By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > Technology > Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare
Technology

Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare

Karin Ratchinsky
Karin Ratchinsky
Share
7 Min Read
SHARE

Security is a serious issue for healthcare providers — and one that won’t resolve itself. With close to 100 million healthcare records compromised between January and June at a high cost of $363 per record, IBM labeled 2015 the “year of the healthcare security breach.” Ninety-six percent of industry IT security experts feel vulnerable to a data breach, and 63 percent report having suffered one. Despite these concerns, however, 69 percent feel that meeting compliance requirements is “very” or “extremely” effective in safeguarding sensitive data. Is that confidence misplaced?

Contents
  • The Shortcomings of Compliance
  • The Biggest Threats to Healthcare Security

The Shortcomings of Compliance

The security and privacy rules outlined in HIPAA established national security standards to protect electronically held and transferred healthcare information. Rolled out alongside meaningful use stipulations, these standards were a critical step in the fight to protect highly confidential digitized information from unauthorized access. Cyberthreats and the security landscape evolve rapidly, and industry standards cannot keep pace. As more communications are run over networks and more care-critical applications are virtualized in centralized data centers, ensuring security and uptime will become more important. Providers must protect not only data, but also the continuity of care and the availability and performance of digital tools. End points are expanding and growing ever more complex. New approaches in healthcare, telemedicine, at-home care, and mobile health will only increase over the next decade. These developments will amplify current complexities, making end-to-end security even more critical.

The Biggest Threats to Healthcare Security

Healthcare professionals should concern themselves with three major threats today:

1. Vulnerable Connected Devices The number of connected devices in healthcare is growing exponentially, and industry forecasters predict the market for these devices will reach $163.24 billion by 2020. This is a welcome development in that it is helping to revolutionize our healthcare industry — but more devices also mean more end points and, subsequently, a greater threat of potential criminal interference along the way. Cybercriminals can exploit these devices and scan for open ports to find ways to infiltrate networks. Once inside, they can plant malware, Trojan horse attacks, and viruses capable of causing untold damage. While the threat to data is recognized, the impact such attacks can have on connected devices is less commonly understood. And everyone involved with a healthcare organization needs to appreciate this danger.

If a dialysis machine is connected to the internet, for example, then it is vulnerable to malware — and the consequences of such an event could be deadly. To avert such catastrophes, healthcare organizations must educate all employees and consistently scan the edges of their own infrastructure for weaknesses. 2. Distributed Denial-of-Service (DDoS) Attacks Imagine an ER doctor consulting with a neurologist as he or she treats a stroke patient. The two are talking via a telemedicine connection when the network suddenly goes down and communication channels close. The result could be devastating, and DDoS attacks can create this kind of situation. A distributed denial-of-service attack is one of the most prevalent types of security threats today, with a 40 percent increase in DDoS attacks in the second half of 2015 — and they don’t require a high level of technical knowledge to pull off. A DDoS attack consists of an attempt to make a machine or network resource unavailable to its intended users by flooding it with access requests from thousands of unique IP addresses. This type of attack is particularly worrisome for healthcare organizations whose care-critical applications and communications rely on uptime and network performance. In early 2016, for instance, a large acute care provider called us after experiencing a DDoS attack that nearly took down its entire IT organization. We were able to identify the threat and mitigate it, but this is just one of countless examples where healthcare organizations are targeted by DDoS attacks and left with no or limited access to care-critical tools and information. As more care-critical applications are virtualized, these attacks will become increasingly devastating.

More Read

biopharma beat Apple HealthKit
BioPharma Beat: Apple and the Dawn of the Worried Well (the Sequel)
On the Road Again for Cancer Connections
First HHS Innovation Fellowships’ Meeting Focuses on New Measures of Quality in Healthcare
How Virtual Reality Is Changing The Healthcare Industry
Leveraging Beacons to Improve Patient Experience
3. Phishing Scams Thus far, more than 36 percent of security breaches suffered by U.S. healthcare organizations in 2016 were phishing attacks. Because they target one of the most labor-intensive industries, healthcare phishing attacks, in particular, require immediate attention and action. A phishing attack involves an attempt by criminals to acquire sensitive information — from usernames and passwords to credit card details and Social Security numbers — by masquerading as a trustworthy entity. Employees, administrators, and IT departments need to collaborate as a team to prevent such attacks and ensure that confidential patient information is protected. To do so, organizations must carefully determine who will be provided with access to data sets and systems on the network. Clearance should be restricted, and access codes should never be shared. Creating a proper framework for data access is the best way to help IT professionals identify unusual activity. Security threats are so prevalent today that it is not a matter of whether an attack will occur, but when. Healthcare organizations must make security a top priority and invest in digital tools that are iterative to help prioritize resources and address the most pressing threats. With 73 percent of U.S. healthcare organizations suffering incidents related to third-party vendors, they must research and vet all potential providers thoroughly. They can start by selecting best-of-breed players capable of delivering comprehensive security solutions, secure-but-mobile end points, protected patient data, and network continuity. This requires a global view of the healthcare security landscape. There is simply too much at stake for organizations to sit on the sidelines and maintain simple compliance.
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

weight loss surgeon
How to Choose the Best Surgeon for Weight Loss Surgery
Weight Loss Wellness
February 11, 2026
aging care healthcare system
The Growing Role of Terminal Care Specialists in a Rapidly Aging Healthcare System
Global Healthcare Senior Care
February 11, 2026
Why Trauma and Addiction Are Linked and How Effective Programs Treat Both
Addiction Addiction Recovery
February 10, 2026
car accident injuries
The Hidden Healthcare Impact of Car Accident Injuries
News Policy & Law
February 8, 2026

You Might also Like

Man in the UK Who Severed His Thumb Gets His Own Big Toe As A Replacement

September 18, 2011
SpecialtiesTechnology

How Can Big Data Bring Hope to Mesothelioma Patients?

November 20, 2017
Unique ways technology is revolutionizing mental healthcare
Mental Health

Unique Ways Technology is Revolutionizing Mental Healthcare

December 11, 2023
Artificial IntelligenceTechnology

Are Healthcare Leaders Ready For AI-Driven Change?

June 13, 2018
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?