Healthcare security depends on more than file encryption


By Christine Kern, contributing writer

True data security means encryption of everything in transit, from end to end.

As healthcare organizations continue to dive deeper into digital, security has been an obvious (and ongoing) concern, especially in light of recent breaches and cyberattacks. But as they try to ensure the privacy of their protected data, it is important to recognize healthcare security depends on more than just file encryption — it must include the encryption of everything in transit, form end to end.

The reason for this is two-fold, according to Revation Systems’ CEO Perry Price, who has more than 20 years of experience with secure telecommunications and whose company helps hospitals transform digitally through a secure, HIPAA-compliant and unified communications contact center solution.

On one hand, hospitals are facing the challenge of the legacy architecture that many are trying to use to deploy their innovative telehealth solutions because many of the older systems aren’t able to handle the latest technological advancements. When older systems meet newer technology, it creates vulnerabilities that allow breaches and cyberattacks to occur.

In fact, according to The Ponemon Institute, “Ninety-one percent of healthcare organizations reported at least one data breach in the past two years, and more than 60 percent of hospitals have no breach response in place.” That means healthcare organizations need to be fully cognizant of their efforts to forestall cyberattacks before they can be launched.

But security in healthcare is about more than just file encryption. It’s the encryption of everything in transit; meaning application-level encryption with everything at rest, the ability to create private keys for single sessions and ensuring every aspect is HIPAA compliant.

Doug Copley, Senior Security and Privacy Strategist at Forcepoint, says, “The risk of data theft is only growing as government policies are driving increasing volumes of healthcare data to be routed across the Internet every day — to health information exchanges, public health entities, healthcare consortiums, and others. To effectively manage this risk, organizations need to keep pace with cyber security innovations to identify the riskiest insiders and data transfers and prevent sensitive data from getting into the hands of the criminals.”

That also means encrypting data at every stage of transmission, including robust controls at entry and exit points to the networks, strong insider controls that protect data at endpoint devices, and appropriate encryption tools throughout.

Ultimately, as more of the healthcare industry becomes digital, it’s vital for providers to get the security part right the first time, before it’s too late to rectify the situation and millions of private medical records are breached.



July 8, 2016


Topic Area: Press Release


Recent Posts

States Move Forward to Better Protect Senior Citizens

Senior citizens are among the most vulnerable population and require a certain level of care. States are trying to protect them.


Archer and REDA to Transform Newport Beach Building into Outpatient Center

Groundbreaking on the Newport Irvine Medical Center is scheduled for June 2025.


Sunflower Medical Group Facing Lawsuit Following January Data Breach

The lawsuit seeks a jury trial, damages, expanded credit monitoring services and security improvements at Sunflower Medical Group.


Nemours Children's Health Opens New Location in Lake Nona

The nearly 8,000-square-foot facility will increase access to primary and specialty care services.


Enhancing Safety at Hennepin Healthcare with a Screening System

Case study: The system was able to detect 2,500 risk items in less than five months.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.