6 steps effective data breach response - …...help it enable staff mobility, while mitigating the...

1
Whether a device containing sensitive information is lost or stolen, breached with malicious intent or unsecured by accident, the costs and consequences are the same. How a healthcare organization responds can be the difference between a simple security incident and long-term reputation and financial damage. Follow these six steps to keep your cool and emerge as unscathed as possible if your data is threatened. While healthcare organizations must support a mobile workforce, they must also ensure and prove that PHI is secure, and that they are in compliance at all times. Technology solutions that help IT enable staff mobility, while mitigating the risks of data breaches are critical to quality patient care and the success of an organization. DOWNLOAD THE WHITEPAPER EFFECTIVE HEALTHCARE DATA BREACH RESPONSE: HOW NOT TO PANIC WHEN SENSITIVE DATA IS COMPROMISED WHITE PAPER Limit damage from a data breach by building your own action plan. Find out how in the free whitepaper, Effective Healthcare Data Breach Response. © 2018 Absolute. All rights reserved. Absolute and Persistence are registered trademarks of Absolute. Self-healing Endpoint Security is a trademark of Absolute. All other trademarks are property of their respective owners. 6-Steps-to-Effective-Healthcare-Data-Breach-Response-Infographic-101018 absolute.com TAKEAWAYS: 6 STEPS to EFFECTIVE DATA BREACH RESPONSE An Action PlAn for HeAltHcAre it Assemble a crisis management team to plan and practice how to respond to a breach. This will eliminate a panic situation in the event of a real breach and allow for a faster response. Determine the facts of the breach. Then, depending on how severe, either remotely freeze or delete the data on the device to keep the problem from spreading. Ensure the team has the most current iterations of breach notification laws, such as HITECH, HIPAA and Gramm-Leach-Bliley Act. Risk assessment must demonstrate that due diligence was completed with consistent and defensible methodologies. Was the breach accidental or malicious? Who was affected? What types of data were accessed? Answers to these questions determine the level of exposure. If required to send data breach notifications, determine the channels through which patient, regulatory, and media notifications will be sent. 1 3 2 4 6 5 ACTIVATE YOUR RESPONSE PLAN OF ACTION UNDERSTAND THE REGULATIONS DETERMINE THE EXTENT OF THE DAMAGE LIMIT THE DAMAGE SEND COMPLIANT NOTIFICATIONS ! COLLECT, DOCUMENT AND ANALYZE EVIDENCE EMAIL: [email protected] SALES: absolute.com/request-info PHONE: North America: 1-877-660-2289 EMEA: +44-118-902-2000 WEBSITE: absolute.com ABOUT ABSOLUTE Absolute provides visibility and resilience for every endpoint with self-healing endpoint security and always-connected IT asset management to protect devices, data, applications and users — on and off the network. Bridging the gap between security and IT operations, only Absolute gives enterprises visibility they can act on to protect every endpoint, remediate vulnerabilities, and ensure compliance in the face of insider and external threats. Absolute’s patented Persistence technology is already embedded in the firmware of PC and mobile devices and trusted by over 12,000 customers worldwide.

Upload: others

Post on 22-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 6 STEPS EFFECTIVE DATA BREACH RESPONSE - …...help IT enable staff mobility, while mitigating the risks of data breaches are critical to quality patient care and the success of an

Whether a device containing sensitive information is lost or stolen, breached with malicious intent or unsecured by accident, the costs and consequences are the same.

How a healthcare organization responds can be the difference between a simple security incident and long-term reputation and financial damage.

Follow these six steps to keep your cool and emerge as unscathed as possible if your data is threatened.

While healthcare organizations must support a mobile workforce, they must also ensure and prove that PHI is secure, and that they are in compliance at all times. Technology solutions that help IT enable staff mobility, while mitigating the risks of data breaches are critical to quality patient care and the success of an organization.

D O W N L O A D T H E W H I T E PA P E REFFECTIVE HEALTHCARE DATA BREACH RESPONSE:HOW NOT TO PANIC WHEN SENSITIVE DATA IS COMPROMISED

W H I T E P A P E R

Limit damage from a data breach by building your own action plan. Find out how in the free whitepaper, Effective Healthcare Data Breach Response.

© 2018 Absolute. All rights reserved. Absolute and Persistence are registered trademarks of Absolute. Self-healing Endpoint Security is a trademark of Absolute. All other trademarks are property of their respective owners. 6-Steps-to-Effective-Healthcare-Data-Breach-Response-Infographic-101018

absolute.com

TA K E AWAYS :

6 STEPS to EFFECTIVEDATA BREACH RESPONSE

An Action PlAn for HeAltHcAre it

Assemble a crisis management team to plan and practice how to respond

to a breach. This will eliminate a panic situation in the event of a real

breach and allow for a faster response.

Determine the facts of the breach. Then, depending on how severe, either remotely freeze or delete the data on

the device to keep the problem from spreading.

Ensure the team has the most current iterations of breach notification laws,

such as HITECH, HIPAA and Gramm-Leach-Bliley Act.

Risk assessment must demonstrate that due diligence was completed

with consistent and defensible methodologies.

Was the breach accidental or malicious? Who was affected? What types of data

were accessed? Answers to these questions determine the level

of exposure.

If required to send data breach notifications, determine the channels

through which patient, regulatory, and media notifications

will be sent.

1

3

2

4

6

5

ACTIVATE YOUR RESPONSE PLAN OF ACTION

UNDERSTAND THE REGULATIONS

DETERMINE THE EXTENT

OF THE DAMAGE

LIMIT THE DAMAGE

SEND COMPLIANT NOTIFICATIONS

!

COLLECT, DOCUMENT AND

ANALYZE EVIDENCE

EMAIL :

[email protected]

SALES:

absolute.com/request-info

PHONE:North America: 1-877-660-2289 EMEA: +44-118-902-2000

WEBSITE:

absolute.com

A B O U T A B S O LU T EAbsolute provides visibility and resilience for every endpoint with self-healing endpoint security and always-connected IT

asset management to protect devices, data, applications and users — on and off the network. Bridging the gap between

security and IT operations, only Absolute gives enterprises visibility they can act on to protect every endpoint, remediate

vulnerabilities, and ensure compliance in the face of insider and external threats. Absolute’s patented Persistence

technology is already embedded in the firmware of PC and mobile devices and trusted by over 12,000 customers

worldwide.