Join Us
test
February 25th, 2020

PROTECTING ELECTRONIC HEALTH RECORDS (EHR)

Posted by:

Information security in Healthcare has been problematic in the healthcare industry. Procedures and specialized frameworks have advanced throughout the years with the goal to improve security parameters, strategies, and data administration exercises to ensure data integrity. Throughout the years, social insurance suppliers have embraced the utilization of innovation to oversee persistent data electronically (EHR). With this method, clinical processes and patient treatment has improved tremendously (2). In spite of the developments, healthcare practices have options to profit through utilizing innovation for EHR, and it has also created vulnerabilities and dangers as well.

In 2015, the healthcare industry became a primary target for cyber-attacks. Healthcare agencies in the United States mentioned there was a loss of 363 million dollars in 2015. Healthcare practices face challenges regularly due to the cost of health information which motivates cybercriminals. Healthcare data consist of a patient’s name, date of birth, social security ID, insurance information, and historical medical records (3). Therefore, the delicacy in countermeasures for electronic health information has endorsed healthcare vendors to make investments in infrastructures for healthcare systems. Despite the efforts to mitigate threats, demanding situations nevertheless exist while the usage of cloud computing and cell gadgets are a concern (5).

The integration of technology in the healthcare enterprise has created methods of efficiency within the technique of handling EHR. However, the implementation of cloud computing and cellular gadgets has created new vulnerabilities in records protection (5). Clinical devices and healthcare structures that are unprotected cause vulnerabilities inside the safety of the records for HER (4). Additionally, it also includes transitions and transactions of information on stand-alone and networked devices. With the development of information security techniques, imposing and enforcing protocols might expand validation and set up standardized security policies. These rules help mitigate risks within corporations. For example, procedures and documentation that define the roles and responsibilities within the healthcare department sets standardization for the separation of duties and employee accountability.

References

1. Cocchi, R., (2016). Top 10 issues impacting healthcare industry in 2016. Retrieved from https://www.healthcarebusinesstech.com/issues-impacting-hospitals-2016/
2. Hoover, R. (2016). Benefits of using an electronic health record. Nursing2017, 46(7), 21-22.
3. Murphy, C. J. (2017). Healthcare industry held hostage: Cyberattacks and the effect on healthcare critical infrastructure Retrieved from https://search.proquest.com/docview/1897586642?accountid=27965
4. Newman, L. H. (2017, March 02). Medical Devices Are the Next Security Nightmare. Retrieved from https://www.wired.com/2017/03/medical-devices-next-security-nightmare/
5. Ocrutt, M. (2014, September 2). Hackers Are Homing In on Hospitals. Retrieved from MIT Technology Review: https://www.technologyreview.com/s/530411/hackers-are-homing- in-on-hospitals/


Leave a Reply

Your email address will not be published. Required fields are marked *

GET THE APP

img-social
img-social