ENHANCING YOUR DATA SECURITY:
CLOSING THE GAP ON UNSECURED
COMMUNICATIONS
2
WHAT’S THE PROBLEM?
Healthcare one of top 4 most vulnerable industries to cyberattacks1
Patient data exposed for over a month due to
major Medicaid and Affordable Care Act insurer
breach
300K records breached in
ransomware attack on
Pennsylvania based
health care group
Virginia based health
system data breach
affects 650K patients
after vendor
inadvertently made
PHI accessible on line
U.S. healthcare
cyberattacks increased
63%
last year1
1 Source: The Merkle
2 Source: Becker's Hospital Review
3
SECURITY IS MORE IMPORTANT THAN EVER
39%
of healthcare
companies aren’t
prepared for a
cyberattack1
1/3 of hospital CIOs
estimate more than
20%
of data is shared via
unsecured methods2
“The sensitivity of health-related information and large number of data touch points”3
“46% admit employees were not following policies for securing devices”4
Healthcare is one of the most vulnerable industries. Why?
1Source: The Merkle
2Source: Spok 2017 CHIME Survey
3Source: Health IT Security
4Source: Healthcare IT News
4
KEEP YOUR SECURITY PLAN UPDATED
The time to secure patient data is now
Financial Compliance Reputation Patient Care Research
Benefits
5
WHAT YOU NEED
Educated people, tight processes, and the right technology
Process
6
Implement multiple layers of security tools to support policies
TECHNOLOGY
Monitoring
capabilities
Firewalls
Blacklist/
whitelist
mechanisms
Virtual private
networks (VPNs)
Secure text
messaging
Data encryption
Data loss
prevention (DLP)
solutions
7
TECHNOLOGY
Ensure your storage technology is secure
Protected health data should be stored on
secure servers or secure cloud environment
Access to data should be restricted
to authorized users
Storage vendors must adhere to the same
privacy and security rules
8
TECHNOLOGY
Address smartphone security with enterprise mobility management
Allow employees to use the
mobile devices they prefer
Use EMM solutions to
safeguard the unauthorized
transmission of ePHI
9
TECHNOLOGY
Tips and best practices
10
PROCESS
Tracking all devices
Patient information
should be restricted to
those who need it to
do their job
Even devices of those
with approved access
can pose a security
threat
11
PROCESS
Partner encrypted technology with the right processes
Understand where patient data is stored
and how it’s transmitted
Be aware of lost or stolen mobile devices
and overall network security
12
SENDING AND RECEIVING ePHI
Secure data while it’s in your possession
Secure data while it’s in transit
Ensure appropriate security measures
Document and analyze decisions and rationale
Periodically review and update security measures
13
PROCESS
Implement policies to support your data-protection strategy
Acceptable use policies
give employees solid
direction on
maintaining privacy
Human error or
negligence is one of
the greatest dangers to
the security of PHI
14
PROCESS
Develop an overall business continuity plan
Ability to constantly access medical
records can be a matter of life and death
Your plan should detail the people,
processes, and technologies necessary
to keep IT systems operational
15
PEOPLE
Train your end users
• Human error/negligence is
a major cause of breaches
• Include a strong employee
education component
16
PEOPLE
Addressing human error
Users should have unique,
authenticated identities to access PHI
Protocols should include auditing
functions that monitor proper use and
can trace the source of any breaches
17
SECURE TEXT MESSAGING
Access staff directory and on-call schedules
Security and encryption
Receive patient care alerts and test results
18
TAKEAWAYS
Protect your patients
1. Define your hospital’s strategy for managing sensitive data
2. Implement policies to support your data-protection strategy
3. Implement multiple layers of security tools to support policies
4. Train your end users
5. Develop an overall business continuity plan
19
LET’S GET IN TOUCH!
Learn more:
CASE STUDIES VIDEOS
We’d love to hear from you!
spok.com
getinfo@spok.com

More Related Content

PPTX
Mobile monday mhealth
PPT
hipaa presentation
PDF
MobileSecurity WhitePaper
PDF
How Best Are Medical Practices Prepared to Address HIPAA Breaches?
PPTX
Confidentiality
PDF
What You Need to Know About Intelligent Network Segmentation
PPTX
Confidentiality manager training mha 690
PPT
Healthcare2.0 Turning Hell care into healthcare
Mobile monday mhealth
hipaa presentation
MobileSecurity WhitePaper
How Best Are Medical Practices Prepared to Address HIPAA Breaches?
Confidentiality
What You Need to Know About Intelligent Network Segmentation
Confidentiality manager training mha 690
Healthcare2.0 Turning Hell care into healthcare

What's hot (19)

PPT
Group presentation hippa ppt
PPTX
HIPAA Presentation
PPTX
HIPPA Security Presentation
PPTX
Safety of protected health information (phi)
PPTX
Week 7 issues and challenges
PPTX
ELECTRONIC HEALTH RECORD SYSTEMS:
PPTX
Protecting Privacy, Security and Patient Safety in mHealth
DOCX
Introduction hippaa
PDF
Modern Healthcare Information Technology
PDF
Medical Devices Under Attack
PPTX
Transforming Healthcare with Technology
PPT
Confidentiality
PPTX
HIPAA Compliance Dangers for Digital Doctors
PPTX
Blockchain based searchable encryption for electronic health record
PPTX
Confidentiality
PDF
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
PPTX
E-health appications
PPTX
Presentation 2 - FHIR Overview
PPTX
Top 3 Changes in Technological Advances influencing Healthcare version 2
Group presentation hippa ppt
HIPAA Presentation
HIPPA Security Presentation
Safety of protected health information (phi)
Week 7 issues and challenges
ELECTRONIC HEALTH RECORD SYSTEMS:
Protecting Privacy, Security and Patient Safety in mHealth
Introduction hippaa
Modern Healthcare Information Technology
Medical Devices Under Attack
Transforming Healthcare with Technology
Confidentiality
HIPAA Compliance Dangers for Digital Doctors
Blockchain based searchable encryption for electronic health record
Confidentiality
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
E-health appications
Presentation 2 - FHIR Overview
Top 3 Changes in Technological Advances influencing Healthcare version 2
Ad

Similar to Enhancing Your Data Security: Closing the Gap on Unsecured Communications (20)

PDF
4 Steps to Optimized Healthcare Cybersecurity
PDF
Cybersecurity Challenges in Healthcare
PDF
10 Things That Compromise Patient Data
PDF
Healthcare Cybersecurity Whitepaper FINAL
PDF
Medical Data Encryption 101
PPTX
Hipaa Reality Check
PDF
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
PPTX
B johnson unit 3 final project completion
PDF
Detroit ISSA Healthcare Cybersecurity
PDF
DVHIMSS Ensuring Privacy and Security of HIEs in PA
PDF
Infographic: Symantec Healthcare IT Security Risk Management Study
PDF
Healthcare IT Security And Risk Management Study
PDF
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
PPTX
cyber.pptx security ppt security security security security
PPTX
Healthcare data breach
PDF
Everything You Need to Know about HIPAA Compliance.pdf
PPTX
Taking the Physician's Pulse on Cybersecurity
PPTX
Comp8 unit6b lecture_slides
PDF
Cyber security
4 Steps to Optimized Healthcare Cybersecurity
Cybersecurity Challenges in Healthcare
10 Things That Compromise Patient Data
Healthcare Cybersecurity Whitepaper FINAL
Medical Data Encryption 101
Hipaa Reality Check
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
B johnson unit 3 final project completion
Detroit ISSA Healthcare Cybersecurity
DVHIMSS Ensuring Privacy and Security of HIEs in PA
Infographic: Symantec Healthcare IT Security Risk Management Study
Healthcare IT Security And Risk Management Study
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
cyber.pptx security ppt security security security security
Healthcare data breach
Everything You Need to Know about HIPAA Compliance.pdf
Taking the Physician's Pulse on Cybersecurity
Comp8 unit6b lecture_slides
Cyber security
Ad

More from Spok (18)

PPTX
7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...
PPTX
5 Dangers of Not Having Call Recording in Your Contact Center
PPTX
What We Learned at HIMSS18
PPTX
How to Give Your Nurses More Time at the Bedside
PPTX
5 Details to Include in Every Communication Project Plan to Maximize Success
PPTX
Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?
PPTX
How to Bolster the Benefits of Your EHR by Improving Communications in Your H...
PPTX
Improve the Patient Experience and HCAHPS Scores with Technology
PPTX
10 Things You Should Know About BYOD
PPTX
How Health IT Can Help Extinguish Physician and Nurse Burnout
PPTX
5 Myths About Mobile Communication Success
PPTX
Getting Right with The Joint Commission's Communication Goal
PPTX
Supporting Interoperability and Technology Migration at Your Hospital
PPTX
Paging for Today's Hospital: Encrypted and Connected
PPTX
Connecting Your Operator Console for Smarter Clinical Communications
PPTX
The 2017 Hospital Guide to Secure Mobile Messaging Success
PPTX
The State of Mobile Communications in Healthcare: Survey Results Part 2
PPTX
What We Learned at HIMSS17
7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...
5 Dangers of Not Having Call Recording in Your Contact Center
What We Learned at HIMSS18
How to Give Your Nurses More Time at the Bedside
5 Details to Include in Every Communication Project Plan to Maximize Success
Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?
How to Bolster the Benefits of Your EHR by Improving Communications in Your H...
Improve the Patient Experience and HCAHPS Scores with Technology
10 Things You Should Know About BYOD
How Health IT Can Help Extinguish Physician and Nurse Burnout
5 Myths About Mobile Communication Success
Getting Right with The Joint Commission's Communication Goal
Supporting Interoperability and Technology Migration at Your Hospital
Paging for Today's Hospital: Encrypted and Connected
Connecting Your Operator Console for Smarter Clinical Communications
The 2017 Hospital Guide to Secure Mobile Messaging Success
The State of Mobile Communications in Healthcare: Survey Results Part 2
What We Learned at HIMSS17

Recently uploaded (20)

PDF
demography and familyplanning-181222172149.pdf
PDF
_OB Finals 24.pdf notes for pregnant women
PPTX
Nancy Caroline Emergency Paramedic Chapter 4
PPTX
OSTEOMYELITIS and OSTEORADIONECROSIS.pptx
PPTX
Arthritis Types, Signs & Treatment with physiotherapy management
PPTX
Nancy Caroline Emergency Paramedic Chapter 15
PDF
Back node with known primary managementt
PPTX
Nancy Caroline Emergency Paramedic Chapter 17
PPTX
Acute renal failure.pptx for BNs 2nd year
PPTX
Nancy Caroline Emergency Paramedic Chapter 8
PPT
Pyramid Points Lab Values Power Point(11).ppt
PPTX
ACUTE CALCULAR CHOLECYSTITIS: A CASE STUDY
PDF
Medical_Biology_and_Genetics_Current_Studies_I.pdf
PDF
cerebral aneurysm.. neurosurgery , anaesthesia
PPTX
Nancy Caroline Emergency Paramedic Chapter 16
PDF
Essentials of Hysteroscopy at World Laparoscopy Hospital
PPTX
Hospital Services healthcare management in india
DOCX
PT10 continues to explose your mind right after reading
PPTX
GCP GUIDELINES 2025 mmch workshop .pptx
DOCX
ch 9 botes for OB aka Pregnant women eww
demography and familyplanning-181222172149.pdf
_OB Finals 24.pdf notes for pregnant women
Nancy Caroline Emergency Paramedic Chapter 4
OSTEOMYELITIS and OSTEORADIONECROSIS.pptx
Arthritis Types, Signs & Treatment with physiotherapy management
Nancy Caroline Emergency Paramedic Chapter 15
Back node with known primary managementt
Nancy Caroline Emergency Paramedic Chapter 17
Acute renal failure.pptx for BNs 2nd year
Nancy Caroline Emergency Paramedic Chapter 8
Pyramid Points Lab Values Power Point(11).ppt
ACUTE CALCULAR CHOLECYSTITIS: A CASE STUDY
Medical_Biology_and_Genetics_Current_Studies_I.pdf
cerebral aneurysm.. neurosurgery , anaesthesia
Nancy Caroline Emergency Paramedic Chapter 16
Essentials of Hysteroscopy at World Laparoscopy Hospital
Hospital Services healthcare management in india
PT10 continues to explose your mind right after reading
GCP GUIDELINES 2025 mmch workshop .pptx
ch 9 botes for OB aka Pregnant women eww

Enhancing Your Data Security: Closing the Gap on Unsecured Communications

  • 1. ENHANCING YOUR DATA SECURITY: CLOSING THE GAP ON UNSECURED COMMUNICATIONS
  • 2. 2 WHAT’S THE PROBLEM? Healthcare one of top 4 most vulnerable industries to cyberattacks1 Patient data exposed for over a month due to major Medicaid and Affordable Care Act insurer breach 300K records breached in ransomware attack on Pennsylvania based health care group Virginia based health system data breach affects 650K patients after vendor inadvertently made PHI accessible on line U.S. healthcare cyberattacks increased 63% last year1 1 Source: The Merkle 2 Source: Becker's Hospital Review
  • 3. 3 SECURITY IS MORE IMPORTANT THAN EVER 39% of healthcare companies aren’t prepared for a cyberattack1 1/3 of hospital CIOs estimate more than 20% of data is shared via unsecured methods2 “The sensitivity of health-related information and large number of data touch points”3 “46% admit employees were not following policies for securing devices”4 Healthcare is one of the most vulnerable industries. Why? 1Source: The Merkle 2Source: Spok 2017 CHIME Survey 3Source: Health IT Security 4Source: Healthcare IT News
  • 4. 4 KEEP YOUR SECURITY PLAN UPDATED The time to secure patient data is now Financial Compliance Reputation Patient Care Research Benefits
  • 5. 5 WHAT YOU NEED Educated people, tight processes, and the right technology Process
  • 6. 6 Implement multiple layers of security tools to support policies TECHNOLOGY Monitoring capabilities Firewalls Blacklist/ whitelist mechanisms Virtual private networks (VPNs) Secure text messaging Data encryption Data loss prevention (DLP) solutions
  • 7. 7 TECHNOLOGY Ensure your storage technology is secure Protected health data should be stored on secure servers or secure cloud environment Access to data should be restricted to authorized users Storage vendors must adhere to the same privacy and security rules
  • 8. 8 TECHNOLOGY Address smartphone security with enterprise mobility management Allow employees to use the mobile devices they prefer Use EMM solutions to safeguard the unauthorized transmission of ePHI
  • 10. 10 PROCESS Tracking all devices Patient information should be restricted to those who need it to do their job Even devices of those with approved access can pose a security threat
  • 11. 11 PROCESS Partner encrypted technology with the right processes Understand where patient data is stored and how it’s transmitted Be aware of lost or stolen mobile devices and overall network security
  • 12. 12 SENDING AND RECEIVING ePHI Secure data while it’s in your possession Secure data while it’s in transit Ensure appropriate security measures Document and analyze decisions and rationale Periodically review and update security measures
  • 13. 13 PROCESS Implement policies to support your data-protection strategy Acceptable use policies give employees solid direction on maintaining privacy Human error or negligence is one of the greatest dangers to the security of PHI
  • 14. 14 PROCESS Develop an overall business continuity plan Ability to constantly access medical records can be a matter of life and death Your plan should detail the people, processes, and technologies necessary to keep IT systems operational
  • 15. 15 PEOPLE Train your end users • Human error/negligence is a major cause of breaches • Include a strong employee education component
  • 16. 16 PEOPLE Addressing human error Users should have unique, authenticated identities to access PHI Protocols should include auditing functions that monitor proper use and can trace the source of any breaches
  • 17. 17 SECURE TEXT MESSAGING Access staff directory and on-call schedules Security and encryption Receive patient care alerts and test results
  • 18. 18 TAKEAWAYS Protect your patients 1. Define your hospital’s strategy for managing sensitive data 2. Implement policies to support your data-protection strategy 3. Implement multiple layers of security tools to support policies 4. Train your end users 5. Develop an overall business continuity plan
  • 19. 19 LET’S GET IN TOUCH! Learn more: CASE STUDIES VIDEOS We’d love to hear from you! spok.com getinfo@spok.com