Your approach and its data are the targets of cybercriminals. Studies have shown that patient health information (PHI) may be worth 10 to 20 times higher than a credit card number on the black market.
Without a proper combination of security protections, your approach is risky:
Economic penalties: Violations of HIPAA regulations may result in hundreds to tens of thousands of dollars in penalties.
Patient Loss: In the August 2013 Harris Interactive survey, if their personal information was stolen by the current dentist, 40% of them would look for a new dentist. 2
Multiple security solutions
The combination of integrated security solutions provides strong protection for your practice. The following is a list of recommended security solutions that you should use.
#1 Keep your hardware and operating system up-to-date. Old or outdated hardware and operating systems expose your data to cyber attacks. Last year, Microsoft stopped supporting Windows XP and stopped supporting Windows Server 2003 later this year. Network attackers who find new vulnerabilities in these operating systems can exploit these vulnerabilities.
If you are still running Windows XP or Windows Server 2003, it is
#2 Enable data backup. Make sure your data backup solution can encrypt data, store data locally and offsite, recover data and perform routine tests to make sure everything is working. Using regular data backup can protect critical business applications in the following ways
Minimize Downtime: Allows you to quickly restore productivity in the event of a problem.
Create more efficient exercises: Use smart incremental backups to save time and hard disk space.
Prevent Data Loss: Perform partial data recovery (PDR) or disaster data recovery (DDR) after a disaster.
#3 uses data encryption. One way to prevent data leakage is to use full disk encryption if access is restricted unless you have an encryption key. The article “Multilayer Security: Best Defense” published in the Dentrix magazine in the winter of 2014 provides detailed information on the types of encryption that should be used.
#4 Firewall, antivirus and remote system monitoring. The following solutions should also be part of your protected practices:
Internet Firewall Security: Provides secure access to practice networks and data from the Internet. An effective firewall can block malicious web software and filter inappropriate or offensive web content.
Anti-virus software: Provide real-time, continuous protection for all your computers.
Remote System Monitoring: Detect and report on hardware and software status, performance issues, and vulnerabilities that may affect your practice.
Seek advice on how to protect your practice
If you are not sure how to protect your practice, consult an expert. The Henry Schein TechCentral can perform safety assessments to determine areas that can be strengthened in your practice. Later this year, Henry Schein TechCentral will release a new cloud backup solution and data encryption for the new server. Please trust a technical expert to help evaluate your practice and recommend the right equipment to meet your needs.