Security Business

FEB 2019

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: https://sdi.epubxp.com/i/1082145

Contents of this Issue

Navigation

Page 41 of 59

42 Security Business / www.SecurityInfoWatch.com / February 2019 Healthcare Security PIAM: The Key to Landing Healthcare Business? How physical identity and access management systems can solve the access control, visitor management and cybersecurity issues plaguing the healthcare market By Sheila Loy Integrators serving the healthcare industry must help institutions combat a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data. In addition, most doctors and hospitals now use electronic prescribing, which is vulnerable to theft and fraud. The American Medical Association reports that 8 in 10 doctors have experienced some type of cyberattack.; meanwhile, healthcare organizations are also struggling to comply with regulatory frameworks for security. Aberdeen reports that only 61 percent have successfully complied with regulatory frameworks pertaining to personal health information (PHI) and GDPR. The Department of Health and Human Services revealed in its second round of HIPAA desk audits in Sept. 2017 that 94 percent of healthcare organizations had inadequate risk management plans, 89 percent were rated as inadequate on patients’ rights to access their PHI, and 83 percent had performed inadequate risk analyses. Clearly, patient safety and data privacy come first, but at the same time, administrators are under intense cost pressures that can only be alleviated by improving operational security and the efficiency of clinical workflows. Integrators can help healthcare organizations solve these challenges, and trusted identity solutions should be one of the tools. They enable an end-to-end approach to identity that spans multi-factor authentication, credential management, digital certificates and physical identity and access management (PIAM). Today’s solutions strengthen security while making it easier to comply with regulatory mandates aimed at protecting patient information and the integrity of healthcare delivery in a digital world. They also facilitate a more connected and efficient hospital in the Internet of Trusted Things (IoTT), and open the door to using big data and machine learning in ways that will fundamentally change how healthcare institutions operate, manage risk and deliver care. The Compliance Challenge/Opportunity Trusted identities streamline regulatory compliance in two key ways. First, they enable physicians to complete an authentication process in compliance with the HIPAA Security Rule aimed at protecting patient health information. Additionally, they are used to comply with the U.S. Drug Enforce- Users want to do far more with their trusted identity credentials than just open doors, especially when they also must access healthcare records, EPCS systems and other hospital systems many times a day.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - FEB 2019