ePHI Security Breach at Large Healthcare Provider in Arizona
In recent media coverage, Banner Health revealed that hackers might have accessed their patient health insurance records. As a result, cyber criminals compromised up to 3.7 million patient records. Unfortunately, this ePHI security breach occurred because hackers obtained access to their servers through a third party food service system.
Third Party Vendor Installations
At Innovative Computer Systems, we advise our clients to contact us before a third-party vendor installs any equipment on their network. This is primarily due to an alarming trend in the medical community; cyber criminals are targeting third-party vendor systems. By informing IT ahead of time, we can ensure proper safeguards and security procedures are in place. We can also carefully monitor the installation from start to finish. Generally speaking, these third-party systems commonly lack necessary security and controls. In many instances, third party vendors use outdated software and operating systems.
It’s important to point out that ePHI security breaches can be avoided. In part, by keeping your Managed IT Services Provider informed whenever a third-party vendor is contracted to install equipment on your network.
Network Vulnerability and Compliance Scans
Network Vulnerability Assessments and Compliance Scans are crucial for medical practices that store ePHI, work with third-party vendors, and handle sensitive patient data. You can read more about the importance of Network Vulnerability and Compliance Scans on our Blog.Contact Us
About Innovative Computer Systems
Innovative Computer Systems is a Managed Services Provider specializing in Healthcare Information Technology (HIT) and Corporate Business Technology. We work closely with our clients to understand their daily workflow requirements. Some of our clients include leaders in Ophthalmology, Facility Maintenance, Pediatrics, Law, Urology, Dermatology, Commercial Real Estate, Internal Medicine and Ambulatory Surgery.