Healthcare finance tips for safeguarding against cyberattacks

cyber-attack caption

Premera hack puts renewed focus on securing sensitive healthcare info.

As Tuesday’s news about the Premera Blue Cross hack shows, healthcare organizations are vulnerable to cyberattacks, and the fix can be costly.

“The average Fortune 500 company budgets $44 million a year for security, including networking and all other aspects,” said Larry Ponemon, chairman of the Ponemon Institute, a research center focused on data security. “(Most) hospitals have less than a million to budget on cyber security.”

Already, at least two class action lawsuits have been brought against insurer Anthem, which saw a major data breach in January affect 80 million people. There’s also the cost to the health plan’s reputation and the logistics of notifying 80 million customers, Ponemon said. It’s still unknown what will come after 11 million people’s information was accesed in the Premera hack.

Until Anthem’s hack in January, high profile security breaches focused on large retailers such as Target and Home Depot.

This doesn’t mean healthcare organizations have been sitting on their hands believing it can’t happen to them, Ponemon said. A  survey of 91 healthcare organizations in 2013 showed that 90 percent experienced at least one data breach that year.

“Even if a hospital is reasonably secure, if may not be enough in this world,” he said.

Medical records are extremely valuable on the black market,  Ponemon said. They contain Social Security numbers, health ID numbers, addresses and possibly credit or debit card information – everything needed to create a fake identity.

“Basically it’s a rich data source for bad guys,” he said, such as terrorists seeking travel credentials.

The hackers may wait months and years before exploiting the data, he said.

“This is where we see the most serious ID theft crimes,” he said. “A lot of the 80 million will become identity theft victims.”

Ponemon was in the intelligence field for 45 years prior to founding the Ponemon Institute 14 years ago.

HITRUST, the Health Information Trust Alliance, works with healthcare organizations to improve their data security. It has partnered with the U.S. Department of Health and Human Services to conduct monthly briefings on cyber threats relevant to the healthcare industry, and to share best practices for defense and response.

HITRUST offers healthcare organizations a cyber threat alerting system of threats targeted at the industry. The C3 Alert is coordinated with the Healthcare and Public Health Sector and Government Coordinating Councils, according to HITRUST chief executive and founder Daniel Nutkis.

What hospitals can do:

  • As most security breaches are due to human error, maintain a good data structure to prevent data leakage, Ponemon said.
  • Encrypt data. The Wall Street Journal reported Anthem did not encrypt the personal data of its customers.
  • Ban the use of personal devices for storing patient information. Some doctors routinely send clinical records through personal e-mail, their own smartphones or tablets.
  • Rent a network intelligence system instead of buying one, Ponemon advises. It’s secure.
  • Collaborate with partners on exchanging information during and after a cyberattack, according to the National Institute of Standards and Technology’s 2014 “Draft Guide to Cyber Threat Information Sharing.” While this may seem counter-intuitive, providers need to  learn the types of systems and information being targeted and the techniques used to gain access.
  • Use standard data formats to facilitate interoperability and fast information exchanges, the NIST recommends.

SurveilStar is an ultimate employee monitoring software and parental control software which can help monitor computer activities and protect data security. You can also block files uploading and sharing to prevent data leakage. Including:

computer monitoring

  • View Real-time Screen Snapshot
  • Monitor Skype or Other Chat/IM Activity
  • Record Emails
  • Track web browsing history
  • Block access to any website
  • Remote PC Maintenance
  • Program Activity

 

If you would like to record and control all your children or employees’ activities on working PC, SurveilStar Monitoring would be your best choice.

A 30-day free trial version of this professional computer monitoring and tracking software is available. Feel free to download and try to check what your employees and children have done on PC.

Download

 

Reference: http://www.healthcarefinancenews.com/

Best Employee Monitoring Software

Overview

Employee monitoring software has multiple advantages. Businesses can experience huge financial losses when workers play online games, access social networking sites or even view online pornography.

Innovations in technology make it possible for an employer to monitor all of their staff’s computer and online activities. Today, managers can remotely monitor employees in real time as they perform job-related tasks. PC Monitoring also makes it possible to catch and document those workers who abuse company resources by leaking confidential company information via email or using instant messaging applications to threaten and harass others.

Designed to keep management informed, employee surveillance applications can also increase worker productivity while decreasing incidences of inappropriate employee behaviors. Cleary, surveillance apps and their logging and documentation capabilities can serve as a vital forensics tool when allegations of employee sexual harassment, coworker hostilities and other problems surface.

In the review, you will find objective side-by-side comparisons and reviews of the top employee monitoring software solutions available. We will provide details about what components to look for when selecting software.

What to Look For

Below are the criteria that we used to evaluate employee monitoring software solutions.

Online Monitoring

Monitoring an employee’s online activities is of vital importance to employers who are concerned about employee productivity and seek to provide their workers with an environment that is free of objectionable materials and threatening behaviors.

Elements to consider in this area include the logging of accessed websites and online searches. The app should have the ability to detect when a staff member accesses a social networking website like MySpace, Twitter or Facebook or even views online pornography.

Some PC monitoring apps can record usernames and passwords, log blog posts and identify those employees who waste time by shopping or playing games online. Recording chat and instant messaging transcripts is another sought-after element.

PC Tracking & Management

Computer tracking features to look for include the recording of launched applications as well as the duration and frequency of use. These features are useful to track how much time an employee wastes watching videos, playing games or engaging in other nonproductive activities.

Other elements to evaluate include display screenshots of the employee’s desktop, document tracking, remote computer administration and scheduled PC access.

Filtering & Blocking

Make sure the software you select has some type of filtering and blocking features if you desire to prevent your employees from executing specific applications or accessing websites that contain objectionable content.

Some PC monitoring apps can filter content by keywords, phrases and categories. The blocking of chat and instant message software by name, application type or even username could be another desired component.

Additional elements could include the filtering or blocking of online games, dating, social networking and social media websites.

Reporting Methods

Employee monitoring software can record enormous amounts of data. A poorly designed report console can render even the most robust applications useless. The reporting interface should be intuitive to navigate. It is common to have easy-to-use built-in reports as well as the ability to perform searches by date, time, launched applications, internet activity and other parameters.

SurveilStar Employee Monitoring Software

SurveilStar is strong and comprehensive PC monitoring software that can prevent users from viewing pornography or engaging in online gambling.

Online Monitoring:

The monitoring software’s website recording component logs all of a user’s website activities. The PC monitoring software creates a list of visited URLs, the frequency, hour and duration of each visit. These features are useful in preventing a user from accessing online pornography, gambling, fetish, social networking and gaming websites.

The monitoring software’s Alert system can assist employers in protecting their network security. Upon designation of a concerning word or phrase, SurveilStar actively scans all monitored communications seeking the specified word or phrase. Examples of keywords and phrases can include terms such as pornography, gambling, dating, sex and more.

SurveilStar’s Screen Snapshot function takes screenshots and stores all captured screenshots in sequential order. Computer owners can choose to isolate the images and view them one-by-one or implement a video-type playback of the recorded screenshots.

The email monitoring component of SurveilStar records the contents of all email correspondences. Supported email applications are Outlook and Outlook Express. SurveilStar can also record communications sent through web-based email providers such as Gmail, Hotmail, Yahoo and others. Moreover, the software logs the transcripts of conversations that occur via chat and instant messaging software.

PC Monitoring & Admin:

After purchase, the buyer will receive an email that contains software download instructions. The installation of this application may take some time. Once complete, it runs in stealth mode and is invisible to all users of the monitored computer. The PC monitoring software does not display itself in the Windows Task Manager, System Tray, Add/Remove Programs or the Process List in monitored computers. The monitoring software secretly operates with virtually no depletion of other critical system resources or bandwidth.

Removing the monitoring software requires correctly entering the administrative password. The feature prevents the monitored users from meddling with the PC monitoring software’s secret settings.

If concerns regarding the viewing of pornography exist, the monitoring software can log the frequency of user-launched applications. Examples of these types of computer programs include video player software such as QuickTime, Real Player, Media Player and others. Additional information provided by the PC monitoring software includes the most frequently launched computer application as well as the duration of use.

Filtering & Blocking:

SurveilStar has strong blocking and filtering capabilities. Computer owners can block websites by URL or page content. The online monitoring feature of the software can filter content on the fly. It actively scans online searches and website content for inappropriate or objectionable material.

The computer owner can prevent users from executing certain types of applications. Category-based blocking allows for the blocking of applications by group such as web browsers, instant messaging software, and email clients. Blocking by the software’s given name is also possible.

Reporting:

SurveilStar has useful reporting capabilities. The gathered information is viewable from any console-installed PC. The manufacturer’s reporting interface is intuitive. Beginning computer users will have no trouble locating the saved data. The reports are easy to read and interpret. The reporting system sorts the information by application type and in chronological order.