SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Published on Healthcare Finance News (http://www.healthcarefinancenews.com)
Home > Top 10 tips for avoiding a costly security breach




Top 10 tips for avoiding a costly security
breach
By rletourneau
Created 07/26/2011

NEW YORK – Given the significant financial and reputational costs that result from security
breaches, healthcare providers must understand the importance of expanding and
enhancing employee data security training before a breach event occurs, said Brian Lapidus,
COO of the Fraud Solutions division of Kroll, a New York City-based risk mitigation company.

“Strong data security policies and procedures are only as effective as the employees who
implement them. For that reason, it is critical that companies train their employees to be
privacy advocates for the organization,” said Lapidus. “The best training programs show
employees how to take an active and personal role in the data security of your organization,
while demonstrating whatʼs at stake, from an organizational and regulatory standpoint, when
a security gap occurs.”

Here are Lapidusʼ top 10 tips for securing what is arguably the most sensitive data your
organization possesses – medical records:

1. Make sure all employees are trained. HIPAA and HITECH both set forth requirements
for training all new and current workforce members, including contract workers, temporary
workers and volunteers. Itʼs smart business, and itʼs also the law.

2. Plan your data security employee training in lockstep with overall employee
education. Incorporating data security training into your companyʼs overall employee
education program is vital to its proper documentation and implementation. Making data
security training part of your official employee education program also ensures that courses
get evaluated and refreshed periodically, and that program effectiveness is monitored
regularly.

3. Use roles-based training. Everyone needs training, but not everyone needs the same
program. Training should be tailored and weighted per the volume and sensitivity of the
patient healthcare information and personal identifiable information to which each individual
has access. The best practice is to develop a basic training program for all employees with
tailored elements for different employee tiers and categories.

4. Donʼt make data security training a one-off. It is critical that organizations make data
security training an ongoing activity. HIPAA and HITECH have provisions for initial training of
new and current employees, as well as incorporating ongoing training in instances where
policies or procedures may have changed or for the dissemination of new information.
5. Verify and document all training to maintain compliance. HIPAA requires a covered
entity to be able to verify training through specific documentation requirements. These
records need to be retained for a period of six years.

6. Pay special attention to business associate training. Itʼs likely that you wonʼt be
providing training directly to your business associate (BA) employees; however, it will be the
covered entityʼs responsibility to include this in the BAA (Business Associate Agreement) as
part of your requirements for doing business. Further, itʼs your responsibility to make sure
the BAʼs training plan meets your requirements and provides proper documentation.

7. Build job-specific scenario exercises into training. Beyond the minimum requirements
of HIPAA privacy and security rules, covered organizations should take into consideration
job-specific scenarios that employees are most likely to encounter. Make sure that the
roles-based training addressed in tip 3 (above) includes exercises that challenge employees
to think about how they might handle situations likely to arise in their current roles.

8. Donʼt forget breach detection and escalation. For covered entities, the 60-day
stopwatch starts when the organization knew or “reasonably should have known” that a
breach occurred. Itʼs important to train employees to recognize a potential breach and
escalate information to key administrators who are designated first responders.

9. Include data security wisdom in all your employee communications channels. To
keep privacy and security top of mind, engage in ongoing communication with employees via
newsletters, emails, login reminders, notices posted in conspicuous areas or other internal
channels.

10. Create a cultural shift within the organization. To be truly effective, training and
education should be part of the culture rather than just the “required” act of signing an
agreement. Organizations must demonstrate a top-down commitment to understanding
privacy and security requirements and to keeping data safe.

Source URL: http://www.healthcarefinancenews.com/news/top-10-tips-avoiding-costly-security-breach

Más contenido relacionado

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Kroll Top 10 Tips For Avoiding Security Breach

  • 1. Published on Healthcare Finance News (http://www.healthcarefinancenews.com) Home > Top 10 tips for avoiding a costly security breach Top 10 tips for avoiding a costly security breach By rletourneau Created 07/26/2011 NEW YORK – Given the significant financial and reputational costs that result from security breaches, healthcare providers must understand the importance of expanding and enhancing employee data security training before a breach event occurs, said Brian Lapidus, COO of the Fraud Solutions division of Kroll, a New York City-based risk mitigation company. “Strong data security policies and procedures are only as effective as the employees who implement them. For that reason, it is critical that companies train their employees to be privacy advocates for the organization,” said Lapidus. “The best training programs show employees how to take an active and personal role in the data security of your organization, while demonstrating whatʼs at stake, from an organizational and regulatory standpoint, when a security gap occurs.” Here are Lapidusʼ top 10 tips for securing what is arguably the most sensitive data your organization possesses – medical records: 1. Make sure all employees are trained. HIPAA and HITECH both set forth requirements for training all new and current workforce members, including contract workers, temporary workers and volunteers. Itʼs smart business, and itʼs also the law. 2. Plan your data security employee training in lockstep with overall employee education. Incorporating data security training into your companyʼs overall employee education program is vital to its proper documentation and implementation. Making data security training part of your official employee education program also ensures that courses get evaluated and refreshed periodically, and that program effectiveness is monitored regularly. 3. Use roles-based training. Everyone needs training, but not everyone needs the same program. Training should be tailored and weighted per the volume and sensitivity of the patient healthcare information and personal identifiable information to which each individual has access. The best practice is to develop a basic training program for all employees with tailored elements for different employee tiers and categories. 4. Donʼt make data security training a one-off. It is critical that organizations make data security training an ongoing activity. HIPAA and HITECH have provisions for initial training of new and current employees, as well as incorporating ongoing training in instances where policies or procedures may have changed or for the dissemination of new information.
  • 2. 5. Verify and document all training to maintain compliance. HIPAA requires a covered entity to be able to verify training through specific documentation requirements. These records need to be retained for a period of six years. 6. Pay special attention to business associate training. Itʼs likely that you wonʼt be providing training directly to your business associate (BA) employees; however, it will be the covered entityʼs responsibility to include this in the BAA (Business Associate Agreement) as part of your requirements for doing business. Further, itʼs your responsibility to make sure the BAʼs training plan meets your requirements and provides proper documentation. 7. Build job-specific scenario exercises into training. Beyond the minimum requirements of HIPAA privacy and security rules, covered organizations should take into consideration job-specific scenarios that employees are most likely to encounter. Make sure that the roles-based training addressed in tip 3 (above) includes exercises that challenge employees to think about how they might handle situations likely to arise in their current roles. 8. Donʼt forget breach detection and escalation. For covered entities, the 60-day stopwatch starts when the organization knew or “reasonably should have known” that a breach occurred. Itʼs important to train employees to recognize a potential breach and escalate information to key administrators who are designated first responders. 9. Include data security wisdom in all your employee communications channels. To keep privacy and security top of mind, engage in ongoing communication with employees via newsletters, emails, login reminders, notices posted in conspicuous areas or other internal channels. 10. Create a cultural shift within the organization. To be truly effective, training and education should be part of the culture rather than just the “required” act of signing an agreement. Organizations must demonstrate a top-down commitment to understanding privacy and security requirements and to keeping data safe. Source URL: http://www.healthcarefinancenews.com/news/top-10-tips-avoiding-costly-security-breach