4w ago

White Paper: Healthcare Under Attack

At One Call, we work hard to safeguard our data and systems. We know we can always improve and no security is absolute.  As such, we actively apply best practices, manage the risk of supply chain partners, and regularly assess our cybersecurity environment. We have also achieved HITRUST certification, which demonstrates adherence to HIPAA guidelines. In the following white paper, we share some simple steps to combat the risks of a cybersecurity attack and how to be prepared should one happen.


Why is Healthcare at Risk?

As the healthcare industry continues to innovate service offerings, increase access to data, and create operational efficiencies using advanced technology, there’s an increasing risk from cybercriminals who work tirelessly to evolve techniques that challenge our defenses. This constant threat of cyberattacks and security incidents has a direct impact on the workers’ compensation industry - it is a reminder that preparation and constant vigilance are the only defenses at our disposal to ensure our information is safe and protected.

The data saved in electronic medical records (EMR) and handled daily by medical professionals is extremely valuable. It contains health, personal and insurance information used to commit insurance and identity fraud. Attackers don’t even need to access healthcare systems to obtain information or disrupt services. They can use email to deliver sophisticated malware (viruses) to obtain records, ransomware to lock systems, and social engineering to trick personnel into providing data. Attackers like these methods because they are simple to deploy, hard to detect, and make any and all employees at your company a potential target – eliminating the need to compromise elaborate security systems. 

Combat the Risks 

We realize no company has unlimited budgets for security. Here are a few measures you can take, regardless of budget, to improve security.

Educate

27% of data breaches are caused by human error.Studies show human error causes at least 27 percent of all data breaches. This can be as simple as employees clicking on a link they believe is legitimate or responding incorrectly to an external inquiry. Educating employees on how to identify red flags and report potential threats can immediately reduce the risk and costs associated with a breach. In fact, the Poneman study points out that education programs can reduce the cost of a breach by up to $9 per record.

Be Prepared

Studies show having a ready-to-go incident response plan and investigation team can reduce the cost of a breach by $14 per record. Treat a data breach drill as you would a routine fire drill. Just as a fire drill educates employees on their role during a building emergency, implementing and training a security first responder team will ensure you’re prepared in the event of a potential data breach. Your team should be ready to quickly identify, report and respond to a problem. This can shorten the time of a data breach and assist crisis management personnel with communication to impacted stakeholders.

Actively Monitor, Identify and Escalate

The faster a potential breach is identified, the faster it can be contained. Statistics show companies that identify a breach in less than 100 days can save up to $1 million in post-data breach costs.  Since no security is foolproof, the ability to rapidly detect, respond and contain a threat is just as important as prevention.

Data Classification

Garbage in is garbage out in this situation. Old data is bad data that collects rapidly if not destroyed when no longer needed. If maintained on your system, it also makes you vulnerable to an attack,  even if you are not using it. Studies show eliminating old data can reduce breach costs by more than $5 per record.

Conclusion

An attacker only needs to be right one time to cause havoc, which means companies have to be right every time in order to prevent a security breach. This may seem like a tall order, but with the right preparation, education and monitoring, you can thrive in this rapidly changing technology-driven environment.

Download White Paper

Stay up to date with our latest news!



Related Articles