IT Consulting and Tech Support Blog

HIPAA security – keeping data secure

If you are a “covered entity” under the HIPAA Security rule, then you already know that your company (and thus your employees) collect a lot of protected health information (aka PHI). PHI is basically information about another person that is not for public knowledge but needed in order to conduct business. What business? Information that insurance companies need to process claims and health care professionals need for continuity of care.

Due to more recent mandates, healthcare entities have been required to use electronic health records where patient information is entered, accessed, stored, and distributed through computer and web based programs.  The HIPAA security rule simply states that all data that pertains to PHI must be secure and not accessible by persons that do not need to know or by persons that intend to harm.

When we think of breeches in data we first think of “hackers.” According to Symantec, the healthcare industry is a hot target for hackers because medical records contain valuable personal information such as social security numbers, birth and death dates, billing information, etc.  Criminals use this information to buy medical equipment, drugs that can be resold, or combine a patient number with a false provider number and file made-up claims with insurers.

Background systems managed by good IT Management firms (like NRC) can reduce the hacker threat. Now your agency is left to face the bigger threat of human error. According to USA today, 80% of the breeches that occur are rooted in employee negligence, by human error or the less frequent rogue employee.  According to hipaajournal – 31% of the breeches reported are due to lost or stolen devices, 29% to criminal attacks, 8% to a malicious insider, and 29% to employee errors.

There are some simple steps each employee can take to minimize errors:

  • Stolen or lost devices (including removable media) should be reported to the Security Officer immediately.
  • Protect your passwords – don’t write them down, post them, or share them.

Tip: develop a password based on a phrase, song, or poem that you know well!

  • Log off computer when not in use – if even for a minute.
  • Have a guest visiting your office? Close up your machine (ctrl + l should do it).
  • Don’t let others use your computer.
  • Don’t download programs on your computer without talking with IT (some of those programs look fine but are actually designed to glean information).
  • Be careful to whom you send that email! If you have to send email, encrypt it.

Administrator tips:

  • Limit BYODs unless there is a solid system for protecting information such as Windows 8.1 Enterprise solutions and Office 365.
  • Don’t let guests on your network! Set up a guest account!
  • Track activity! Watch out for rogue employees.
  • Immediately disable access to systems when employees leave the agency.
  • Have a solid policy in place that addresses how company equipment, software, and access is used.
  • Limit employees’ ability to use removable media and disable printing where it makes sense.

Written by: Gail Dutchess, IT Consultant, New River Computing

This entry was posted in Exploits, Mobile Security, Technology Trends, Uncategorized, Vulnerabilities, Web Security. Bookmark the permalink. Follow any comments here with the RSS feed for this post. Post a comment or leave a trackback: Trackback URL.

Post a Comment

Your email is never published nor shared. Required fields are marked *

*
*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>