- June 3, 2020
- Posted by: Pat Riot
- Categories: CyberSecurity, Endpoint Security, Healthcare, Security Operations
Authenticity plays a key role in the foundation of any modern successful business. The ability to be true to one’s self and principles, offer consistent and positive service, and provide a secure environment in which to conduct business is essential. In patient care and cyber security alike, authenticity provides “security, genuineness, and continuity.” Linking the two together, patient care and cyber security, not only creates another level of accountability but simultaneously provides a set of standards and expectations. In a world that is driven more and more on patient satisfaction and positive google reviews, there is no denying that a positive, inviting, and secure online presence is the utmost importance for success.
Identity management is the cornerstone to providing that security. The role authentication plays is a multifaceted conversation. With the actual definition of authentication stating, “the process or action of proving or showing something to be true, genuine, or valid.” Just like a doctor’s authenticity is what makes them storybook and literal heroes. We see at Steel Patriot Partners with our client base is that authenticity is an essential part in identity management and providing a safe and secure network.
There is an adage that if it is not charted, then it is not done. From a legal perspective, charting is one of the first things looked at. It is also used to keep up to date with patients in between visits. Anyone in medicine is familiar with an electronic health record or EHR. Anything electronic or software based was essentially designed to increase the quality and efficiency of, in this case, clinical documentation. However, in an updated practice brief posted in the AHIMA libraries, an interesting point was made back in 2013. They stated, “with the continued advancement of EHRs, there is increasing concern that a potential loss of documentation integrity could lead to compromised patient care, coordination, and quality reporting and research as well as fraud and abuse.” Phew????.
Well fast forward 7 years and I wouldn’t necessarily agree with the integrity aspect, because doc’s in general keep patient notes up to date. But it poses an interesting “what if” question. What if the exact same could now be said in conjunction with a practice’s network? If the virtual network that encompasses all the sensitive business data is not continually monitored, updated, and tested then compromised patient care, coordination, and quality reporting and research becomes bullet points on a laundry list of things to worry about. Data loss, malware, and failure to stay within compliance standards…as well as fraud and abuse could be more detrimental than a bad patient visit. Managing user behavior and network traffic should be just as important as updating vital signs and authorship integrity when making changes in a patient’s electronic health record.
Although it is just as important, that does not mean it should be daunting and overwhelming. At Steel Patriot Partners, we have tailormade services specifically designed with medical professionals in mind. We take the worry out of security and put the power back in your hands to have total control over your network. Our endpoint protection software makes security truly as simple as updating patient’s electronic health records.