Is Your Healthcare Data Protected from Employee Hacks?

When we think of healthcare data security, we usually think of intrusions coming from outside our network. And that is a real and serious issue. But what if the intrusion comes from within your own organization? Is that a real concern?

IBM Cyber Security Intelligence Index

According to IBM’s 2016 Cyber Security Intelligence Index, it should be more than a nominal concern. It should be your number one concern, especially if you are in the healthcare industry. And don’t just think computer network. Phone systems for doctors are part of the data network that can be especially vulnerable.

IBM’s data showed that 60% of the attacks targeting secure data come from inside the organization or through the use insider information. Two thirds of those insider attacks are attempted with malicious intent. They weren’t accidents or errors; they were intentional attempts to hack into secure data.

Healthcare Tops the List

Of all the industries covered in the IBM report, the healthcare industry topped the list for cyberattack. Many of the attacks came through misuse of employee security credentials. Sometimes this was direct malicious intent of the employee, but often times it was the result of cyber criminals gaining access to security credentials via email phishing or malware. Stolen devices carried offsite was another source of internal security hacks.

Among IBM clients, there were an average of 3.4 of these types of events recorded each week in 2015. This was a significant increase over the number recorded in 2014. HIPAA regulations address this security issue. Unfortunately, most phone systems are designed for general business use and do not take HIPAA regulations into account.

How RingRx Can Help

RingRx was developed as a phone system for doctors. It is fully HIPAA compliant and secured with professional grade encryption. It is a Cloud PBX system, which means no expensive and disruptive onsite equipment installation. We provide simple, yet effective, data security to keep your data safe.

Download our whitepaper on
What a Phone Upgrade Should Look Like
Find out the shortcomings of "typical" solutions