How did organizations do with HIPAA compliance in 2017? Here are the results along with major takeaways to help you with your own HIPAA compliance efforts.
In 2017, we conducted 4 surveys of over 300 healthcare professionals from organizations of all sizes, primarily from those with less than 500 employees. We included the results in our 2018 Guide to HIPAA Compliance. Data from these surveys can help security experts and practices alike decide on which areas to focus their HIPAA resources.
So how did organizations do with HIPAA compliance in 2017? Here are the results along with major takeaways to help you with your own HIPAA compliance efforts:
When it came to the physical security of HIPAA-compliant data in 2017, at least 20% of respondents reported that their organizations did not use automatic timeouts or log outs on workstations. Also notable was the fact that at least 20% of respondents reported their organizations did not encrypt stored electronic protected health information. Organizations did well in the area of providing unique ID credentials for each employee—with 94% reporting that they followed this requirement.
Takeaway: All workstations need to have an automated timeout/log out (i.e., a password-protected screensaver enabled after a time of disuse.
Takeaway: All employees should have their own login IDs and passwords for computer, software, and physical access.
Takeaway: If you store any ePHI, you need to make sure that it has been properly encrypted (e.g., using AES-256 encryption).
Network firewalls (both physical and virtual) are vital to HIPAA compliance. 31% of our respondents reported using both. Most organizations we surveyed opted for a managed firewall —a move that can help practices with large or complex networks.
Takeaway: All networks (whether small or large) need both a hardware and software firewall.
Takeaway: Though not required, managed firewall(s) can help organizations with complex firewall rules and firewall management.
Takeaway: A security professional should regularly review your firewall rules (e.g., at least quarterly).
Takeaway: HIPAA requires that organizations enable logging and log alerting on critical systems (e.g., un-authorized connection attempt).
Takeaway: If you use remote access, make sure to implement adequate security, such as multi-factor authentication and proper firewall configuration.
Takeaway: If you use remote access, make sure to implement adequate security, such as multi-factor authentication.
This type of white-hat hacking is one of the best ways to find network vulnerabilities. Organizations should make sure that pen testers are qualified and vetted, and should perform a variety of penetration tests—to help prevent wasting time and money.
Takeaway: To protect against cyber-attacks, penetration testing is vital to network security.
Takeaway: Whether a penetration test is performed by an in-house security professional or third-party vendor, make sure they are qualified.
Takeaway: Organizations should regularly perform penetration tests (e.g., yearly).
Takeaway: Organizations should perform a variety of penetration tests to confirm their network security.
Here are a few things to keep in mind for HIPAA compliance:
Need help with HIPAA? Check out our 2018 Guide to HIPAA Compliance and contact us with any questions.