How A Breakthrough Can Bring Higher Levels of Security to eHealth

You get a phone call. Or an email. Or a text alert.

Someone has breached your health insurer’s security and has stolen your confidential information—confidential information your mother doesn’t even know about. And now it’s in the hands of a cybercriminal who’s willing to sell it to the highest bidder.

Data breaches are a body blow to the growing eHealth industry that uses information and communication technologies to support health and health-related fields.

It’s a body blow to HIPAA, the law passed to protect the confidentiality and security of healthcare information.

It’s a body blow to HITRUST, a common security framework (CSF) used by organizations that create, access, store or exchange sensitive and/or regulated data.

And you’re not too thrilled about it either.

Avoid healthcare data breaches with the technology is a powerful solution for avoiding data breaches, making logins easier and more secure.

Studies show 67% of all data breaches involve compromised login information that gives cybercriminals access to data that should be secure. No matter how good cyber security is, passwords remain the weak link.

Most passwords are notoriously feeble, taking only seconds to break, providing cybercriminals a path to your most private health records and other sensitive information. Furthermore, 8 out 10 users use the same userID and password on multiple sites. So if one of these sites is hacked (like the Yahoo data breach which exposed 1 Billion passwords), the bad guys already have your password.

And almost every login procedure requires your user name and password.

One obvious solution is to eliminate passwords. technology does just that. It transforms your phone into your digital identity and eliminates passwords.

It incorporates commercial-grade multi-factor authentication that allows you to log in with just your fingerprint. This also simplifies the login process because, unlike passwords, you’ll never lose or forget your fingerprint.

As a result, there’s nothing for cybercriminals to steal. If there is no password, it can't be stolen. The system doesn’t store any PHI or PII data either. So even if hackers break in, they can’t steal any patient information for the simple reason that it doesn’t exist. technology also offers the same security for mobile eHealth payments because your credit card information never passes through the healthcare company’s network, which significantly reduces PCI requirements. It is an ideal complement for HIPAA and HITRUST as well as PCI.

The high cost of data breaches:

Will technology completely eliminate all data breaches? No. But it will eliminate a majority of them.

However, by bringing the highest level of user friendly security to mobile access, it makes accessing eHealth data exponentially more secure.

This is especially important when you consider the average cost of a breach is approximately $380 per patient. For a healthcare company with 2 million patients, a data breach can cost almost $800 million.

Can any security vendor afford to pay this restitution?

Since does not store any PHI or PII, it protects against the risk of a large reimbursement or financial ruin, making access more secure than traditional login. Because if you don’t have a password, it can't be stolen.

#passwords #Fingerprint

Featured Posts
Recent Posts
Search By Tags
No tags yet.