Patient data security: 4 ways to protect your organization from a data breach

It's a treasure trove of personal data. The proverbial pot of data gold.

For every patient who walks in, a hospital collects the following information, at minimum: name, phone number, address, SSN, date of birth, occupation, and insurance information. It is all maintained meticulously and kept up to date. And it makes hackers salivate.

Healthcare is the new cyber fraud frontier, and the personal patient data that hospitals have readily available is more lucrative, more comprehensive, and more attractive than retail and banking data ever was. This is why fraud perpetrators spent months assaulting Anthem/BlueCross BlueShield, stealing more than 90 million records, continuously, over the course of four to six months. It was a hacker's dream, and a healthcare organization's worst nightmare.

Hospitals work tirelessly to ensure patient privacy in the physical world, but privacy threats are increasingly leaving patients standing in the cold without a hospital gown in the digital domain. Cyber fraud attacks on patient privacy leave healthcare organizations vulnerable. Unfortunately, it's not a question of if a data breach will happen, but when a data breach will happen.

What can you do to prepare? Here are four ways to protect your healthcare organization from a data breach.

1. Have greater insight into what's really happening.

Know what your users are doing. Oftentimes, fraud is committed by people authorized to be in your system. While log files may give you a glimpse into an action taken, they will never provide you with a holistic view of user behavior. For example, when a healthcare worker looks at a VIP patient, a log file may track that they viewed the VIP patient file, but it will not be able to provide any context around whether the worker searched under the VIP's alias (indicating they may have been reviewing case files to determine treatment) or if they searched for a VIP's real name (an indicator that the worker was not providing care to that individual, and may have been breaching security). The ability to see everything they did before and after can provide both clarity and context to help you determine whether behaviors are normal or nefarious.

Get a tool that gives you complete visibility into what users are doing by having screen-by-screen replay and full accountability of all activity. Your investigators will have greater insight and confidence into explaining what happened and why – and, the analytics engine will have more valuable data points to find suspicious behavior.

2. Get real-time alerts for suspicious behavior.

Have the right tools in place to monitor in real-time. Become truly proactive by being told something is happening rather than waiting to look. Waiting 24-48 hours to know about a patient privacy violations is too long. A lot of damage can be done in that period of time, and not getting notified in real-time of potential fraud is the difference between proactively protecting your patient data and being permanently stuck in a reactionary posture.

3. Understand your users through behavioral profiling and analytics.

Know the person; know the persona... by profiling the employees against their previous activity and against their peers. The best way to detect a risk is to recognize a change or difference in patterns. Whether someone internally has decided to invade patient privacy, or if your system is being hacked; behavior profiling and analytics allow you to immediately pinpoint anomalies that can raise a flag to suspicious behavior.

Allow me to introduce you to my imaginary acquaintance Jack. Jack signs in every day to your system from 9:15 am when he gets a coffee and sits down at his desk, until about 6pm. Jack normally only works late during end of quarter closing periods. If you know this about Jack, you may think it strange that Jack is signing in every night from a different IP address, always after midnight, and often looking at employee records that have nothing to do with his end of quarter closing activities.

Without user profiling and analytics, coupled with real-time alerts, you may or may not find out about Jack's extracurricular activities until days, weeks or even months from the time of the incident. And imagine if it wasn't Jack at all – what if hackers just took over Jack's credentials looking for 90 million records. It took Anthem over four months to detect the account takeover that led to this exact scenario. And, it was only discovered by luck after the user became suspicious to a login notification. And, it was possible because there was no insight, into the change of behavior or frequency, to detect the takeover.

4. Empower your investigators.

Arm your investigators with the tools needed to keep you and your organization safe from data security threats. Create policies, workflows and case management that will enable investigators to handle all cases and complaints brought forth, and ensure that you are in compliance with regulatory requirements.

When determining what tools are right for your organization, ask yourself the questions: how can our organization help investigators be more effective and efficient at finding what they need?

Bring a magnet if you want to find the needle in the haystack. Investing in monitoring technology that will capture and analyze user activity across networks and applications, and allow you to find what you are looking for no matter where it comes from or how it got there is critical. Being able to do so with a Google-like search and flexible dynamic reports that allow you to leverage your data, will empower you. Envision the task of finding all the places that a social security number has traveled through your network between systems and/or users and then imagine being able to search for that trail.

When aiming to protect your organization from cyber fraud, including threats from trusted and authorized employees, cast a net wider than simply trying to prevent a breach: protecting your organization means securing your data, monitoring and analyzing your user behavior and safeguarding your organization from the legal implications of any suspicious behavior (attempted or realized).

Andrew Leon is a Senior Implementation Engineer with Bottomline Technologies. Mr. Leon is a Cyber Fraud and Security expert with over 15 years of experience in business development, product management, and technical application, product, R&D, and engineering. He has spent the last 10 years focusing on various aspects of Cyber Fraud and Security, with a specialization in client delivery and customer engagement over the course of the last 5 years. Mr. Leon is regularly on client-site, helping customers identify their security needs and finding innovative ways to help them meet their cyber fraud and security goals.

The views, opinions and positions expressed within these guest posts are those of the author alone and do not represent those of Becker's Hospital Review/Becker's Healthcare. The accuracy, completeness and validity of any statements made within this article are not guaranteed. We accept no liability for any errors, omissions or representations. The copyright of this content belongs to the author and any liability with regards to infringement of intellectual property rights remains with them.

Copyright © 2024 Becker's Healthcare. All Rights Reserved. Privacy Policy. Cookie Policy. Linking and Reprinting Policy.

 

Featured Whitepapers

Featured Webinars

>