Governance , Incident & Breach Response , Security Operations

PHI Security: The Role of Encryption and Tokenization

PHI Security: The Role of Encryption and Tokenization

Encryption and tokenization can play critical roles in preventing breaches. A recent survey conducted by HealthcareInfoSecurity confirms that the healthcare sector still has a long way to go in implementing these technologies. According to this survey, one of the top data protection steps organizations plan to take in the year ahead include encryption of all mobile device and removable media and implementing encryption for all end-user devices and over data transmissions. The survey shows that less than 50 percent of organizations currently apply encryption to all mobile devices and storage media, including backup tapes.

Despite the fact that so many of the breaches reported to Department of Health and Human Services (HHS) involve lost or stolen unencrypted mobile gear, the survey found that only half of organizations are requiring encryption on portable media, and even fewer organizations are encrypting data that's stored on or transmitted from mobile computing devices.

Listen to industry experts on a range of PHI data protection topics, including:

  • Shared responsibility, vendor management and downstream compliance;
  • Asset and data inventory;
  • Minimizing and protecting sensitive ePHI;
  • Framework adoption;
  • Safe harbor through encryption, tokenization and data de-identification.

Slide Previews



...and much more in the full webinar.

Register for this webinar to view all slides ��

Background

Chasing yesterday's concerns - policies, procedures, training and agreements - are still important, But addressing privacy, risk and security issues is critical to protecting today's evolving threat landscape. It's no surprise that healthcare records and systems are seen by cyber crooks as "rewarding and valuable" and can be sold for $60-$80 per record. What are you doing to protect your ePHI?

Listen to industry experts on a range of PHI data protection topics, including:

  • Shared responsibility, vendor management and downstream compliance;
  • Asset and data inventory;
  • Minimizing and protecting sensitive ePHI;
  • Framework adoption;
  • Safe harbor through encryption, tokenization and data de-identification.


Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.