GENERAL SANTOS DOCTORS’ MEDICAL SCHOOL FOUNDATION, INC.
Bulaong Subdivision, Brgy. West, General Santos City, Philippines
College department
NCM-110n LECTURE
NURSING INFORMATICS
CHAPTER 12 HANDOUT
Introduction
Healthcare systems must comply with HIPAA and HITECH regulations while
ensuring robust network security to protect patient information. Mowry and Oakes
(2011) highlighted the vulnerability of electronic health records, noting that up to
77 individuals could access a patient’s record during hospitalization. While IT
policies must safeguard private data, cumbersome authentication procedures
can hinder clinicians’ efficiency. Physicians spend nearly two minutes per patient
encounter managing logins, and major healthcare providers handle over 150
applications, complicating access to essential data. Organizations must balance
security with streamlined access to optimize patient care. This chapter examines
how health systems manage and secure information within their networks.
Securing Network Security
● Healthcare organizations rely on computer networks for communication
and operations.
● Network connections create security risks, exposing information to
unauthorized access.
● The rise of smart devices increases challenges in securing network
information.
● Wireless medical devices (MDs) are vulnerable to security threats
(Sullivan, 2012).
3 Main Areas of Secure Network Information
Confidentiality
● Ensures private health information is kept secure.
● Organizations must have a well-defined confidentiality policy.
● Prevent "shoulder surfing" by properly placing computer monitors.
Availability
GENERAL SANTOS DOCTORS’ MEDICAL SCHOOL FOUNDATION, INC.
Bulaong Subdivision, Brgy. West, General Santos City, Philippines
College department
● Ensures network information is accessible when needed.
● Protects key hardware and prepares for disruptions.
Integrity
● Ensures data accuracy and reliability.
● Employees must trust the information they access.
Authentication of Users
What is Authentication?
Authentication is the process of verifying a user's identity before granting access.
Organizations use authentication to protect sensitive data and prevent
unauthorized access.
3 Main Types of Authentication
1. Something the user knows (passwords)
2. Something the user has (security tokens, ID cards)
3. Something the user is (biometrics)
Multi-Factor Authentication (MFA)
● Combines two or more authentication methods for better security.
Why is Authentication Important?
● Prevents unauthorized access
● Protects sensitive information
● Enhances cybersecurity in organizations
● Reduces risks of fraud and identity theft
Blockchain Technology
● Decentralized digital database that records transactions across multiple
networked computers.
● Transactions are stored in ordered blocks, each time-stamped and linked
to the previous block, forming a secure chain.
GENERAL SANTOS DOCTORS’ MEDICAL SCHOOL FOUNDATION, INC.
Bulaong Subdivision, Brgy. West, General Santos City, Philippines
College department
● Public Ledger: A transparent and immutable record of all transactions on
a blockchain network.
Blockchain’s Security Features
● Decentralized
● Data Encryption
● Can be Private or Public
● Organizations can implement additional protections by restricting network
nodes to HIPAA-covered entities, encrypting sensitive data, and keeping
certain data off-chain (Alder, n.d.; Miliard, 2017).
Applications of Blockchain in Healthcare
● Healthcare Research
● Patient-Centered Care: Improves patient privacy, security, and
interoperability by giving patients control over their data and enabling
secure information exchange between healthcare systems.
Use Case for Blockchain Technology
Blockchain Use Case: Insurance Claim Processing
Key Benefits:
● Decentralized management
● Indisputable audit trail
● Trusted, transparent, and easily tracked data
● Robustness and availability
● Privacy and security
Technology Used:
● Smart Contracts – Automates claim validation and approval.
● Distributed Ledger Technology (DLT) – Ensures synchronized and
secure data sharing.
Threats to Security
GENERAL SANTOS DOCTORS’ MEDICAL SCHOOL FOUNDATION, INC.
Bulaong Subdivision, Brgy. West, General Santos City, Philippines
College department
While networks help in easy information sharing, healthcare organizations must
protect data from unauthorized access.
Common Security Threats in Healthcare
● Human Error: A national survey by CompTIA found that over half of security
breaches result from human error.
● Carelessness in handling data
● Lack of experience with technology
● Unawareness of new security threats (Greenberg, 2015)
Ransomware
A type of malware that locks access to computer systems until a ransom is paid
to hackers.
Social Engineering
Manipulating people by exploiting their trust or position to gain unauthorized
access.
Common Social Engineering Attacks:
● Phishing: Deceptive emails or calls to steal passwords or data.
● Spear Phishing: A targeted version of phishing using personal details to
make scams more convincing.
● Baiting: Leaving an infected USB in a public place to trick someone into
using it.
● Scareware: Trick users into believing they've been hacked, leading to
remote access.
Preventing Security Breaches
To reduce risks, organizations must implement security measures:
● Physical Security:
○ Keep offices locked
○ Auto-lock computers after 5 minutes of inactivity
GENERAL SANTOS DOCTORS’ MEDICAL SCHOOL FOUNDATION, INC.
Bulaong Subdivision, Brgy. West, General Santos City, Philippines
College department
○ Provide regular security training
● Employee Awareness:
○ Monitor visibility of computer screens
○ Be aware of "shoulder surfing"
○ Follow proper procedures for removing hardware
Off-Site Use of Portable Devices
Importance in Healthcare: Mobile devices help professionals access Electronic
Protected Health Information (EPHI) remotely.
Data Security Measures
● Encrypt data before storing or transmitting it over unsecured networks.
● Use Virtual Private Networks (VPNs) for secure connections.
● Store only necessary clinical data to reduce risk.
Lost or Stolen Devices
● Implement remote tracking and data deletion for lost or stolen devices.
● Take precautions like covering laptops left in cars and locking doors.
Sanctions for Security Breaches
● Consequences for violating EPHI security may include warnings, suspensions,
termination, or prosecution.
Strategies for Secure Remote Access
● Use company-owned devices configured securely.
● Enforce strong VPN policies and access privileges.
● Train employees on secure computing practices.
Issues with Wireless Mobile Devices
● Wireless devices are vulnerable to malware and security breaches.
● Lost/stolen devices can be exploited for unauthorized access.
Cloud Computing Security
GENERAL SANTOS DOCTORS’ MEDICAL SCHOOL FOUNDATION, INC.
Bulaong Subdivision, Brgy. West, General Santos City, Philippines
College department
● Client-side encryption and multi-factor authentication are essential.
● Data Loss Prevention (DLP) protocols must be in place.
Employee Training
● The most effective defense against security breaches is comprehensive
employee training.
● Many breaches result from careless internal actions rather than external
attacks.
Conclusion
Ensuring security is crucial, but balancing accessibility and protection remains a
challenge. Organizations must continuously update security protocols to prevent
breaches, especially with the rise of cloud-based solutions. While the safest
network is one that is turned off, healthcare institutions must find a middle ground
between security and usability.
Group 1 - BSN2E
Leader: Tracy Mae Antiporta
Assistant Leader: Rynch Samson
Secretary: Anthea Psyche Bajade
Members: Mixie Bubbles Ampan, Mary Nike Louise Mica, Kieth Irecka Castor,
Ria Millan, Kenz Joshua Salinas, Ken Andrew Salvacion