Using Technology-Based Safeguards to Prevent Security Breaches
October 11, 2022
Reading time: 4 minutes
Securing patients’ electronic protected health information (ePHI) continues to be a top priority for healthcare practices of all sizes. The need for vigilance in data security is emphasized by reports suggesting that a complete health record can fetch between $250 and $1,000 on the darknet.
Ongoing cyberattacks attacks on healthcare systems only further illustrate the need for healthcare leaders and staff members to take proactive steps to prevent theft of patient information and other sensitive data.
As healthcare practices devise their security strategies, they will want to make sure their approaches are flexible and resilient to address threats that are likely to be constantly evolving and multi-pronged. 
The risk tips listed in this publication focus on technology-based strategies to prevent cyberattacks and protect patients’ ePHI. For more information about physical safeguards for preventing data breaches, see MedPro’s Risk Tips: Using Physical Safeguards to Prevent Security Breaches.
- Conduct a security risk assessment to determine potential areas of vulnerability and to identify system and process gaps that compromise the privacy and security of ePHI and other proprietary information. (Note: The HIPAA Security Rule requires covered entities and their business associates to conduct risk assessments.)
- Ensure that antivirus software and firewalls are properly installed on the practice’s computer network and are up to date. Contractual arrangements with technology and security vendors should specify the security results the practice hopes to achieve with its systems.
- Install password protection on all computers in the practice, and require users to establish strong passwords (i.e., passwords that have a minimum number of characters and require letters, numbers, and symbols) or passphrases.
- Determine under what circumstances and how often you want to require system users to change their passwords. Although periodically changing passwords has long been considered a best practice, some guidance suggests it doesn’t improve security and actually may compromise it. All policies should comply with state and federal regulations.
- Consider two-factor or multi-factor authentication technology for an added layer of protection at login. This method involves a password and at least one other identifying technique, such as an electronic identification card, key fob, or fingerprint recognition.
- Ensure that the practice’s computer operating systems, software applications, and network-connected devices are updated routinely and that security patches are installed when they become available.
- Implement controls that block malicious websites or consider even stricter limitations, such as allowing access only to websites that are known to be secure (a process known as “whitelisting” ).
- Restrict user permissions on systems to prevent employees from downloading and installing software. Permissions should align with the functionality and access employees need to perform their jobs.
- Review the practice’s email security settings and spam filters to ensure the system is blocking emails with suspicious attachments and/or links.
- Consider implementing software to restrict access to USB ports and removable devices, which can help prevent unauthorized copying of data and transfer of computer viruses.
- Use encryption technology to protect stored and transmitted data. Consider anti-theft technology that can remotely delete or disable information from a device in the event of loss or theft.
- Tailor employees’ access to computer systems and electronic health records based on their roles and responsibilities. Limit users who can log in to your network via a remote connection.
- Enable system timeouts and record locks to prevent unauthorized access to patient data. Set a limit on how many times users can attempt to log in to the network before they are locked out of their accounts.
- Back up system data to a separate server on a regular basis so it can be restored if an incident, such as a ransomware attack, occurs. Keep backup information in a secure, locked location – preferably offsite. (Note: Only public information should be sent via anonymous file transfer protocol.)
- Provide education on, and raise awareness of, the practice’s security policies and safeguards as well as best practices for cybersecurity and data protection. Conduct training during orientation and at least annually as part of in-service education. Develop written guidance to prevent loss and theft of patient information.
- Report any suspicious activity, possible security breaches, or thefts (e.g., suspicious computer activity and missing records) to the appropriate authorities and organizations (e.g., law enforcement, the Office for Civil Rights, your professional liability company, etc.).
- Have an incident response team in place, and conduct incident response drills to identify potential security and policy gaps. The team should periodically review the practice’s incident response plan and procedures for handling cyberattacks, privacy violations, and other situations (such as physical theft or loss of data) that can result in data breaches.
For more information about safeguarding systems and protecting patient information, see MedPro’s Risk Resources: Cybersecurity.
 Nadrag, P. (2021, January 26). Industry voices Ã¢â‚¬” forget credit card numbers. Medical records are the hottest items on the dark web. Fierce Healthcare. Retrieved from www.fiercehealthcare.com/hospitals/industry-voices-forget-credit-card-numbers-medical-records-are-hottest-items-dark-web
 American Hospital Association. (n.d.). Cybersecurity. Retrieved from www.aha.org/advocacy-issues/cybersecurity/cybersecurity.shtml
 The Office of the National Coordinator for Health Information Technology. (2018, December 19). Privacy, security, and HIPAA: Security risk assessment. Retrieved from www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment
 Relias Media. (2018, March 1). NIST provides guidance on HIPAA passwords. Retrieved from www.reliasmedia.com/articles/142282-nist-provides-guidance-on-hipaa-passwords; Cranor, L. (2016, March 2). Time to rethink mandatory password changes. Federal Trade Commission. Retrieved from www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes
Additional Risk content
Accurate and thorough documentation is the backbone of a sound approach to risk management; it provides essential patient information, historical…
The Benefits of a Personal Electronic Device Policy in Chiropractic Practices
More than ever, people are using personal electronic devices (PEDs) — such as laptops, smartphones, tablets, e-readers, and other ‘smart’…
Environmental Emergency Preparedness for Healthcare Practices
Environmental emergencies — such as tornadoes, hurricanes, floods, blizzards, fires, chemical spills, radiation exposure, etc. — can have short-term or…
This document should not be construed as medical or legal advice. Because the facts applicable to your situation may vary, or the laws applicable in your jurisdiction may differ, please contact your attorney or other professional advisors if you have any questions related to your legal or medical obligations or rights, state or federal laws, contract interpretation, or other legal questions.
MedPro Group is the marketing name used to refer to the insurance operations of The Medical Protective Company, Princeton Insurance Company, PLICO, Inc. and MedPro RRG Risk Retention Group. All insurance products are underwritten and administered by these and other Berkshire Hathaway affiliates, including National Fire & Marine Insurance Company. Product availability is based upon business and/or regulatory approval and/or may differ among companies.
© 2023 MedPro Group Inc. All rights reserved.