• Here Are Your Top 6 Safeguards

  • We have all heard about the reported data breaches and the effects these breaches have had on individuals whose information was breached. 

    According to a survey conducted by the Medical Identity Fraud Alliance, healthcare organizations are reportedly spending more on updating software to detect both fraud and breaches.  Additionally, healthcare organizations are placing greater emphasis financially on their security and their workforce. Even with these enhanced efforts by the healthcare industry, the company, Accenture reported that the medical industry stands to lose over $305 billion in cumulative lifetime revenue due to cyberattacks. 

    Technology, processes and people are required within the Security Safeguards of the Health Insurance Portability and Accountability Act (HIPAA). 

    • Security Management 
    • Workforce Security 
    • Information Management 
    • Security Awareness and Training 
    • Security Incident Procedures 
    • Business Associates Contracts 

    In recent breaches, there are indicators which point to the lack of controls and management within the organizations of their technologyprocesses and their people.

    Mark McLaughlin, CEO of Palo Alto Networks Inc., wrote an article, “Prevention: Can it be done?”  In the article, he states “the executive team has a duty to ensure their technical experts are managing cybersecurity risk. Under the executive leadership, it is very important that there should be continued improvement in organizational processes for security.”

    McLaughlin goes on to state; “many of the attacks that are being reported today start or end with poor processes or human error,” people must be continually trained regarding identifying cyberattacks and the appropriate steps to take in the event of an attack. The sharing of personal information by employees on social networks is an easy way to target the workforce in sophisticated phishing attacks. It is important that technology, processes, and people are coordinated, and that workforce training to be done on a regular basis. McLaughlin suggests that the business community, along with other organizations, share cyberattack patterns and information with each other close to real time. With this combined intelligence, the number of successful attacks would be dramatically reduced.

    Implementing the strategy of communicating in real time to other like businesses and organizations could possibly cripple the cyber attackers. The attackers would then need to custom design and develop unique attacks each and every time that they wish to attack a target.  McLaughlin states “this would significantly drive up the cost of a successful attack and force attackers to aggregate resources in terms of people and money, which would make them more prone to becoming visible to law enforcements and governments.”

    On a personal note, am very grateful for allowing me to be a part of your lives through my blogs. I’ve met some wonderful people because of them, and I feel there are important memories that are tied to them. I am grateful for the gift of each of you, as if you are reading this, you are alive, and that is a gift. Thank you for allowing me to be a part of your world.

    Here’s wishing you the gift of peace and prosperity throughout 2016.