In 2013, 45% of data breaches were in the healthcare industry. Because of this, compliance and regulations in healthcare are expected to intensify throughout this calender year. This will not bode well for what healthcare privacy, information security, and compliance officers were wishing for this year.

In a recent survey performed by ID experts we were given some insight as to what security and compliance officers had on their wish lists for 2014, as well as some predictions for the year to come. The wish list sounds more like a needs list. The list is as follows:

  1. A larger budget
  2. More staff.
  3. More in-depth and frequent training.
  4. Increased help with audits.
  5. Software to better monitor the use of internet and viewed records.

A study done by the Ponemon Institute shows that a majority of healthcare organizations do not have the proper resources, budget, or policies in place to effectively minimize their risk of a data breach.

We are looking at a situation where healthcare security, privacy, and compliance officers are trying to keep up with perpetually changing regulations and compliances on a shoestring budget and with minimal staff resources. The items on the wish list are not likely to happen. As we have mentioned before healthcare information security is notorious for running on a slim budget, and there are no immediate signs that budgets will be increased. This will provide even more challenges in 2014.

This year will be even tougher on healthcare information security if ID experts predictions are correct. They are predicting:

  1. Demand for increased reporting, and government (state and federal) enforcement of privacy and security rules.
  2. More work, higher expectations, and no new staff.
  3. More intense audit processes.
  4. Change is in its infancy, 2015 will look totally different.
  5. More regulations, and not new ones. The old ones will be revised to the point that they will be increadibly difficult to follow. We will see many CEO’s and board members resigning because of the new accountability, compliance officers will be left to fend for themselves.

I think the last prediction is the most worrying. All of the decision making and consequences will likey rest on the shoulders of compliances officers. As if there wasn’t enough for them to worry about, now they face the brunt of the blame if there is any data exposure.

A good way to help battle compliance and spread out responsibility in certain sectors, is to use properly insured and compliant vendors. These vendors can mitigate your risk of a data breach, provide you with an all around complaint service, and provide full indemnification if there is an instance of data exposure. As an example, TechR2 has an ISO 27001 certified solution that includes data containment, auditing, and onsite destruction which meets all necessary compliance standards such as HIPAA, SOX, Gramm-Leach-Bliley, etc. To back that up we also have a comprehensive insurance policy that not only covers us in the event of a breach, but also provides indemnification to our clients.

[vc_row type=”grid” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

case studies

See More Case Studies

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Learn more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Learn more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Learn more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation