This article originally published on Executive Insight’s website on July 6, 2015.
By Nicholas M. Cushmore, ARM, Assistant Vice President
Experts have predicted 2015 will be the year of healthcare data breaches, and it appears that this prediction may be spot on based on the number of incidents that have already been reported in just the first six months of this year. While data breaches in the financial industry have been about as prevalent as the common cold, the industry has become smarter and worked towards removing those gaps that make it a prime target for data breaches. The healthcare industry, on the other hand, is very susceptible to data breaches and has been seeing an influx of cases in recent years.
According to Symantec, cyber attacks in the healthcare industry increased by 72 percent from 2013-2014. The increase is due, in large part, to the widespread implementation of electronic health records across the industry in organizations that often lack sophisticated data protection programs. Adding more salt to the wound is fraudulent activity in the healthcare industry often goes undetected for years, allowing criminals to do more damage with the stolen information over a longer period of time.
Healthcare executives must ensure their companies have an effective risk management plan in place to combat data breaches, which the Ponemon Institute’s 2015 Cost of Data Breach Study: Global Analysis found cost companies on average $3.8 million. Healthcare companies that have a plan in place to respond to breaches and contain the damage have been able to significantly reduce the overall cost of breaches and the long-term negative effects associated with them on, for example, patient retention and the organization’s reputation.
As an annual practice, healthcare executives should review their organization’s cyber risk management program and as part of this review process, should carefully examine their insurance policies to ensure the policies will adequately protect the organization in the event of a data breach and confirm that the organization as a whole is following best practices for preventing data breaches.
The first step in reviewing your organization’s cyber liability insurance policy is ensuring it has the five main coverage components:
Beyond these five coverage areas, healthcare executives should ensure that the policy includes coverage for regulatory fines and penalties associated with HIPAA and HITECH. This coverage can be excluded altogether from policies and may typically have a sublimit, if provided. In the “BYOD” (bring your own device) era, it is also critical to make sure policies do not contain an encryption exclusion or a sublimit for unencrypted mobile devices. Another point to consider is some policies require providers work with the insurance company’s pre-selected law firms, PR firms, etc., and while this sounds fine at the time, it can leave you feeling like your hands are tied if a data breach occurs.
Making sure that your cyber coverage is appropriately tailored to fit your healthcare organization is only half the battle. A major component of any solid cyber risk management program is commitment to best practices by all staff, starting with upper management within the organization. If employees know and understand that the leaders within the organization are serious about cyber security, it will help the implementation of good risk management. Training on cyber security isn’t just a concept for the IT department; every end-user of technology in the healthcare organization has the potential to lead to a breach.
As discussed earlier, this is the era of BYOD. Laptops, tablets and smartphone devices all allow employees to work remotely and transmit data at the same time. It is imperative that an organization instill best practices when it comes to working with these devices. Some key best practices include:
Data protection should be a central part of all healthcare organizations’ businesses. Healthcare organizations must take an active approach to protecting data and preventing data breaches. Taking the time to carefully examine the cyber risk management program will help ensure your business and patients continue to thrive.
Nicholas M. Cushmore
ARM, AINS, Vice President
ncushmore@grahamco.com