NEW INVESTMENT: Volition Capital leads $20M investment in Levanta  Read More

VOLITION NEWS: Sean Cantwell & Roger Hurwitz Named Top Software Investors of 2024  Read More

FOLLOW-ON INVESTMENT: Volition Capital Announces Meaningful Follow-On Investment in Creatio  Read More

VOLITION MEDIA: Why Hardware-Enabled SaaS is a Winning Formula  Read More

2 MIN READ

Sachin Nayyar, CEO of Securonix: 5 Critical Considerations for Patient Privacy in Telehealth

Sachin Nayyar, CEO of Securonix, recently penned a byline in HIT Consultant about the 5 critical considerations for patient privacy in telehealth.

Read the excerpt below:

The COVID-19 pandemic has had a tremendous ripple effect across all industries, with one of the most impacted being healthcare. Providers have had to quickly adapt to supporting patients ‘virtually’ in a secure manner, while simultaneously developing procedures to support accurate reporting to government organizations. These changes have placed added pressure on security and privacy professionals, as they struggle to keep up with urgent demand.

Mature healthcare organizations already have stringent policies and procedures in place to remain compliant with government regulatory requirements (i.e., HIPAA, HITECH Act, etc.) and protect patients’ privacy. However, with the new focus on telehealth, unprecedented patient growth, and strict regulations on reporting, the key threats healthcare security and privacy teams need to be able to detect are also evolving:

  • Unauthorized access to patient data by employees
  • Patient data snooping (by employees, family members, co-workers, etc.)
  • Compromised records (unusual access patters – new locations, multi-location access, etc.)
  • Failed logins and download spikes
  • Terminated or dormant user accounts being used to gain access
  • Accessing discharged patient records or deceased patient records

Identifying these threats and uncovering suspicious patterns or activities, however, is no easy feat. Most security monitoring solutions cannot integrate with and consume electronic medical records (EMR) in a usable format. As a result, these solutions have limited out of the box content, leaving a majority of threat detection engineering to the security operations teams, which are already overwhelmed. Legacy security tools are no longer cutting it, as they use rule-based security event monitoring methods that do not account for the need to protect patient data privacy required by regulations such as HIPAA, HITRUST, and GDPR. They also lack the ability to protect patient data from insider threats, advanced persistent threats, or targeted cyberattacks.

To learn about solutions to these problems and the 5 key considerations, read the full article here.

Sign up for our mailing list to get Volition Viewpoints in your inbox:

[hubspot type=form portal=7228887 id=7c89f4bd-066c-4200-bdd2-9f25db71380c]
ALL ARTICLES
BACK TO TOP

Consent(Required)
This field is for validation purposes and should be left unchanged.

Consent(Required)
This field is for validation purposes and should be left unchanged.

Consent(Required)
This field is for validation purposes and should be left unchanged.

Consent(Required)
This field is for validation purposes and should be left unchanged.