top of page
Nathan Bradshaw

The Value of Your Practice EHR Can Be Threatened after a Data Breach



Overview


An alarming trend in healthcare data security is the proliferation of breaches against third party EHR vendors. Once cybercriminals find ways to compromise a specific software product, its effects can spread rapidly through other medical practices that depend on it.


Fortified Health Security published its Mid-Year Horizon Report on Cybersecurity in Healthcare to reveal that there had been over 337 EHR security breaches during the first six months of 2022 involving 19 million records putting confidential patient data at risk. Many attacks targeting healthcare providers are due to malicious attacks rather than lax security.


OCR (Office for Civil Rights) monitors healthcare breaches, reporting that breaches typically take place via network server, Electronic Medical Record or email. An IBM report on data breach costs revealed that healthcare data breach costs had reached double digits for the first time ever - with healthcare participants experiencing some of the costliest breaches over 12 consecutive years, often reaching over $10 million each time! In this article we explore reasons behind an EMR data breach as well as ways private practice software can protect itself against data breaches.


What Are the Causes of Healthcare Data Breaches in Medical Offices? Current OCR cases under investigation involve breaches caused by hacking/IT incidents, loss or theft and unauthorized access/disclosure. Other possible causes could include human error and misuse of access privileges - something as simple as authorizing access for one task and forgetting to revoke it when completed!


At times, it may simply come down to not placing enough emphasis on security at a medical office, staying current on hardware and software security issues, or making adequate financial investments into cyber security. Many private medical practices also fail to conduct sufficient privacy and security training on an ongoing basis so these issues remain front of mind for everyone in their practice.


What Is the Value of EHR Software After a Data Breach?


Private practices must implement strategies to lessen the likelihood of data breaches, minimize time and effort spent dealing with breaches, ensure patient health and confidence are maintained, as well as ensure their well-being and trust is not at stake. While EHR software makes day-to-day office activities much simpler, its value can reduce if patient information is not protected proactively; investing in high quality EHR software and office security initiatives would prove more efficient and cost effective in protecting patient data than dealing with its consequences after a healthcare data breach occurs.


How Can Hackers Benefit From Stealing Medical Records?


Ransomware attacks, which threaten to shut down digital capabilities unless a monetary ransom is paid, may seem like the fastest solution; however, according to an IBM report this strategy might not actually reduce costs significantly.


Cybercriminals typically target medical records for confidential data that they can turn against its owners. Because medical information tends to outlive bank, credit card, and Social Security numbers which can easily be changed, cyber thieves prefer targeting this market. Shields Health Care Group breach affected approximately 2 million individuals, as well as their personal and sensitive data; but smaller healthcare providers with only several thousand records at risk have also been compromised.


Patient Health Information (PHI), that may be at risk from threats of misuse or theft, includes full names, dates of birth and social security numbers as well as medical insurance provider details, diagnoses and treatment plans, billing information for medical records as well as patient ID numbers, ID cards and contact info. Attackers could sell this data directly; in 2019, full medical records can sell for over $1000 each! Or worse, thieves might use the data themselves to submit fraudulent insurance claims, buy unneeded equipment and supplies illegally, commit identity theft or commit further scams on individuals or even perpetuate further schemes on individuals - either way exposing more data can put at risk!


Strategies to Safeguard EHR Software From Data Breach


Federal HIPAA Security Rules require healthcare providers to safeguard electronic health records with appropriate physical and electronic measures in order to protect sensitive health data. Examples of ways you can secure EHR software include:


· Establish a security officer within your practice.


· Carry out an annual risk evaluation on physical, technical, and administrative security to protect personal health information in your office and EMR systems.


· Utilize audit trails that automatically record when and by whom a system is accessed, along with who accessed it. * Maintain strict control over all digital devices by following security protocols to immediately shut them down in case of loss or theft, followed by regular trainings designed to raise internal security awareness.


· Regularly change passwords with advanced password combinations and require their use. * Employ data encryption so only authorized users have access. * Depend upon an EHR with lockout features, automatic logoffs, mandatory resets, two-factor authentication and security questions in place for added protection. * Additionally, create a data backup plan as part of any emergency preparedness strategy.


· Develop remediation protocols before an incident takes place to reduce stress during response to attacks against your office.


Avoid Data Breaches


Partner with a healthcare technology company that offers HIPAA compliant EHR software like CureMD EHR to protect your private practice against potential data breaches. CureMD serves the needs of Ambulatory Medical Practices of all sizes and specializations through its cloud-based EHR, featuring modules and features like Practice Management, Medical Billing, Revenue Cycle Management, Telemedicine Patient Portal and E-prescription while being designed with data security in mind.

Comentarios


Top Stories

bottom of page