SlideShare a Scribd company logo
1 of 19
ENHANCING YOUR DATA SECURITY:
CLOSING THE GAP ON UNSECURED
COMMUNICATIONS
2
WHAT’S THE PROBLEM?
Healthcare one of top 4 most vulnerable industries to cyberattacks1
Patient data exposed for over a month due to
major Medicaid and Affordable Care Act insurer
breach
300K records breached in
ransomware attack on
Pennsylvania based
health care group
Virginia based health
system data breach
affects 650K patients
after vendor
inadvertently made
PHI accessible on line
U.S. healthcare
cyberattacks increased
63%
last year1
1 Source: The Merkle
2 Source: Becker's Hospital Review
3
SECURITY IS MORE IMPORTANT THAN EVER
39%
of healthcare
companies aren’t
prepared for a
cyberattack1
1/3 of hospital CIOs
estimate more than
20%
of data is shared via
unsecured methods2
“The sensitivity of health-related information and large number of data touch points”3
“46% admit employees were not following policies for securing devices”4
Healthcare is one of the most vulnerable industries. Why?
1Source: The Merkle
2Source: Spok 2017 CHIME Survey
3Source: Health IT Security
4Source: Healthcare IT News
4
KEEP YOUR SECURITY PLAN UPDATED
The time to secure patient data is now
Financial Compliance Reputation Patient Care Research
Benefits
5
WHAT YOU NEED
Educated people, tight processes, and the right technology
Process
6
Implement multiple layers of security tools to support policies
TECHNOLOGY
Monitoring
capabilities
Firewalls
Blacklist/
whitelist
mechanisms
Virtual private
networks (VPNs)
Secure text
messaging
Data encryption
Data loss
prevention (DLP)
solutions
7
TECHNOLOGY
Ensure your storage technology is secure
Protected health data should be stored on
secure servers or secure cloud environment
Access to data should be restricted
to authorized users
Storage vendors must adhere to the same
privacy and security rules
8
TECHNOLOGY
Address smartphone security with enterprise mobility management
Allow employees to use the
mobile devices they prefer
Use EMM solutions to
safeguard the unauthorized
transmission of ePHI
9
TECHNOLOGY
Tips and best practices
10
PROCESS
Tracking all devices
Patient information
should be restricted to
those who need it to
do their job
Even devices of those
with approved access
can pose a security
threat
11
PROCESS
Partner encrypted technology with the right processes
Understand where patient data is stored
and how it’s transmitted
Be aware of lost or stolen mobile devices
and overall network security
12
SENDING AND RECEIVING ePHI
Secure data while it’s in your possession
Secure data while it’s in transit
Ensure appropriate security measures
Document and analyze decisions and rationale
Periodically review and update security measures
13
PROCESS
Implement policies to support your data-protection strategy
Acceptable use policies
give employees solid
direction on
maintaining privacy
Human error or
negligence is one of
the greatest dangers to
the security of PHI
14
PROCESS
Develop an overall business continuity plan
Ability to constantly access medical
records can be a matter of life and death
Your plan should detail the people,
processes, and technologies necessary
to keep IT systems operational
15
PEOPLE
Train your end users
• Human error/negligence is
a major cause of breaches
• Include a strong employee
education component
16
PEOPLE
Addressing human error
Users should have unique,
authenticated identities to access PHI
Protocols should include auditing
functions that monitor proper use and
can trace the source of any breaches
17
SECURE TEXT MESSAGING
Access staff directory and on-call schedules
Security and encryption
Receive patient care alerts and test results
18
TAKEAWAYS
Protect your patients
1. Define your hospital’s strategy for managing sensitive data
2. Implement policies to support your data-protection strategy
3. Implement multiple layers of security tools to support policies
4. Train your end users
5. Develop an overall business continuity plan
19
LET’S GET IN TOUCH!
Learn more:
CASE STUDIES VIDEOS
We’d love to hear from you!
spok.com
getinfo@spok.com

More Related Content

What's hot

Healthcare2.0 Turning Hell care into healthcare
Healthcare2.0 Turning Hell care into healthcareHealthcare2.0 Turning Hell care into healthcare
Healthcare2.0 Turning Hell care into healthcareBetsy Bevilacqua
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa pptMari Mina
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)Josette Pribilla
 
Week 7 issues and challenges
Week 7 issues and challengesWeek 7 issues and challenges
Week 7 issues and challengesRoy Dahildahil
 
ELECTRONIC HEALTH RECORD SYSTEMS:
ELECTRONIC HEALTH RECORD SYSTEMS:ELECTRONIC HEALTH RECORD SYSTEMS:
ELECTRONIC HEALTH RECORD SYSTEMS:Mirasolmanginyog
 
Protecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthProtecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthTAOklahoma
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
Modern Healthcare Information Technology
Modern Healthcare Information TechnologyModern Healthcare Information Technology
Modern Healthcare Information TechnologyJeffrey Paulette
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack Medigate
 
Transforming Healthcare with Technology
Transforming Healthcare with TechnologyTransforming Healthcare with Technology
Transforming Healthcare with TechnologyFirat Atagun
 
HIPAA Compliance Dangers for Digital Doctors
HIPAA Compliance Dangers for Digital DoctorsHIPAA Compliance Dangers for Digital Doctors
HIPAA Compliance Dangers for Digital Doctorsrobertpracticefusion
 
Blockchain based searchable encryption for electronic health record
Blockchain based searchable encryption for electronic health recordBlockchain based searchable encryption for electronic health record
Blockchain based searchable encryption for electronic health recordAchanta ManiKrishna
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality12ort
 
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...Samsung Business USA
 
E-health appications
E-health appicationsE-health appications
E-health appicationsAnkita Kunwar
 
Presentation 2 - FHIR Overview
Presentation 2 - FHIR OverviewPresentation 2 - FHIR Overview
Presentation 2 - FHIR OverviewTom Wilson
 
Top 3 Changes in Technological Advances influencing Healthcare version 2
Top 3 Changes in Technological Advances influencing Healthcare version 2Top 3 Changes in Technological Advances influencing Healthcare version 2
Top 3 Changes in Technological Advances influencing Healthcare version 2Chris Dawson
 

What's hot (20)

Healthcare2.0 Turning Hell care into healthcare
Healthcare2.0 Turning Hell care into healthcareHealthcare2.0 Turning Hell care into healthcare
Healthcare2.0 Turning Hell care into healthcare
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
 
Week 7 issues and challenges
Week 7 issues and challengesWeek 7 issues and challenges
Week 7 issues and challenges
 
ELECTRONIC HEALTH RECORD SYSTEMS:
ELECTRONIC HEALTH RECORD SYSTEMS:ELECTRONIC HEALTH RECORD SYSTEMS:
ELECTRONIC HEALTH RECORD SYSTEMS:
 
Protecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthProtecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealth
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Modern Healthcare Information Technology
Modern Healthcare Information TechnologyModern Healthcare Information Technology
Modern Healthcare Information Technology
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
 
Transforming Healthcare with Technology
Transforming Healthcare with TechnologyTransforming Healthcare with Technology
Transforming Healthcare with Technology
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA Compliance Dangers for Digital Doctors
HIPAA Compliance Dangers for Digital DoctorsHIPAA Compliance Dangers for Digital Doctors
HIPAA Compliance Dangers for Digital Doctors
 
Blockchain based searchable encryption for electronic health record
Blockchain based searchable encryption for electronic health recordBlockchain based searchable encryption for electronic health record
Blockchain based searchable encryption for electronic health record
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
 
E-health appications
E-health appicationsE-health appications
E-health appications
 
Presentation 2 - FHIR Overview
Presentation 2 - FHIR OverviewPresentation 2 - FHIR Overview
Presentation 2 - FHIR Overview
 
Top 3 Changes in Technological Advances influencing Healthcare version 2
Top 3 Changes in Technological Advances influencing Healthcare version 2Top 3 Changes in Technological Advances influencing Healthcare version 2
Top 3 Changes in Technological Advances influencing Healthcare version 2
 

Similar to Enhancing Your Data Security: Closing the Gap on Unsecured Communications

Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Achieving Cloud-based Healthcare without Jeopardizing Data.pdf
Achieving Cloud-based Healthcare without Jeopardizing Data.pdfAchieving Cloud-based Healthcare without Jeopardizing Data.pdf
Achieving Cloud-based Healthcare without Jeopardizing Data.pdfTriyam Inc
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
Data security and Privacy in Clinical Research -Compliance and Best Practices...
Data security and Privacy in Clinical Research -Compliance and Best Practices...Data security and Privacy in Clinical Research -Compliance and Best Practices...
Data security and Privacy in Clinical Research -Compliance and Best Practices...ClinosolIndia
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSijsptm
 
Implications for risk management of digital health technologies
Implications for risk management of digital health technologiesImplications for risk management of digital health technologies
Implications for risk management of digital health technologiesDavid Lee Scher, MD
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Babithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabitha Devu
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 
telemedicineppt.pptx
telemedicineppt.pptxtelemedicineppt.pptx
telemedicineppt.pptxRiyaMathur18
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...Health 2Conf
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsESET North America
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsKristie Allison
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxMarket iT
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and SecurityPYA, P.C.
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical DevicesSecurityMetrics
 

Similar to Enhancing Your Data Security: Closing the Gap on Unsecured Communications (20)

Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Achieving Cloud-based Healthcare without Jeopardizing Data.pdf
Achieving Cloud-based Healthcare without Jeopardizing Data.pdfAchieving Cloud-based Healthcare without Jeopardizing Data.pdf
Achieving Cloud-based Healthcare without Jeopardizing Data.pdf
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
Data security and Privacy in Clinical Research -Compliance and Best Practices...
Data security and Privacy in Clinical Research -Compliance and Best Practices...Data security and Privacy in Clinical Research -Compliance and Best Practices...
Data security and Privacy in Clinical Research -Compliance and Best Practices...
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
 
Implications for risk management of digital health technologies
Implications for risk management of digital health technologiesImplications for risk management of digital health technologies
Implications for risk management of digital health technologies
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Babithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics Technology
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
telemedicineppt.pptx
telemedicineppt.pptxtelemedicineppt.pptx
telemedicineppt.pptx
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicaux
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical Devices
 

More from Spok

7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...
7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...
7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...Spok
 
5 Dangers of Not Having Call Recording in Your Contact Center
5 Dangers of Not Having Call Recording in Your Contact Center5 Dangers of Not Having Call Recording in Your Contact Center
5 Dangers of Not Having Call Recording in Your Contact CenterSpok
 
What We Learned at HIMSS18
What We Learned at HIMSS18What We Learned at HIMSS18
What We Learned at HIMSS18Spok
 
How to Give Your Nurses More Time at the Bedside
How to Give Your Nurses More Time at the BedsideHow to Give Your Nurses More Time at the Bedside
How to Give Your Nurses More Time at the BedsideSpok
 
5 Details to Include in Every Communication Project Plan to Maximize Success
5 Details to Include in Every Communication Project Plan to Maximize Success5 Details to Include in Every Communication Project Plan to Maximize Success
5 Details to Include in Every Communication Project Plan to Maximize SuccessSpok
 
Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?
Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?
Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?Spok
 
How to Bolster the Benefits of Your EHR by Improving Communications in Your H...
How to Bolster the Benefits of Your EHR by Improving Communications in Your H...How to Bolster the Benefits of Your EHR by Improving Communications in Your H...
How to Bolster the Benefits of Your EHR by Improving Communications in Your H...Spok
 
Improve the Patient Experience and HCAHPS Scores with Technology
Improve the Patient Experience and HCAHPS Scores with TechnologyImprove the Patient Experience and HCAHPS Scores with Technology
Improve the Patient Experience and HCAHPS Scores with TechnologySpok
 
10 Things You Should Know About BYOD
10 Things You Should Know About BYOD10 Things You Should Know About BYOD
10 Things You Should Know About BYODSpok
 
How Health IT Can Help Extinguish Physician and Nurse Burnout
How Health IT Can Help Extinguish Physician and Nurse BurnoutHow Health IT Can Help Extinguish Physician and Nurse Burnout
How Health IT Can Help Extinguish Physician and Nurse BurnoutSpok
 
5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success5 Myths About Mobile Communication Success
5 Myths About Mobile Communication SuccessSpok
 
Getting Right with The Joint Commission's Communication Goal
Getting Right with The Joint Commission's Communication GoalGetting Right with The Joint Commission's Communication Goal
Getting Right with The Joint Commission's Communication GoalSpok
 
Supporting Interoperability and Technology Migration at Your Hospital
Supporting Interoperability and Technology Migration at Your HospitalSupporting Interoperability and Technology Migration at Your Hospital
Supporting Interoperability and Technology Migration at Your HospitalSpok
 
Paging for Today's Hospital: Encrypted and Connected
Paging for Today's Hospital: Encrypted and Connected Paging for Today's Hospital: Encrypted and Connected
Paging for Today's Hospital: Encrypted and Connected Spok
 
Connecting Your Operator Console for Smarter Clinical Communications
Connecting Your Operator Console for Smarter Clinical CommunicationsConnecting Your Operator Console for Smarter Clinical Communications
Connecting Your Operator Console for Smarter Clinical CommunicationsSpok
 
The 2017 Hospital Guide to Secure Mobile Messaging Success
The 2017 Hospital Guide to Secure Mobile Messaging SuccessThe 2017 Hospital Guide to Secure Mobile Messaging Success
The 2017 Hospital Guide to Secure Mobile Messaging SuccessSpok
 
The State of Mobile Communications in Healthcare: Survey Results Part 2
The State of Mobile Communications in Healthcare: Survey Results Part 2The State of Mobile Communications in Healthcare: Survey Results Part 2
The State of Mobile Communications in Healthcare: Survey Results Part 2Spok
 
What We Learned at HIMSS17
What We Learned at HIMSS17What We Learned at HIMSS17
What We Learned at HIMSS17Spok
 

More from Spok (18)

7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...
7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...
7 Must-Ask Questions: What Healthcare Leaders Want You to Know About Business...
 
5 Dangers of Not Having Call Recording in Your Contact Center
5 Dangers of Not Having Call Recording in Your Contact Center5 Dangers of Not Having Call Recording in Your Contact Center
5 Dangers of Not Having Call Recording in Your Contact Center
 
What We Learned at HIMSS18
What We Learned at HIMSS18What We Learned at HIMSS18
What We Learned at HIMSS18
 
How to Give Your Nurses More Time at the Bedside
How to Give Your Nurses More Time at the BedsideHow to Give Your Nurses More Time at the Bedside
How to Give Your Nurses More Time at the Bedside
 
5 Details to Include in Every Communication Project Plan to Maximize Success
5 Details to Include in Every Communication Project Plan to Maximize Success5 Details to Include in Every Communication Project Plan to Maximize Success
5 Details to Include in Every Communication Project Plan to Maximize Success
 
Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?
Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?
Communicating During a Statewide Catastrophe - Is Your Hospital Prepared?
 
How to Bolster the Benefits of Your EHR by Improving Communications in Your H...
How to Bolster the Benefits of Your EHR by Improving Communications in Your H...How to Bolster the Benefits of Your EHR by Improving Communications in Your H...
How to Bolster the Benefits of Your EHR by Improving Communications in Your H...
 
Improve the Patient Experience and HCAHPS Scores with Technology
Improve the Patient Experience and HCAHPS Scores with TechnologyImprove the Patient Experience and HCAHPS Scores with Technology
Improve the Patient Experience and HCAHPS Scores with Technology
 
10 Things You Should Know About BYOD
10 Things You Should Know About BYOD10 Things You Should Know About BYOD
10 Things You Should Know About BYOD
 
How Health IT Can Help Extinguish Physician and Nurse Burnout
How Health IT Can Help Extinguish Physician and Nurse BurnoutHow Health IT Can Help Extinguish Physician and Nurse Burnout
How Health IT Can Help Extinguish Physician and Nurse Burnout
 
5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success
 
Getting Right with The Joint Commission's Communication Goal
Getting Right with The Joint Commission's Communication GoalGetting Right with The Joint Commission's Communication Goal
Getting Right with The Joint Commission's Communication Goal
 
Supporting Interoperability and Technology Migration at Your Hospital
Supporting Interoperability and Technology Migration at Your HospitalSupporting Interoperability and Technology Migration at Your Hospital
Supporting Interoperability and Technology Migration at Your Hospital
 
Paging for Today's Hospital: Encrypted and Connected
Paging for Today's Hospital: Encrypted and Connected Paging for Today's Hospital: Encrypted and Connected
Paging for Today's Hospital: Encrypted and Connected
 
Connecting Your Operator Console for Smarter Clinical Communications
Connecting Your Operator Console for Smarter Clinical CommunicationsConnecting Your Operator Console for Smarter Clinical Communications
Connecting Your Operator Console for Smarter Clinical Communications
 
The 2017 Hospital Guide to Secure Mobile Messaging Success
The 2017 Hospital Guide to Secure Mobile Messaging SuccessThe 2017 Hospital Guide to Secure Mobile Messaging Success
The 2017 Hospital Guide to Secure Mobile Messaging Success
 
The State of Mobile Communications in Healthcare: Survey Results Part 2
The State of Mobile Communications in Healthcare: Survey Results Part 2The State of Mobile Communications in Healthcare: Survey Results Part 2
The State of Mobile Communications in Healthcare: Survey Results Part 2
 
What We Learned at HIMSS17
What We Learned at HIMSS17What We Learned at HIMSS17
What We Learned at HIMSS17
 

Recently uploaded

Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunNiamh verma
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Call Girls Service Chandigarh Ayushi
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyush Gupta
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabadgragmanisha42
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★indiancallgirl4rent
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...gragteena
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...Gfnyt
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...Gfnyt.com
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknowgragteena
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhVip call girls In Chandigarh
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Niamh verma
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
 

Recently uploaded (20)

Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
 
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
 

Enhancing Your Data Security: Closing the Gap on Unsecured Communications

  • 1. ENHANCING YOUR DATA SECURITY: CLOSING THE GAP ON UNSECURED COMMUNICATIONS
  • 2. 2 WHAT’S THE PROBLEM? Healthcare one of top 4 most vulnerable industries to cyberattacks1 Patient data exposed for over a month due to major Medicaid and Affordable Care Act insurer breach 300K records breached in ransomware attack on Pennsylvania based health care group Virginia based health system data breach affects 650K patients after vendor inadvertently made PHI accessible on line U.S. healthcare cyberattacks increased 63% last year1 1 Source: The Merkle 2 Source: Becker's Hospital Review
  • 3. 3 SECURITY IS MORE IMPORTANT THAN EVER 39% of healthcare companies aren’t prepared for a cyberattack1 1/3 of hospital CIOs estimate more than 20% of data is shared via unsecured methods2 “The sensitivity of health-related information and large number of data touch points”3 “46% admit employees were not following policies for securing devices”4 Healthcare is one of the most vulnerable industries. Why? 1Source: The Merkle 2Source: Spok 2017 CHIME Survey 3Source: Health IT Security 4Source: Healthcare IT News
  • 4. 4 KEEP YOUR SECURITY PLAN UPDATED The time to secure patient data is now Financial Compliance Reputation Patient Care Research Benefits
  • 5. 5 WHAT YOU NEED Educated people, tight processes, and the right technology Process
  • 6. 6 Implement multiple layers of security tools to support policies TECHNOLOGY Monitoring capabilities Firewalls Blacklist/ whitelist mechanisms Virtual private networks (VPNs) Secure text messaging Data encryption Data loss prevention (DLP) solutions
  • 7. 7 TECHNOLOGY Ensure your storage technology is secure Protected health data should be stored on secure servers or secure cloud environment Access to data should be restricted to authorized users Storage vendors must adhere to the same privacy and security rules
  • 8. 8 TECHNOLOGY Address smartphone security with enterprise mobility management Allow employees to use the mobile devices they prefer Use EMM solutions to safeguard the unauthorized transmission of ePHI
  • 10. 10 PROCESS Tracking all devices Patient information should be restricted to those who need it to do their job Even devices of those with approved access can pose a security threat
  • 11. 11 PROCESS Partner encrypted technology with the right processes Understand where patient data is stored and how it’s transmitted Be aware of lost or stolen mobile devices and overall network security
  • 12. 12 SENDING AND RECEIVING ePHI Secure data while it’s in your possession Secure data while it’s in transit Ensure appropriate security measures Document and analyze decisions and rationale Periodically review and update security measures
  • 13. 13 PROCESS Implement policies to support your data-protection strategy Acceptable use policies give employees solid direction on maintaining privacy Human error or negligence is one of the greatest dangers to the security of PHI
  • 14. 14 PROCESS Develop an overall business continuity plan Ability to constantly access medical records can be a matter of life and death Your plan should detail the people, processes, and technologies necessary to keep IT systems operational
  • 15. 15 PEOPLE Train your end users • Human error/negligence is a major cause of breaches • Include a strong employee education component
  • 16. 16 PEOPLE Addressing human error Users should have unique, authenticated identities to access PHI Protocols should include auditing functions that monitor proper use and can trace the source of any breaches
  • 17. 17 SECURE TEXT MESSAGING Access staff directory and on-call schedules Security and encryption Receive patient care alerts and test results
  • 18. 18 TAKEAWAYS Protect your patients 1. Define your hospital’s strategy for managing sensitive data 2. Implement policies to support your data-protection strategy 3. Implement multiple layers of security tools to support policies 4. Train your end users 5. Develop an overall business continuity plan
  • 19. 19 LET’S GET IN TOUCH! Learn more: CASE STUDIES VIDEOS We’d love to hear from you! spok.com getinfo@spok.com