What Healthcare Providers Need to Know About Cybersecurity and HIPAA

What Healthcare Providers Need to Know About Cybersecurity and HIPAA

HIPAA regulations have been part of the security landscape for more than two decades. But the way electronic personal health information (PHI) has been stored and shared has changed dramatically in recent years, even more so because of the COVID-19 pandemic. While the U.S. Health and Humans Services’ Office for Civil Rights (OCR) gave providers some enforcement discretion to support telemedicine and vaccination scheduling, those “good faith” passes are expiring, and anyone dealing with PHI needs to double down on cybersecurity. While we were all on a bit of a pause during the COVID pandemic, the threat actors were still hard at work looking for ways to exploit healthcare providers to obtain PHI.

OCR is updating the cybersecurity framework for ongoing HIPAA compliance. We’ve been active in making recommendations, as working with health care providers is a core part of Tego’s business.

As we exit the pandemic, there are four keys to reducing risk now:

  • Educate employees continually to avoid phishing-related breaches.
  • Secure mobile devices that were allowed for the first time during the COVID crisis.
  • Back up data appropriately to dampen the impact of a ransomware demand.
  • Take a sophisticated approach to rapidly accepting and applying patches.

Why Security is Getting Harder

Zero-day vulnerabilities are becoming more common. Threat actors are everywhere, with some rogue organizations existing solely to make money through breaches. It’s a trillion-dollar industry.  Importantly for healthcare organizations, breach notifications are required, with some states going beyond what the federal government requires.  While it is important to complete breach notification, the news will be detrimental to trust relationship with clients and business associates alike.

So, what can you do about it?

Education is critical – It can’t be stated enough. Staff need to understand how phishing attacks work and how to avoid them. The bad actors constantly change their methods. As part of cybersecurity efforts, healthcare providers must build a culture of security.

Mobile devices can introduce risk – After the shift to remote work during COVID, companies often made it easier for employees to log in from anywhere on any device. Security was an afterthought. Organizations need to assess the vulnerabilities and secure information traveling to and from these devices.

Take some of the sting out of ransomware attacks –Even organizations who are cybersecurity resilient are at risk. Backing up and storing data securely is a must so your organization can remain up and running. The majority of incidents we see stem from ransomware attacks.

Re-engineer your approach to patches – To stay on top of the patches that software vendors send out, embrace a change management approach that ensures effective deployment while minimizing downtime.  IT teams also need to understand what to do when a zero-day vulnerability occurs for which there is no patch.

A great way to reduce risk is to look for security audit and compliance tools that help assess the individual vulnerabilities of your organization’s environment. A good set of tools will help with the change management element of deploying patches.

Learn more about HIPAA compliance in this webinar. To schedule your HIPAA risk assessment, contact us today.

About the author
Jennifer Vosburgh is a seasoned Marketing and Communications professional. With over 15 years of experience, she has a strong background in Marketing, Communications, and Event Management. As Vice President of Tego Data Systems in Raleigh, NC, Jennifer is responsible for delivering full-scale Marketing Campaigns across all platforms including website, email, social media, events, and more.

By using this website you agree to our updated Conditions of Use and consent to the collection and use of your personal information as described in our updated Privacy Notice, which includes the categories of data we collect and information about your preferences and rights.