Five ways to avoid costly compliance risks
Posted on 09 June 2014.
When it comes to violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules, the stakes can be high. Recently, the New York Presbyterian Hospital and Columbia University agreed to settle, in the amount of $4.8 million, charges that they potentially failed to secure thousands of patients’ electronic protected health information (ePHI) held on their network.

To prevent costly breaches such as this one from happening, Netwrix suggests the following best practices every health care organization or insurance provider should implement and maintain to ensure HIPAA compliance.

Establish Strict Policies – When enacting stringent compliance policies and procedures across your IT infrastructure, ensure that they work to prevent risk at every level, from user applications all the way through the operating systems and down to the infrastructure level.

Enact Controls to Verify Policies Work – Having strict compliance policies achieves the desired effect only if you can verify that those policies are actually working. Consider an auditing solution validating that those policies are working, or alert and report when they are violated.

Ensure Your Visibility is Deep – All the policy controls in the world will not protect your organization if it cannot be substantiated by audit reports that prove your compliance. To ensure your organization’s compliance, use an auditing solution that will give you complete visibility across your IT infrastructure with relevant reports that can be easily submitted to an auditor.

Get Proactive – As your infrastructure becomes increasingly complex, changes can be more difficult to track. By employing an automated change auditing solution, you can detect breaches as soon as they appear and take all the necessary steps before sensitive information is compromised, thus avoiding compliance violations and costly penalties.

Be Prepared for Increasingly Strict Requirements – As more breaches occur, compliance regulations are sure to become more stringent. By proactively preparing your organization with an automated compliance auditing solution today, you can be ready for any future compliance requirements or regulations that may be enacted.

“One of the main purposes of compliance regulations is the prevention of breaches and violations; and as a new breach occurs, authorities gather to investigate the root causes and possible prevention mechanisms,” said Michael Fimin, CEO of Netwrix. “With each new, highly visible violation, we can expect compliance requirements to become stricter and compliance audits to be more thorough. By employing simple steps to assure automated change and compliance auditing, organizations can safeguard themselves from the threat of devastating violations and penalties.”





Spotlight

(IN)SECURE Magazine issue 43 released!

Posted on 16 September 2014.  |  (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. This issue covers web application security, mobile hacking, certification, Black Hat, and much more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Sep 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //