<\/figure><\/div>\n\n\n\nHHS\nis committed to protecting sensitive patient information by providing strong\ncybersecurity technology, making cyber awareness training a priority for\nmedical staff, and adding key control measures. Federal regulators are seeking\na formal security program that includes a customized incident response plan,\nsomething that will require the involvement of multiple personnel \u2013 not just IT, but HR departments and legal teams,\nas well. A failure to implement this plan will result in negative consequences\nfor the practice \u2013 an indication of how seriously HHS is taking the\ncybersecurity threat. <\/p>\n\n\n\n
This\nmore stringent oversight isn\u2019t limited to the Federal government. Regulators at\nthe state and local levels are also taking a more active approach to ensuring\nthe health care industry takes the steps necessary to improve data security. <\/p>\n\n\n\n
Implementing\nsuch a plan is not without its share of challenges. Smaller health\norganizations are especially at risk, giving the penchant for hackers to focus\ntheir efforts on smaller practices, who are less likely to have strong\ncybersecurity protection in place\u2026making their date \u201ceasy pickings.\u201d <\/p>\n\n\n\n
Fortunately,\nthe best practices HHS is promoting are fairly inexpensive to implement and\nprovide an excellent starting point for organizations unfamiliar with the\nintricacies of adopting a cybersecurity plan. <\/p>\n\n\n\n
Practices\nmust be willing to commit to a thorough understanding of where data is kept and\nthe threats and vulnerabilities they face prior to establishing a procedure. It\nis helpful to develop and foster a culture of cyber-awareness to get everybody\nthinking about overall risks and how a security breach would affect data (is it\ndeleted. or has it been manipulated in some fashion?) and impact patient care.\nAll practices, large and small, should follow certain protocols to make sure\nthey are prepared for a possible data breach. Regular cybersecurity drills will\ngo a long way toward making the workplace safer and more prepared in the event\nof an attack. Simply letting all employees know the task of protecting\nsensitive data does not fall entirely on the IT department will help create a\nsense of urgency necessary in thwarting off future attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"
The Department of Health and Human Services (HHS) has released Best Practice guidelines for 2019. These are designed to help your practice establish security protocols for protecting patient data and are expected to become widespread in 2019 as practices adopt them, making them new industry standards. HHS Best Practices HHS is committed to protecting sensitive…<\/p>\n","protected":false},"author":3,"featured_media":1399,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"schema":"","placeID":"","no_match":false,"name":"","company":"","review":"","address":"","city":"","state":"","zip":"","lat":"","lng":"","phone1":"","phone2":"","fax":"","mon1":"","mon2":"","tue1":"","tue2":"","wed1":"","wed2":"","thu1":"","thu2":"","fri1":"","fri2":"","sat1":"","sat2":"","sun1":"","sun2":"","hours-note":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-1398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitaltechnology"],"yoast_head":"\n
A Guide to Cybersecurity Best Practices | ASCENT: Administrator Support Community for ENT<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n\t \n\t \n\t \n","yoast_head_json":{"title":"A Guide to Cybersecurity Best Practices | ASCENT: Administrator Support Community for ENT","description":"ASCENT: Administrator Support Community for ENT | The Department of Health and Human Services (HHS) has released Best Practice guidelines for 2019. These are designed to help your practice establish","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"A Guide to Cybersecurity Best Practices | ASCENT: Administrator Support Community for ENT","og_description":"ASCENT: Administrator Support Community for ENT | The Department of Health and Human Services (HHS) has released Best Practice guidelines for 2019. These are designed to help your practice establish","og_url":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/","og_site_name":"ASCENT: Administrator Support Community for ENT","article_published_time":"2019-01-11T23:39:28+00:00","article_modified_time":"2019-01-21T16:29:22+00:00","og_image":[{"width":640,"height":960,"url":"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/01\/lock.jpeg","type":"image\/jpeg"}],"author":"Ascent","twitter_misc":{"Written by":"Ascent","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/","url":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/","name":"A Guide to Cybersecurity Best Practices | ASCENT: Administrator Support Community for ENT","isPartOf":{"@id":"https:\/\/ascentblog.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/01\/lock.jpeg","datePublished":"2019-01-11T23:39:28+00:00","dateModified":"2019-01-21T16:29:22+00:00","author":{"@id":"https:\/\/ascentblog.org\/#\/schema\/person\/a48fa1aa41da1c29cc94d21d838e548c"},"description":"ASCENT: Administrator Support Community for ENT | The Department of Health and Human Services (HHS) has released Best Practice guidelines for 2019. These are designed to help your practice establish","breadcrumb":{"@id":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/#primaryimage","url":"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/01\/lock.jpeg","contentUrl":"https:\/\/ascentblog.org\/wp-content\/uploads\/2019\/01\/lock.jpeg","width":640,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/ascentblog.org\/a-guide-to-cybersecurity-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ascentblog.org\/"},{"@type":"ListItem","position":2,"name":"A Guide to Cybersecurity Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/ascentblog.org\/#website","url":"https:\/\/ascentblog.org\/","name":"ASCENT: Administrator Support Community for ENT","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ascentblog.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ascentblog.org\/#\/schema\/person\/a48fa1aa41da1c29cc94d21d838e548c","name":"Ascent","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ascentblog.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d989781765ad4aaeddfde1e4751472ee?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d989781765ad4aaeddfde1e4751472ee?s=96&d=mm&r=g","caption":"Ascent"},"description":"The Association of Otolaryngology Administrators has more than 1 thousand members and continues to be the leader in otolaryngology practice management. AOA serves their membership through successful resources and services offered while striving to keep pace with future opportunities.","url":"https:\/\/ascentblog.org\/author\/ascent\/"}]}},"_links":{"self":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts\/1398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/comments?post=1398"}],"version-history":[{"count":0,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts\/1398\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/media\/1399"}],"wp:attachment":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/media?parent=1398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/categories?post=1398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/tags?post=1398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}