<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1232938&amp;fmt=gif">
redapt - rack integration - white icon
Data Center Infrastructure

Enhance your data center infrastructure with tailored solutions that boost performance and efficiency, ensuring rapid growth and exceptional customer experiences.

redapt - data estate assessment - white icon
Cybersecurity

Fortify your operations with comprehensive cybersecurity solutions that deliver resilient protection and end-to-end risk mitigation.

redapt - cloud adoption ready - white icon
Managed Cloud Services

Align your cloud strategy with your business objectives through our end-to-end managed services, delivering expert oversight across infrastructure, data optimization, and cost control.

Cloud_Adoption
Cloud Adoption

Adopt the cloud confidently with expert guidance on capacity, cloud-native technologies, and a step-by-step path for successful migration.

redapt - devops adoption - white icon
DevOps

Energize your software development lifecycle with tailored DevOps to match your needs and workflows.

redapt - data science experiment - white icon
Data Analytics

Successfully adopt advanced analytics capabilities to unlock insights, inform the design of your products, and make smarter decisions.

Artifical_Intelligence
Artificial Intelligence

Leverage Artificial Intelligence to generate actionable insights, uncover new revenue opportunities, and drive more informed decision-making.

Application_Modernization
Application Modernization

Modernize your applications with advanced development methodologies, driving greater agility, efficiency, and continuous innovation to excel in today’s competitive environment.

BLOG
The latest in infrastructure, technology, and security

From emerging innovations to real-world applications, we cover what helps leaders navigate complexity, drive transformation, and make smarter decisions in a rapidly evolving landscape.

VIDEO CENTER
Go deeper with expert stories, insights, and strategy

Your destination for expert conversations, client stories, and diving deep into the latest in infrastructure, technology, and business strategy.

CUSTOMER STORIES
Discover how we elevate organizations

Read some of our customer stories to learn more about how we develop and implement solutions, along with how those solutions have helped our clients and partners.

KNOWLEDGE CENTER
Stay informed with expert guides, trends, and webinars

Explore our curated collection of eBooks, guides, and webinars designed to help leaders stay informed and ahead of trends.

redapt-employee-unboxing-tech
ABOUT US
Get to know our mission, team, and what drives us

We specialize in implementing and managing technical solutions to support your infrastructure and digital environments. 

RC_DC_6481
LEADERSHIP
Meet the leaders driving innovation and customer success

Bringing together decades of experience in technology, business strategy, and customer success.

What the company needed Image-1
CAREERS
Join a team built on impact, collaboration, and growth

Build lasting relationships and deliver real-world results.

Actionable Insights.

Make-or-Break Focus Areas.

Experts Save You Time.

Let our experts save you time, money, and stress as you explore solutions. Talk to an expert today!

Contact Us

  • There are no suggestions because the search field is empty.
Banner Bg Image

3 Best Practices for Data Storage Security in Healthcare

All healthcare providers tasked with electronically transmitting patient protected health information (PHI) must comply with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. It is what allows the use of data vital to health decisions while ensuring the privacy of an individual’s healthcare information.

Despite the punishments laid out by the federal government for those who violate the rule, we see headlines everyday referencing data breaches of healthcare providers.

There were 32 million breaches of patient health records in the first half of 2019 alone, totaling 285 separate incidents. And, 88 percent of those, equaling 27.8 million records, were the result of hacking.

Significant breach incidents

amca_dominion

American Medical Collection Agency

The largest of those breaches was at the American Medical Collection Agency. Even collection agencies fall under the umbrella of the rule since they receive private information from patients.

Lax security and compliance policies allowed hackers to compromise their systems from April 2018 until March 2019, when the breach was discovered.

Thieves got away with information from major clients like LabCorp, Quest Diagnostics, and Sunrise Laboratories. The resulting fallout led the company to file for bankruptcy protection.

Get your free white paper

A Strategic Approach to Data Storage

Download
redapt_whitepaper_strategic-approach-to-data-storage-preview-1 redapt_whitepaper_strategic-approach-to-data-storage-preview-2 redapt_whitepaper_strategic-approach-to-data-storage-preview-3

Dominion National

While eight months may seem like a long time for a data breach to go undetected, that pales in comparison to nine years. That is how long it took Dominion National, an insurer and health plan administrator, to realize they were under attack.

The earliest detected breach of their systems occurred back in 2010. An investigation that concluded on April 24, 2019 revealed that nearly 2.9 million patients were impacted.

How to increase data storage security in healthcare

typing-keyboard-texture-33

How can other healthcare organizations prevent themselves from being the next high-profile headline? Here are practical steps businesses can take:

1. Build a culture of compliance

Organizations should have a member of senior management serve as a compliance officer. They should create a board whose primary responsibility is overseeing each area of the organization when it comes to adhering to HIPAA compliance rules. They should ideally coordinate with the IT department to evaluate the company’s current security architecture.

Your technology team should ensure that networks and other areas are monitored, and that clear alerts are sent out when a breach is detected. It is also a good idea to develop easily accessible compliance policies and procedures that include expected standards of conduct. They can potentially be transformed into business rules and monitored using automation.

Compliance procedures should ensure timely updates of all HIPAA-related documentation whenever there is a change that affects the handling of electronic PHI.

Get your free white paper

A Strategic Approach to Data Storage

Download
redapt_whitepaper_strategic-approach-to-data-storage-preview-1 redapt_whitepaper_strategic-approach-to-data-storage-preview-2 redapt_whitepaper_strategic-approach-to-data-storage-preview-3

2. Implement workforce training

Server weaknesses are not the only way hackers end up obtaining PHI. They make frequent attempts to gain information from unaware company personnel. Those attempts can include:

  • Sending emails with links to fraudulent websites
  • Monitoring their social media activity for clues on passwords and other security information
  • Spoofing emails from other executives to obtain sensitive data.

Businesses should implement in-person and online training that shows workers how to recognize these attempts. Emphasis should be placed on the importance of each employee’s role in keeping PHI safe and protecting patients and other health partners from exploitation.

3. Establish technical safeguards

One of the conveniences offered by the modern workplace is allowing employees to use personal devices at work. Every company should establish a mobile device policy that governs their use. This policy should include how these devices can interact with company systems, networks, allowed app downloads, and data storage guidelines. The same level of security should apply to user workstations and media used to transfer data back and forth.

Healthcare organizations should also create and enforce access control policies that allow only authorized personnel to access PHI. Other technical safeguards should include:

  • Audit controls for all hardware and software used within the company
  • Integrity controls protecting PHI from being changed or destroyed without permission
  • Security around the transmission of PHI over electronic networks
  • Contracts with all business associates that establish how they should handle any PHI sent electronically

Redapt can help healthcare organizations build secure data storage platforms that keep them compliant when it comes to protecting electronic PHI under HIPAA. Learn more about what it takes to build a modern data storage solution by downloading our latest white paper: A Strategic Approach to Data Storage.

Get your free white paper

A Strategic Approach to Data Storage

Download
redapt_whitepaper_strategic-approach-to-data-storage-preview-1 redapt_whitepaper_strategic-approach-to-data-storage-preview-2 redapt_whitepaper_strategic-approach-to-data-storage-preview-3