Thursday, January 16 | Thought Leadership, Partnerships and Collaboration

Security Management: Building Your Security Roadmap

By Bob Bowes, Director, Enterprise Security

With the recent spike in data breaches, there is no better time than now for healthcare agencies to take a deeper look at the security policies and controls they currently have in place to protect data. With healthcare organizations leading the way on both (1) most targeted and (2) costliest breaches, now is a critical time to evaluate how well your organization is responding to the imminent threat.

 

If you are wondering what kind of cost range these breaches provoke, brace yourself. According to the 2019 Cost of a Data Breach Report, healthcare agencies top the list for the ninth year in a row with an average cost of $6.45 million per breach. That’s a whopping 60% more than the average of all other industries.

 

How do you know if you are a likely target? If you manage a healthcare agency, you are automatically a prime target. However, if you lack a security governance policy or don’t adhere to it, you are even more likely to become a victim of a malicious attack.

 

Some potential risks include hacking or an IT incident, unauthorized access or disclosure, as well as theft. The cost of a breach adds up for smaller agencies too, and one breach could close their doors for good. Many organizations think they can fly under the radar of hackers, but unfortunately cyber attackers don’t discriminate against operational size. Many times the smaller agencies with less sophisticated mechanisms in place make for easy targets.

Aside from patient record costs, organizations can face hefty legal fees, financial penalties and lost revenue due to operational downtime in wake of the security breach. A Protected Health Information (PHI) hack can significantly damage an organization’s reputation, causing loss of business and notoriety among the community.

Over 35 million records were exposed this year alone – that’s about the size of the population of California. With so many people’s personal medical history at stake, the loss of client trust plays a big factor in the cost of a data breach. While your agency may remain solvent after an attack, it could impact the future growth of the organization for many years to come.

You may be asking yourself, where do I begin to ensure I have a strong security policy?

Much like planning a big trip, few people would try to drive from New York to California without a map. Having a security governance policy in place is an important part of managing an organization that handles PHI, and you cannot afford to go without a security roadmap. The alternative is too risky.

The first step in building out your security governance framework is understanding where you are and what you need to get where you want to go. A security assessment will identify any major gaps you might have around security and provide a starting point for building out your strategy. Having a baseline report will help you know where to direct focus and invest budget.

Many times, organizations will piecemeal their security and add certain measures here and there, but security best practices involve having a comprehensive plan that works in cohesion. When it comes to creating a security plan, you need to not only actively work to protect against breaches, but also devise a roadmap for how your organization can mitigate risk and react to current and evolving security threats.

In this series we will take a closer look at cybersecurity solutions to detect and protect, and the importance of having a business continuity plan in place should an incident occur.


About the Author

Bob Bowes, Director, Enterprise Security

Bob is a seasoned professional with over two decades of experience in Healthcare Information Technology, spanning various roles from development/QA and technical support to project and production management. His expertise also encompasses system engineering, operations, and security. Since joining Netsmart in 2017, Bob has been instrumental in driving technological advancements in healthcare. He holds a Bachelor of Science in Health Information Administration from the University of Kansas (2000) and a Masters in Business Administration from Baker University (2006).

Meet the Author

bob-bowes-photo
Bob Bowes · Director, Enterprise Security

From the CareThreads Blog

Blog Client Satisfaction Blog Doctor using Netsmart Applications to help Patient

How and When to Analyze & Update Internal & External Medical Clinic Policies

Sunday, July 21 | Partnerships and Collaboration,Thought Leadership

Updating clinic policies and procedures ensures compliance and reduces risks. Learn how to review medical clinic policies and align with best practices.

More

Exploring the Evolving Landscape of Electronic Visit Verification

Tuesday, July 09 | Thought Leadership,Care Coordination

Electronic visit verification (EVV) is changing the way care is delivered and monitored outside of traditional healthcare facilities. EVV benefits people receiving care through greater accountability and more consistent service delivery. Caregivers also benefit from better connectivity, increased efficiency and less paperwork.

More

Harnessing Integrated Applied Behavioral Analysis (ABA) Software for Autism Advancements

Tuesday, July 02 | Human Services,Partnerships and Collaboration,EHR Solutions and Operations

Autism is one of the fastest-growing areas in human services. A group of experts discuss some of the trends and challenges in the industry. What’s changing in the IDD industry? What do providers need to be aware of?

More