By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > Technology > Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare
Technology

Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare

Karin Ratchinsky
Karin Ratchinsky
Share
7 Min Read
SHARE

Security is a serious issue for healthcare providers — and one that won’t resolve itself. With close to 100 million healthcare records compromised between January and June at a high cost of $363 per record, IBM labeled 2015 the “year of the healthcare security breach.” Ninety-six percent of industry IT security experts feel vulnerable to a data breach, and 63 percent report having suffered one. Despite these concerns, however, 69 percent feel that meeting compliance requirements is “very” or “extremely” effective in safeguarding sensitive data. Is that confidence misplaced?

Contents
  • The Shortcomings of Compliance
  • The Biggest Threats to Healthcare Security

The Shortcomings of Compliance

The security and privacy rules outlined in HIPAA established national security standards to protect electronically held and transferred healthcare information. Rolled out alongside meaningful use stipulations, these standards were a critical step in the fight to protect highly confidential digitized information from unauthorized access. Cyberthreats and the security landscape evolve rapidly, and industry standards cannot keep pace. As more communications are run over networks and more care-critical applications are virtualized in centralized data centers, ensuring security and uptime will become more important. Providers must protect not only data, but also the continuity of care and the availability and performance of digital tools. End points are expanding and growing ever more complex. New approaches in healthcare, telemedicine, at-home care, and mobile health will only increase over the next decade. These developments will amplify current complexities, making end-to-end security even more critical.

The Biggest Threats to Healthcare Security

Healthcare professionals should concern themselves with three major threats today:

1. Vulnerable Connected Devices The number of connected devices in healthcare is growing exponentially, and industry forecasters predict the market for these devices will reach $163.24 billion by 2020. This is a welcome development in that it is helping to revolutionize our healthcare industry — but more devices also mean more end points and, subsequently, a greater threat of potential criminal interference along the way. Cybercriminals can exploit these devices and scan for open ports to find ways to infiltrate networks. Once inside, they can plant malware, Trojan horse attacks, and viruses capable of causing untold damage. While the threat to data is recognized, the impact such attacks can have on connected devices is less commonly understood. And everyone involved with a healthcare organization needs to appreciate this danger.

If a dialysis machine is connected to the internet, for example, then it is vulnerable to malware — and the consequences of such an event could be deadly. To avert such catastrophes, healthcare organizations must educate all employees and consistently scan the edges of their own infrastructure for weaknesses. 2. Distributed Denial-of-Service (DDoS) Attacks Imagine an ER doctor consulting with a neurologist as he or she treats a stroke patient. The two are talking via a telemedicine connection when the network suddenly goes down and communication channels close. The result could be devastating, and DDoS attacks can create this kind of situation. A distributed denial-of-service attack is one of the most prevalent types of security threats today, with a 40 percent increase in DDoS attacks in the second half of 2015 — and they don’t require a high level of technical knowledge to pull off. A DDoS attack consists of an attempt to make a machine or network resource unavailable to its intended users by flooding it with access requests from thousands of unique IP addresses. This type of attack is particularly worrisome for healthcare organizations whose care-critical applications and communications rely on uptime and network performance. In early 2016, for instance, a large acute care provider called us after experiencing a DDoS attack that nearly took down its entire IT organization. We were able to identify the threat and mitigate it, but this is just one of countless examples where healthcare organizations are targeted by DDoS attacks and left with no or limited access to care-critical tools and information. As more care-critical applications are virtualized, these attacks will become increasingly devastating.

More Read

Securement-size-growth
Surgical Sealants, Glues, Sutures/Clips, Hemostats Outside the U.S.
Challenges of Stage 2 Meaningful Use Require More Allies
UVA Summit, 2nd Day – Ozmosis Interview
Prochon Biotech May Restore Quality of Life For Millions Who Suffer From Cartilage Injury
Medical Image Archiving in the Cloud? Consider the 4 S’s
3. Phishing Scams Thus far, more than 36 percent of security breaches suffered by U.S. healthcare organizations in 2016 were phishing attacks. Because they target one of the most labor-intensive industries, healthcare phishing attacks, in particular, require immediate attention and action. A phishing attack involves an attempt by criminals to acquire sensitive information — from usernames and passwords to credit card details and Social Security numbers — by masquerading as a trustworthy entity. Employees, administrators, and IT departments need to collaborate as a team to prevent such attacks and ensure that confidential patient information is protected. To do so, organizations must carefully determine who will be provided with access to data sets and systems on the network. Clearance should be restricted, and access codes should never be shared. Creating a proper framework for data access is the best way to help IT professionals identify unusual activity. Security threats are so prevalent today that it is not a matter of whether an attack will occur, but when. Healthcare organizations must make security a top priority and invest in digital tools that are iterative to help prioritize resources and address the most pressing threats. With 73 percent of U.S. healthcare organizations suffering incidents related to third-party vendors, they must research and vet all potential providers thoroughly. They can start by selecting best-of-breed players capable of delivering comprehensive security solutions, secure-but-mobile end points, protected patient data, and network continuity. This requires a global view of the healthcare security landscape. There is simply too much at stake for organizations to sit on the sidelines and maintain simple compliance.
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

healing care
Why Healing Spaces Depend On Healthy Building Systems
Infographics News
November 19, 2025
clean water importance
Protecting Patients Through Strong Water Safety Practices In Healthcare Facilities
Health Infographics
November 19, 2025
hearing and brain health
The Quiet Connection Between Hearing And Brain Health
Health Infographics
November 19, 2025
Traumatic Brain Injuries
Adjusting To Life After A Traumatic Brain Injury
Infographics News
November 19, 2025

You Might also Like

Prosthetic Arms That Feel and Connect to the Human Nervous System- Bionics TED Video

October 21, 2011

4 Doctors’ Takes on Google Glass in Hospitals and Public Health

March 9, 2014
Technology

The Future Of Technology Advances In Medicine

July 29, 2019
hearing aid market
BusinessFinanceMedical DevicesPolicy & LawPublic HealthTechnology

Can You Hear Me Now? Another Health Market that Really Works

November 21, 2013
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?