The Select Health Network, an Indiana physician group, has notified 3,582 of their patients that their data may have been breached. They discovered that one of their employee’s email accounts was accessed by an unauthorized third party, potentially exposing thousands of patients’ personal records.
The data in question includes names, addresses, dates of birth, member identification numbers, treating/referring physicians, health insurance information, medical history information, treatment information, treatment cost information, health insurance policy numbers, medical record numbers, and a limited number of Social Security numbers.
It’s never been more important to verify your cybersecurity measures. Every single day there’s news about another organization that’s been breached.
If you want to protect your patients’ data, consider the following key cybersecurity tips:
1. Update Software Continuously.
You can’t afford to ignore software update notifications – but depending on your workload, you may have to. That’s where an IT company and managed services can help.
Software updates are not only to improve the functionality of the software; they also serve as a patch for recently identified vulnerabilities that can be exploited by hackers. Your IT company can handle the management of these updates to make sure that not a single one is ever skipped or delayed.
2. Monitor Your Systems.
Also known as host-intrusion protection (HIP), this type of monitoring software will detect and report specially-developed malware that would otherwise make it past conventional antivirus and antimalware software. Your IT company will be able to deploy a monitoring solution to keep an eye on your systems.
3. Double Check Before You Click
No matter who the email is from or what it’s about, always exercise caution when it comes to clicking on a link or downloading an attachment:
4. Ask For Help
Where To Start is available to help assess and correct your current cybersecurity. Our team will determine where you vulnerabilities are, and match them with the security solutions and best practices to make sure your patient data is kept safe.
Like this article? Check out the following blogs to learn more: