• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

  • Opinion
  • Health IT
    • Behavioral Health
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Patient Engagement
    • Population Health Management
    • Revenue Cycle Management
    • Social Determinants of Health
  • Digital Health
    • AI
    • Blockchain
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • M&A
  • Value-based Care
    • Accountable Care (ACOs)
    • Medicare Advantage
  • Life Sciences
  • Research

Are EHR Vendors Hackers’ Next Big Target?

by Our Thought Leaders 04/11/2016 Leave a Comment

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

security

Editor’s Note: Mark Menke is the Chief Technology Officer of Network DLP at Digital Guardian, a data protection firm. Mark has over 20 years of experience in various roles from ASIC Design to IT and Security Consulting roles. 

Over the course of 2015, countless data breaches occurred within hospital networks, health insurers, physicians’ offices, and other organizations in the healthcare industry. In fact, Community Health Systems, Premera and Anthem were just a few of the most notable names who made cybersecurity headlines last year. More than 94 million records were exposed as the result of attacks varying in sophistication, which ranged from standard, employee-targeted breaches, to more complex methods carried out by scheming hackers.

It’s widely agreed upon that hackers target industries that hold valuable, sensitive and extremely personal data. It follows, then, that the healthcare industry is one of those targeted sectors, and has been for quite some time, due to its treasure trove of private information including mailing addresses, family histories, medical conditions, social security numbers and much more.

But with attacks increasing in both size and complexity, it’s time to more closely examine the healthcare industry, in particular electronic health record (EHR) providers.

A Recent EHR Scare

Last June, Medical Informatics Engineering informed customers that it suffered a cyber-attack that resulted in the theft of data. The medical firm is the creator of NoMoreClipboard, a web-based EHR platform that enables physicians’ offices to manage patient information via a web-based portal.

Hackers made off with stolen information including patients’ names, mailing addresses, email addresses and dates of birth. For some unstated number of patients, Social Security Numbers, lab results and dictated reports were also stolen.

As healthcare firms continue to “go virtual” by partnering with EHR vendors, they must prepare themselves for the potential security risks, especially following the case of Medical Informatics Engineering. If they don’t, 2016 may very well be the year when EHR vendors become hackers’ next major target.

Why Target EHR?

Hackers are moving upstream: from hospital networks and insurers who represent patients in designated geographic areas, to now, EHR providers with international customers. With web-based EHR systems, hackers can easily access data from hundreds or thousands of health networks in a singular attack. It’s also likely that web-based EHR systems, like other similar applications, suffer from many common vulnerabilities that might give attackers access to backend systems and data – from SQL injections to cross site scripting.

To further complicate the risk, the Affordable Care Act has created significant incentives for doctor’s offices to embrace EHR systems, as these technology systems are known to replace inefficient, paper-based medical records systems. Web-based EHR platforms allow physicians to reap the benefits of these efficient tools without requiring an investment in hardware, software or IT staff to manage them. While this is a big plus for the healthcare industry, where margins are small, it is also a serious drawback for cybersecurity.

In addition, it’s important to keep in mind that cybercriminals are targeting hospitals for monetary profit. Compared to stolen credit card numbers, PHI is far more valuable to an attacker. If you have a credit card stolen you can freeze the account and have a new one issued with a different account number, which limits the shelf life and value of stolen credit cards. Medical insurance numbers and social security numbers are not replaceable and are much longer lived, making them much more valuable to a cybercriminal as they have a longer time to sell and contribute more to fraud or identity theft crime.

To remain secure, healthcare organizations using EHR platforms should consider implementing the following precautions while using web-based portals to ensure that their practice is protected:

1. Understand the Imminent Risk

It shouldn’t come as a surprise that awareness is the first step in this process. Both EHR providers and the healthcare organizations who use their services should understand the value of the data they hold, and that hackers are after it. They must also realize that with a rise in sophistication from attackers, EHR application servers are now firmly in the crosshairs of the most malicious actors. Take time to educate the entire organization on the risks, from the C-suite down to the receptionist. In addition to regular training sessions, plan to conduct regular EHR risk assessments to ensure the level of risk is kept at a minimum.

2. Recognize and Label the Valuable Data

It’s an unfortunate reality that often, healthcare firms, and the EHR providers they work with, don’t know where the most valuable data is stored and who has access to it. All parties involved must learn what the sensitive data is if they want to prevent it from being stolen.

Identifying the crown jewels can sound like an intimidating, time-consuming task, but it doesn’t have to be. Begin with your most sensitive data — the information you know a hacker is after. This can be in the form of financial and personal data, but could also include lab tests, x-rays, and other medical-based information. Identify those crown jewels before moving to the next organizational function.

Once critical data is identified, label it. Mark all sensitive assets as “internal only” or “confidential.” This is the quickest and easiest protection method, regardless of whether the document is digital or paper-based. Employees then have a visual cue to treat the document with care, which is important because internal staff are almost always targeted by hackers.

3. Utilize Technology  to Protect the Labeled Data

To ensure your sensitive data stays safe, choose and implement one of the various technologies that are available. From encryption to digital rights management, persistent document tagging to policy-driven data protection, there are several approaches to ensure data flows freely, but only on a need-to-know basis through proper technologies.

4. Prepare for a Possible Breach

Even with preventative measures in place, a data breach can still occur, so it’s critical to be prepared with an incident response plan. Immediately following a breach, healthcare professionals should identify the information compromised, isolate the data and decide how to inform the patients impacted by the event. The next priority should be to alter the method to avoid future data breaches, including thoroughly testing the EHR system.

 

As healthcare organizations continue to digitize their critical data and work with EHR vendors to transfer this information efficiently, cybersecurity must remain top of mind. Taking steps to classify and protect the data is important to minimize risk as well as prevent an attack.  Because healthcare firms store such a valuable wealth of information, it is all the more important to prioritize the data’s vulnerable center – EHR platforms.

Featured image credit: jakerust via cc

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Tagged With: cyber security, Digital Guardian, healthcare security breaches, Security Data Breach

Tap Native

Get in-depth healthcare technology analysis and commentary delivered straight to your email weekly

Reader Interactions

Primary Sidebar

Subscribe to HIT Consultant

Latest insightful articles delivered straight to your inbox weekly.

Submit a Tip or Pitch

Featured Insights

2025 EMR Software Pricing Guide

2025 EMR Software Pricing Guide

Featured Interview

Kinetik CEO Sufian Chowdhury on Fighting NEMT Fraud & Waste

Most-Read

2019 MedTech Breakthrough Award Category Winners Announced

MedTech Breakthrough Announces 2025 MedTech Breakthrough Award Winners

WeightWatchers Files for Bankruptcy to Eliminate $1.15B in Debt

WeightWatchers Files for Bankruptcy to Eliminate $1.15B in Debt

KLAS: Epic Dominates 2024 EHR Market Share Amid Focus on Vendor Partnership; Oracle Health Sees Losses Despite Tech Advances

KLAS: Epic Dominates 2024 EHR Market Share Amid Focus on Vendor Partnership; Oracle Health Sees Losses Despite Tech Advances

'Cranky Index' Reveals EHR Alert Frustration Peaks Midweek, Highest Among Admin Staff

‘Cranky Index’ Reveals EHR Alert Frustration Peaks Midweek, Highest Among Admin Staff

Madison Dearborn Partners to Acquire Significant Stake in NextGen Healthcare

Madison Dearborn Partners to Acquire Significant Stake in NextGen Healthcare

Wandercraft Begins Clinical Trials for Physical AI-Powered Personal Exoskeleton

Wandercraft Begins Clinical Trials for Physical AI-Powered Personal Exoskeleton

Chipiron Secures $17M to Transform MRI Access with Portable Scanner

Chipiron Secures $17M to Transform MRI Access with Portable Scanner

Abbott to Integrate FreeStyle Libre Glucose Data with Epic EHR

Abbott to Integrate FreeStyle Libre Glucose Data with Epic EHR

5 Ways New Trump Administration Tariffs Are Impacting U.S. Healthcare Now

5 Ways Trump Administration Tariffs Are Impacting U.S. Healthcare Now

iCAD, GE HealthCare Integrate to Advance Breast Cancer Detection with AI

RadNet to Acquire iCAD for $103M in All-Stock Transaction

Secondary Sidebar

Footer

Company

  • About Us
  • Advertise with Us
  • Reprints and Permissions
  • Submit An Op-Ed
  • Contact
  • Subscribe

Editorial Coverage

  • Opinion
  • Health IT
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Population Health Management
    • Revenue Cycle Management
  • Digital Health
    • Artificial Intelligence
    • Blockchain Tech
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • Value-Based Care
    • Accountable Care
    • Medicare Advantage

Connect

Subscribe to HIT Consultant Media

Latest insightful articles delivered straight to your inbox weekly

Copyright © 2025. HIT Consultant Media. All Rights Reserved. Privacy Policy |