JHC April 20

Page 20

CYBERSECURITY

Threat Assessment Healthcare providers must first identify where hackers can enter their system before developing effective security measures

Because of their sensitive nature, medical records are a big target of hackers.

valuable than a single item of the same,

In 2018 alone, HHS’ Office of Inspector General investigated nearly 400 reports of

with less effort to obtain.”

medical data breaches that potentially impacted thousands of patients, according to the Advisory Board.

Once an intrusion has been verified, systems need to deploy network forensic experts to identify the root cause and bring a systematic approach to isolating

Stolen healthcare records can have an

18

“In most cases, victims of fraud are

the issues, mitigating the impacts of the

enormous financial impact to a hospital

not even aware that their information has

breach and implementing permanent cor-

system, said Terry Moon, assistant vice

been stolen until it’s way too late,” he said.

rective actions.

president of strategic sourcing, IT and

The rich information in a medical

“Depending on the data exposure

cybersecurity at HealthTrust. The main

record could include social security num-

and local laws, breach notification, credit

concerns with stolen medical records are

bers, credit card numbers, birth dates,

monitoring and more are also put in place

identity theft and filing false medical claims.

addresses and more, and is far more

to help protect patients,” Moon said.

April 2020 | The Journal of Healthcare Contracting


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.