AHIMA Issues Cybersecurity Plan for Healthcare Organizations

Dec. 18, 2017
Cyber attacks against the healthcare industry are growing at an accelerated pace, and to help healthcare organizations strengthen their cybersecurity programs and defend against a cyber attack, the American Health Information Management Association (AHIMA) recently released a 17-step cybersecurity plan.

Cyber attacks against the healthcare industry are growing at an accelerated pace, and to help healthcare organizations strengthen their cybersecurity programs and defend against a cyber attack, the American Health Information Management Association (AHIMA) recently released a 17-step cybersecurity plan.

AHIMA notes that Information governance (IG)—the development of an organization-wide framework for managing information throughout its lifecycle and supporting the organization’s strategy, operations, regulatory, legal, risk and environmental requirements—is a critical organizational initiative that healthcare organizations must embrace in order to thrive in the environment of cyber threats and attacks in healthcare today. Once information governance program is created and implemented, a cybersecurity plan needs to be reviewed at least quarterly to ensure the organization is taking the necessary steps to prevent or detect an attack.

The 17 steps that ANIMA recommends as part of a complete cybersecurity plan are:

  1. Conduct a risk analysis of all applications and systems
  2. Recognize record retention as a cybersecurity issue
  3. Patch vulnerable systems
  4. Deploy advanced security endpoint solutions that provide more effective protections than standard antivirus tools
  5. Encrypt the following: workstations (high-risk) and laptops; smartphones and tablets; portable media and backup tapes (if tapes are still being used)
  6. Improve identity and access management
  7. Refine web filtering (blocking bad traffic)
  8. Implement mobile device management (MDM)
  9. Develop incident response capability
  10. Monitor audit logs to select systems
  11. Leverage existing security tools like Intrusion Prevention System/Intrusion Detection System (IPS/IDS) to detect unauthorized activities
  12. Evaluate business associates
  13. Improve tools and conduct an internal phishing campaign
  14. Hire an outside security firm to conduct technical and non-technical evaluations
  15. Prepare a “State of the Union” type presentation for an organization’s leaders on cybersecurity
  16. Apply a “Defense in Depth” strategy
  17. Detecting and preventing intrusion

Sponsored Recommendations

How Digital Co-Pilots for patients help navigate care journeys to lower costs, increase profits, and improve patient outcomes

Discover how digital care journey platforms act as 'co-pilots' for patients, improving outcomes and reducing costs, while boosting profitability and patient satisfaction in this...

5 Strategies to Enhance Population Health with the ACG System

Explore five key ACG System features designed to amplify your population health program. Learn how to apply insights for targeted, effective care, improve overall health outcomes...

A 4-step plan for denial prevention

Denial prevention is a top priority in today’s revenue cycle. It’s also one area where most organizations fall behind. The good news? The technology and tactics to prevent denials...

Healthcare Industry Predictions 2024 and Beyond

The next five years are all about mastering generative AI — is the healthcare industry ready?