<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL
Show all

Enterprise-Wide Risk Analysis: How Non-Healthcare Organizations Can Learn From HIPAA

Enterprise-Wide Risk Analysis

Enterprise-wide risk analysis. This was the common theme running through the 11th Annual OCR/ NIST HIPAA conference – Safeguarding Health Information: Building Assurance through HIPAA Security.  But this is a best practice for all organizations from all industries, not just healthcare.  Other industries can probably get valuable input from HIPAA law because it focuses on enterprise-wide risk analysis and management to have a comprehensive baseline security posture for your organization. Compliance exists to provide a measure of security and you can look into compliance laws to understand security best practices. Systems are connected. A cyberattack on one system can easily propagate to another system within your organization.  This heightens the importance and needs for every organization to undertake an enterprise-wide risk analysis as a critical step towards strengthening security posture. Risk analysis must be thorough and accurate. In the largest medical data breach settlement with Anthem, the Office for Civil Rights (OCR) reported that Anthem had failed to conduct an enterprise-wide risk analysis, among other violations.   For this and other process vulnerabilities, Anthem has been levied a 16 million dollar penalty by OCR, the largest ever HIPAA penalty to date.  

 

Some key learnings about enterprise-wide security analysis

  • When you do your risk analysis, there must be evidence that you have considered your organization in total for this enterprise-wide risk analysis. All locations should have been considered.
  • If your vendors have access to your confidential information or to Personally Identifiable Information (PII), have you conducted a Third Party Information Security Assessment?
  • Know your data. Prepare a complete data map of everywhere your confidential and private data is held, and in all forms and formats.  You can't protect it if you don't know where it is.  Where is your data, how does it flow in and out of the organization, and between departments and functional areas.
  • Classify your data.  How would a data breach impact the confidentiality, integrity, and availability of your data? 
  • After the risk analysis or risk assessment is done, ensure that a detailed report outlining findings and recommendations is produced and communicated at the highest levels of your organization.
  • Prioritize your risks and prepare a plan to address them. Critical and high-priority risks or vulnerabilities should obviously be addressed at the earliest.
  • Risk analysis is an ongoing process. You must reassess periodically especially if you are implementing new tools and systems. A commonly followed best practice is to conduct a security risk assessment once a year, at a minimum, and more frequently if infrastructure changes may require it. 

Another way for you to learn from HIPAA, even if you are not in healthcare, is this HIPAA Compliance flowchart.

This is a high-level flowchart to help a healthcare organization strategize on steps needed to comply with HIPAA.  Even as a non-healthcare organization you can go through the process to see if you have reviewed your safeguards at all levels to prepare a security or risk management plan. 

Download HIPAA Compliance Flow Chart

If you have not yet conducted your organization’s enterprise-wide security risk assessment or security risk analysis, schedule it today.  You can either conduct it using in-house personnel or you may choose to outsource it. Either way, you cannot afford to wait.

 

Rema Deo
Rema Deo

As CEO and Managing Director of 24By7Security, Inc., Rema is a highly experienced and credentialed information security professional. Among her certifications are PCI Qualified Security Assessor (QSA) from PCI SSC, Health Care Information Security & Privacy Practitioner (HCISPP) from (ISC)2, Certified Information Security Manager (CISM), and Certified Information Security Auditor (CISA) from ISACA. She also holds a certificate in Cybersecurity: Technology, Application, and Policy from the Massachusetts Institute of Technology, and Certified Data Privacy Practitioner (CDPP) from Network Intelligence. She earned her MBA from Symbiosis Institute of Business Management in Pune, India, and her Bachelor of Commerce degree from the University of Bombay. Be sure to follow the 24By7Security Blog for valuable insights from Rema and her colleagues.

Related posts

April, 23 2024
March, 19 2024
January, 23 2024

Comments are closed.

HIPAA Enforcement: The future of HIPAA penalty caps and limits, and regulatory actions on failure to comply with breach notification rules
Online Safety at work is your job too!
Subscribe to our Blog!