© 20011 Cygnus, Inc.

Cygnus: Workstation Solutions for Healthcare

Cygnus creates wood and metal computer workstation solutions with a focus on the healthcare industry. Wall mounted computer desks, charting stations, articulating arms and medication cabinets are some of our largest sellers. Also visit our Social Media page and connect with us. http://www.cygnusinc.net/get_social_with_cygnus.html

Tuesday, January 31, 2012

amednews: Small medical practices greatly at risk for data breaches :: Jan. 16, 2012 ... American Medical News

from amednews: Small medical practices greatly at risk for data breaches :: Jan. 16, 2012 ... American Medical News:


Data breach experts are issuing a warning to small practices -- don't be the vulnerable target that data thieves assume you are.
The Top Cyber Security Trends for 2012, as compiled by Kroll's Cyber Security and Information Assurance, reported that small practices are more susceptible to security vulnerabilities because they are "the path of least resistance." Many rely on outdated technology. Basic security protections, such as proper use of encryption, often are overlooked as practices focus on meeting regulatory requirements, such as those related to meaningful use. (See correction)
Small practices often lack the technical sophistication to know what tools to put in place to avoid attacks, said Jason Straight, managing director of Kroll's Cyber Security and Information Assurance unit. Or they have the right tools, but the tools are not implemented or monitored correctly, he said. One example is having incorrectly installed data encryption.
Large organizations have become more "hardened," meaning they spend more money to safeguard their data, said Beth Givens, founder and director of the Privacy Rights Clearinghouse, an education and advocacy group that has tracked publicly reported data-breach trends across all industries since 2005. "It only stands to reason [that data thieves] would go after small practices," she said.
Breach experts have long said medical data are among the most valuable because of the depth of the information. To thieves, small organizations are often the easiest source of this data because they lack the sophisticated security measures used by their larger counterparts. Because nearly three-quarters of practices are one- or two-doctor operations, there are simply more of them to target compared with large organizations. The advice given to practices is to take steps to ensure they aren't the victims of a breach.

The costs of a breach

Three of the six most significant data breaches in 2011 occurred at health care organizations, resulting in 11 million patient records being put at risk, according to a year in review report published in December 2011 by the Privacy Rights Clearinghouse.
Givens said medical data are valuable to thieves because of "the triple whammy" -- sensitive medical information, financial data and other identifying data that can be used for identity theft.
3 of the 6 biggest data breaches of 2011 were at health care organizations, putting 11 million patient records at risk.
When a breach occurs, the practices are faced with the cost of notifying all of the affected patients and usually paying for identity theft and credit monitoring for them. The per-patient costs associated with a breach have risen to more than $200 in 2011 for notification and loss of income, according to the Ponemon Institute, a privacy research center based in Traverse City, Mich.
Many breaches also bring to light deficient IT systems that the practice must replace immediately. In addition, the practices could face fines from the Dept. of Health and Human Services.
Although breaches at large medical organizations often get more media attention because of the sheer number of records involved, that shouldn't be an indication that small practice owners are in the clear, experts say.
It's hard to put an exact number on small practice breaches because breaches generally are categorized by industry and not broken down by practice size, Givens said. There's also a good chance many of the breaches in small practices aren't reported because they don't fall under the state or federal reporting requirements. For example, California doesn't require the reporting of paper breaches, and HHS doesn't require the reporting of breaches affecting fewer than 500 people.
A query of the HHS breach database and the Privacy Rights Clearinghouse's database shows dozens of cases involving individual physicians and small medical practices that were victims of cyber attacks in 2011. Cases include the hacking of network servers, office burglaries, inside data thefts, and incidents caused by information technology problems that may have been malicious attacks or errors that resulted in data exposure. Givens said she is sure there are "a lot more breaches than are posted on our website."

Labels: , , , ,

Bookmark and Share
posted by Dan Laninga at 0 Comments

Thursday, May 27, 2010

Federal workgroup wants encryption even for direct HIE


May 27, 2010 — 12:27pm ET | By Neil Versel on http://www.fierceemr.com

The privacy and security workgroup of the federal Health IT Policy Committee is recommending that providers encrypt any personally identifiable patient information whenever they share data with others, even when a third-party health information exchange is not involved.

The workgroup is asking HHS officials to set policies for data encryption, limits on specificity in message headers and identity verification of both sender and receiver, even in direct, one-to-one exchanges, as part of final rules for "meaningful use" of EMRs, Government Health IT reports. Such rules are what a "reasonable patient would expect," said workgroup co-chair Deven McGraw, director of the Health Privacy Project at the Center for Democracy and Technology.

This recommendation takes into account new, tougher, HIPAA privacy and security rules, which come with increased penalties for violations. "If strong policies, such as the above, are in place and enforced, we don't think this scenario needs any additional individual consent beyond what is already required by current law," McGraw said.

Direct HIE likely will be a "stage 1" requirement of meaningful use. HHS promises a final rule in June.


Read more:
http://www.fierceemr.com/story/federal-workgroup-wants-encryption-even-direct-hie/2010-05-27#ixzz0p9mEGO9P

Labels: , , , , ,

Bookmark and Share
posted by Dan Laninga at 0 Comments

Wednesday, April 29, 2009

Information Security Management Systems (ISMS) Best Practices Flow Chart


New flow chart for healthcare IT security available in PDF format. http://www.cygnusinc.net/support.html

A special thanks to Christopher Paidhrin of ACS Healthcare Solutions for the special permission to post the document.

Labels: , ,

Bookmark and Share
posted by Dan Laninga at 0 Comments

My Zimbio
Top Stories Share/Save/Bookmark