The bar for security in Healthcare IT is so high it takes Olympic-class efforts to clear it. Securing data is the most critical hurdle. So where is your most sensitive data? In files, of course. And it is these files that fly about like seagulls at the fishing pier. There are, however, three keys to healthcare IT that can help reduce your risk.
Healthcare breaches, at $9.23 million per incident, are the most expensive of any industry, according to an IBM/Ponemon analysis, and reported on in a Beckers Hospital Review blog. Meanwhile, “Nearly half (44 percent) of the breaches analyzed in the report exposed customer personal data, including healthcare information, names, emails and passwords,” IBM found.
It takes on average 287 days to discover, identify and contain a health care data breach. “Data breaches that took longer than 200 days to identify and contain cost on average $4.87 million, compared to $3.61 million for breaches that took less than 200 days. Overall, it took an average of 287 days to identify and contain a data breach, seven days longer than in the previous report. To put this in perspective, if a breach occurring on January 1 took 287 days to identify and contain, the breach wouldn’t be contained until October 14th. The average time to identify and contain varied widely depending on the type of data breach, attack vector, factors such as the use of security AI and automation, and cloud modernization stage,” the IBM/Ponemon report found.
Aside from breaches, HIPAA is obviously the fundamental issue healthcare IT and security professionals face today. Of course, there are the fines we just mentioned, but more than that healthcare organizations want to protect patient privacy. It is the right thing to do and good for business.
Key issues for HIPAA compliance include:
These issues can be addressed by ensuring that data is encrypted during transmission, that changes to files are detected and that the audit trail shows everything that happened to a file during the movement process.
Many, but not all IT professionals are familiar with the concept of Zero Trust. There's a bit of irony to the term as Zero Trust means that the best way to protect all your data and assets is to trust absolutely nothing — until areas of network are proven trustworthy. The idea is to work with each element of your entire environment step-by-step to protect and secure each.
The Zero Trust Architecture was invented by then Forrester analyst John Kindervag in 2010. “Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access,” explained CSO magazine.
Files are sometimes forgotten in this effort, but should be FIRST and FOREMOST when it comes to zero trust. Your files need a high level of protection and no one should be trusted to access them without explicit permission and authentic authentication.
Microsoft, a key Zero Trust proponent, defines it this way. “Instead of assuming everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to ‘never trust, always verify.’ Every access request is fully authenticated, authorized, and encrypted before granting access. Microsegmentation and least privileged access principles are applied to minimize lateral movement. Rich intelligence and analytics are utilized to detect and respond to anomalies in real time,” Microsoft explained.
One key to Zero Trust is strong identity management and protection, largely through authentication which should be applied across the environment.
This speaks to the issue of least privilege access which is part of Zero Trust. The concept of least privilege access is to limit user rights to only what is absolutely needed. In the case of files, only those who need to touch, transfer or receive a file should be able to do so.
Is your legacy file transfer solution doing the job? Here are some questions from our 7 File Transfer Challenges of Healthcare IT Teams eBook to get to the root of the issue:
From healthcare billing to insurance-eligibility inquiries and HCAHPS surveys, the business of healthcare depends on the reliable, secure and compliant transfer of Protected Health Information (PHI). The MOVEit suite of Secure File Transfer products assures encryption of data at rest and in motion, delivery to the intended recipient and detailed audit logs. MOVEit provides the features and deployment flexibility required to meet HIPAA and GDPR compliance.
According to the MOVEit Cloud Healthcare Data Sheet, “The secure, efficient movement of files between healthcare organizations and their business partners accelerates the delivery of care, expedites the determination of payment eligibility, and streamlines other core business functions.”
Learn more about how MOVEit works within Healthcare!
Profitable growth of your healthcare network requires on-boarding new healthcare service providers cost-effectively. Scalable IT operations are an essential ingredient for success. MOVEit provides the ideal business service platform to support profitable expansion and the accelerated roll-out of competitive new services such as appointment reminders and patient retrieval of medical records.
Automate your medical billing process and ensure 837 health care claims and 835 electronic remittance advice (ERA) notifications are securely delivered within the time frames required by SLAs and in compliance with HIPAA.
Automate the transfer of patient discharge records to survey agencies to ensure that all patient discharge information is securely delivered for appropriate processing and patient surveys are conducted on a regular basis.
VIVA Health, which insures the health of over 100,000 people, struggled with the transfer of files using complex and problem-prone DOS scripts. The answer? Automating file transfers using MOVEit, as our Viva Health Case Study points out “Scheduling jobs was a bear,” says Ryan Kramer, VIVA Health’s Manager of Information Systems. “If a password changed, we had to manually reschedule every job. Tasks broke down pretty regularly, so they had to be monitored very closely. Focusing on something this mundane was distracting and time-consuming, and often kept us from working on tasks that were ultimately of higher value.”
Automating with MOVEit Automation is paying big dividends for VIVA Health. “We estimate that MOVEit is saving us the equivalent of two full-time equivalents (FTEs). We had one employee who was transferring to another department. With MOVEit, I was able to automate 75% of the work he had been doing, so we saved 75% of one man-year on his part alone. Plus, our PCs are no longer tied up on these tasks,” said Automation Engineer Ragan McBride.
Moving files securely in the Healthcare space is mission-critical as these files usually contain personal sensitive information, and organizations deal with strict policies governing patient privacy.
The secure, efficient movement of files between healthcare organizations and their business partners accelerates the delivery of care, expedites the determination of payment eligibility and streamlines other core business functions.
Find out how MOVEit Managed File Transfer works for Healthcare!
The Healthcare Information and Management Systems Society (HIMSS) 2021 conference is happening in Las Vegas in-person August 9-13.
Visit Progress Software at booth #1621 where we are raffling off a Onewheel – and showing what Managed File Transfer solutions can do for you!
Nothing in this document constitutes legal advice. The reader should consult with legal counsel regarding its legal and/or compliance obligations. Progress makes no representation or warranty regarding the completeness or accuracy of the information contained herein.
Doug Barney was the founding editor of Redmond Magazine, Redmond Channel Partner, Redmond Developer News and Virtualization Review. Doug also served as Executive Editor of Network World, Editor in Chief of AmigaWorld, and Editor in Chief of Network Computing.
Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.
Learn MoreSubscribe to get all the news, info and tutorials you need to build better business apps and sites