Advertisement

Protecting our Patient's Records A few weeks ago I posted an article about ‘Maintaining Customer Confidence in the Face of Cyber-Security Risks’. As I have been reading articles about 2015 healthcare trends, I realized that during the summer of 2014 that five million patients had their private information compromised in health system security breaches. For some reason, this doesn’t even shock me as much as it has in the past. Those who breach health information know that it is very valuable on the black market because it contains about everything you could possibly know about the patient.
Protecting our Patient's Records

Protecting our Patient's Records

A few weeks ago I posted an article about ‘Maintaining Customer Confidence in the Face of Cyber-Security Risks’. As I have been reading articles about 2015 healthcare trends, I realized that during the summer of 2014 that five million patients had their private information compromised in health system security breaches. For some reason, this doesn’t even shock me as much as it has in the past. Those who breach health information know that it is very valuable on the black market because it contains about everything you could possibly know about the patient.

Yet what is even more shocking is that it is not high on the list of health systems to protect patient’s records. Trying to protect the patient’s privacy versus patient convenience, the ability to do a one-click to assess their information, becomes the challenge in these debates. As data is shared to improve patient coordination and help doctors make real time decisions, patients will be the ones who will decide to ‘tell all’ to their physicians or other keepers of the gate and will ultimately decide their own fate - a choice between their wellness or their financial and medical information being compromised.

Healthcare organizations will have to balance privacy, security, and convenience better as information is shared in the ‘cloud’. Health systems will definitely need to hire more cyber-security personnel and develop technical strategies to prevent breaches. Again, to maintain customer confidence in our organizations, we need to coordinate and continually be proactive in protecting our patients from these malicious attacks.  If we don't, it will come back to haunt us!
Alan Baggett
Written by

iTech Dunya

iTech Dunya

iTech Dunya is a technology blog that specializes in guides, reviews, how-to's, and tips about a broad range of tech-related topics..

Post A Comment:

0 comments: