Risk
3/8/2012
11:25 AM
Connect Directly
RSS
E-Mail
50%
50%

Healthcare Security Pros Must Speak More Like CFOs

Financial Impact of Breached Protected Health Information report helps health IT pros make the business case for patient data protection.

As the number of healthcare data breaches continues to snowball, executives put in charge of safeguarding protected health information (PHI) can't keep up with the risks inherent with increased deployment of electronic health records (EHRs) without enough financial backing to get the job done. And the only way that these PHI protectors can squeeze that juice from the C-suite is if they make themselves fluent in the language of financial justification, say authors of a new report on healthcare IT security.

A collaboration between the American National Standards Institute (ANSI), via its Identity Theft Prevention and Identity Management Standards Panel (IDSP), in partnership with the Santa Fe Group/Shared Assessments Program Healthcare Working Group, and the Internet Security Alliance (ISA), the free report, The Financial Impact of Breached Protected Health Information, took input from 100 healthcare leaders from 70 organizations. It was the culmination of a yearlong initiative called the PHI Project.

According to Rick Kam, president and co-founder of ID Experts and chair of the PHI Project, the team hopes to establish the document as the go-to resource for security and privacy officers taking a disciplined approach to assessing and mitigating risk of healthcare data breaches. He says that the state of the industry is such that those in charge of securing PHI are crying out for guidance.

"Because of the move toward electronic health records and the number of stakeholders that are now involved in handling our sensitive patient information, the PHI protectors are literally being outpaced in terms of their ability to protect our information," Kam says. "The magnitude and the frequency of healthcare breaches has increased rapidly because of the number of stakeholders and the move to electronic health records. These individuals need help."

One of the biggest ways they need help is in simply how to package PHI security issues in a way that makes sense to CEOs and CFOs. He and his co-authors found that these healthcare security initiatives are drastically underfunded and one of the main reasons is no one knows how to make a case for the cash.

"They basically put the CFO and the CEO to sleep because they're talking compliance, talking costs, and talking about things that are not that interesting to these executives," he said. "What we realized is we have to arm that chief privacy officer with the same tools and business case that speaks in investment language to help them enhance their business cases for things that would enhance privacy and security of protected health information."

Read the rest of this article on Dark Reading.

Healthcare providers must collect all sorts of performance data to meet emerging standards. The new Pay For Performance issue of InformationWeek Healthcare delves into the huge task ahead. Also in this issue: Why personal health records have flopped. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio