor, and the doctor's laptop computer. The levels of importance and complexity increase exponentially when you look at entire networks of payers and providers. The amount of data produced and stored in these organizations is staggering and keeping it secure is of the utmost importance. We have identified misconceptions about cybersecurity. We've covered some of the legal obligations the c-suite is under to secure its organization's data. With the rise cyber-intrusions like ransomware, we know it's important to effectively train employees and follow the guidelines provided by the Federal Department of Health and Human Services.

With the developments expected in this space under the Trump Administration, it is vital that every health care organization is prepared on the cybersecurity front.

Below is our list of 17 measures every health care organization should consider to reduce the risk of cyber-intrusions.

Conduct internal compliance and risk assessments, to determine your organization's vulnerability to cyber-attacks. This includes, but is not limited to, the security risk analysis required under the HIPAA Security Rule for covered entities and their business associates. Develop and implement corporate policies and procedures required for compliance with federal and state privacy and security laws. Develop quick-response teams to handle potential cyber-attacks, using pre-formulated decision trees and procedures so that you don't have to develop them while under the fire of an ongoing attack. Establish secure data backup protocols to ensure that, even if your company is under attack, important company records are secure and available. Establish protocols to deal with common forms of cyber-attacks (denial of service, etc.). Line up outside experts, if necessary based upon the risk profile of your company, to swing into action if company processes are overwhelmed by a cyber-attack. Perform periodic audits of cybersecurity practices against industry norms, accepted best practices, and the risk profile of your organization. Implement information security best practices, reflect them in information security policies, records retention and management policies, and in internal controls/standard operating procedures. Make certain the CEO and executive leadership are properly informed about the cyber risks to your company and that they're...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT