Verified Document

Enhancing Security In The US Health Sector Term Paper

Confidentiality, Privacy, and Security in HIPAA and HITECH ACTs The increasing rate of greatly publicized security breaches has sparked changes in the attitudes of consumers and business owners. Business leaders can no more neglect the dramatic consequences that security breaches have on company reputation. In the meantime, consumers now demand more remedies and communication from business after a security breach incident. Therefore, this subject remains one of the greatest priorities confronting businesses in all sectors, including healthcare.

The two cases present two principal security threats: Mobile Devices (BYOD) and Medical Records Theft. Data theft is greatly vulnerable in cases where employees use mobile gadgets, particularly personal devices, to access company information, share data or ignore to change mobile passwords. According to a recent survey, mobile security breaches have affected over 70% of international firms in the last 12 months only (Gupta et al. 2012). In fact, as more companies adopt BYOD, they confront the threat of exposure from those gadgets on the corporate network, including through the VPN. This could occur given that an app installs malware which could access the device's network connection.

Healthcare security is currently a global concern. In fact, in 2015, medical records of over 40 million Americans were breached (Gupta et al. 2012). Almost half of these were a result of cyber attacks. A single attack exposed over five million patient records. Following the increasing value...

A recent survey by the Ponemon Institute highlights that the rise in medical identity theft has triggered an increase in unbudgeted costs to healthcare sector thus compounding further budgetary pressures. Estimates indicate that roughly 70% of the victims pay insurers, health care providers, lawyers and identity services with their personal cash, with the average costs adding up to $14,000 to handle these cases (Dawson & Omar, 2015).
Indeed, organizations need IT engineers and specialists with sophisticated skills to defend and prevent against sophisticated cyber attacks. However, nowadays, it is hard to find tech talents with these skills. Precisely, this problem is complicated by few factors:

Stiff competition. In the business world, competition for top security experts is fierce. As companies and hospitals adopt electronic records, they require more security to safeguard their sensitive customer data.

Budget issues. Following the rising need for talent and the declining supply of professionals, compensation for security engineers has hit the skies. Thus many organizations are unable to afford.

Outdated technology. Companies in all industries are highly prone to these attacks because they take long to adopt new technologies and software

Part II

While fixing the two security breach issues, companies can…

Sources used in this document:
References

Dawson, M., & Omar, M. (2015). New Threats and Countermeasures in Digital Crime and Cyber Terrorism. http://public.eblib.com/choice/publicfullrecord.aspx?p=3433273.

Gupta, M., Walp, J., & Sharman, R. (2012). Threats, Countermeasures, and Advances in Applied Information Security. Hershey, PA: Information Science Reference.

Hea, C. M. P. S. (2010). For the Record: Protecting Electronic Health Information. Washington: National Academies Press.

Hhs.gov. (n.d.). HIPAA Privacy, Security, and Breach Notification Audit Program. http://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/index.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Impact of Information System in Health Sector
Words: 4816 Length: 15 Document Type: Term Paper

Information Technology on the Healthcare sector Healthcare systems serve to perform the very important function of preserving human capital. In modern society, health care assumes significance not just in terms of the expenditure it generates, but also because it is a large-scale consumer of goods and services, important employer and contributes in research and development. From the perspective of countries, maintaining and improving health care services require significant investments. Consequently

Health Systems Management and Electronic Health Records
Words: 2298 Length: 7 Document Type: Research Paper

Health Systems Management and Electronic Health Records Healthcare is an essential factor or tool in relation to the American society. The society of America has no national socialized healthcare system. In this research paper, the focus will be on the Medicare healthcare system in the context of the United States. The paper will focus on illustration of the concepts of the Medicare healthcare system, various management challenges, problems, and opportunities in

Health Care System United States
Words: 2587 Length: 8 Document Type: Research Paper

These stakeholders are also vital in the promotion of the application of standards-based technology. This is critical as it enhances the safety and security of the citizens as they pursue low-cost health care services and products within the context of the United States. The federal and state governments have also been influential in the development and implementation of policies towards addressing security and privacy issues in relation to the utilization

Health Information Technology Project
Words: 3806 Length: 12 Document Type: Research Paper

Health Information Technology System Hospital Information Technology System Over the years, improvement of service provision within this medical institution has been of massive essence. This has led to the establishment of a number of measures to enhance service delivery one of which constitutes the development of a variety of information systems within the organization. The information technology system under consideration here was established with the view of enhancing operations within all the

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

The Pros and Cons of Contract Employment and Outsourcing in the Health...
Words: 1335 Length: 4 Document Type: Essay

Health Policy Analysis Contract Employment and Quality Improvement Health Policy Analysis on Contract Employment and Quality Improvement The authors discussed the reasons why contract employment and outsourcing have become attractive in various organizations. I agree with this opinion. Outsourcing has been a useful activity within the contemporary business. This is because most companies seek to utilize innovations of science, technologies and techniques to issue competitive and qualified products that satisfy consumers. The situation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now