SlideShare a Scribd company logo
1 of 2
Download to read offline
H I P A A
S O L U T I O N S
Identify	
  unprotected	
  PHI	
  data	
  on	
  
computers	
  and	
  mobile	
  devices.

66% of breaches include data
stored ‘at rest’ on servers,
laptops and mobile devices.

2009

2010

2011

2012

2013

Data	
  breaches	
  cost	
  the	
  healthcare	
  industry	
  $6	
  billion	
  in	
  2010	
  
and	
  is	
  on	
  the	
  rise

DATA BREACHES
Healthcare	
   organizations	
   are	
   at	
   war	
   with	
   Cyber	
  
Data	
  Thieves	
  in	
  their	
  efforts	
  to	
  reduce	
  the	
  volume	
  
of	
   security	
   incidents	
   related	
   to	
   protected	
   health	
  
information	
   (PHI).	
   The	
   impact	
   of	
   not	
   protecting	
  

patient	
  data	
  is	
  apparent.	
  Recent	
  studies	
  show	
  that	
  
over	
   90%	
   of	
   healthcare	
   organizations	
   have	
  
experienced	
   a	
   data	
   breach	
   within	
   the	
   last	
   2	
   years.	
  
To	
   further	
   complicate	
   the	
   battle	
   against	
   data	
  
crime,	
   the	
   adoption	
   of	
   mobile	
   devices,	
   BYOD	
   and	
  
cloud	
  sharing	
  technologies	
  add	
  fuel	
  to	
  the	
  fire.
HIPAA COMPLIANCE
The	
   HIPAA	
   Security	
   &	
   Privacy	
   Rule	
   includes	
   several	
   safeguards	
   to	
   assure	
   the	
   confidentiality,	
   integrity	
  
and	
   availability	
   of	
   electronic	
   protected	
   health	
   information.	
   iScan	
   Online	
   provides	
   security	
   scanning	
  
solutions	
  to	
  address	
  the	
  Administrative	
  and	
  Technical	
  safeguards.

DATA BREACH SUMMARY

PHI DISCOVERY SCAN

The	
   number	
   of	
   data	
   breaches	
   and	
   security	
  
i n c i d e n t s	
   c o n t i n u e	
   t o	
   r i s e ,	
   w i t h	
   H I PA A	
  
regulations	
   pushing	
   for	
   transparency.	
   All	
   signs	
  
are	
   pointing	
   to	
   2014	
   being	
   a	
   critical	
   year	
   for	
  
organizations	
   to	
   prevent	
   becoming	
   yet	
   another	
  
headline.	
  

S c a n	
   y o u r	
   c o m p u t e r	
   a n d	
   m o b i l e	
   d e v i c e s ,	
  
immediately	
   uncovering	
   unprotected	
   data	
   that	
   is	
  
at	
   risk.	
   We	
   include	
   pre-­‐defined	
   popular	
   data	
  
type	
   discovery	
   for	
   credit	
   card,	
   drivers	
   license,	
  
social	
   security	
   numbers	
   and	
   even	
   can	
   add	
   your	
  
own	
  sensitive	
  data	
  patterns.	
  

Over	
   the	
   past	
   decade	
   we	
   have	
   experienced	
   an	
  
explosion	
   of	
   incidents	
   affecting	
   all	
   sizes	
   of	
  
healthcare	
   organizations.	
   The	
   end	
   of	
   last	
   year	
  
showed	
  no	
  signs	
  of	
  slowing	
  down.	
  
HIPAA	
   safeguards	
   explicitly	
   call	
   out	
   an	
   Audit	
  
Control	
   standard	
   for	
   implementing	
   a	
   solution	
  
that	
  examines	
  information	
  systems	
  containing	
  or	
  
using	
  electronic	
  PHI.	
  
To	
   better	
   prepare	
   for	
   tomorrow’s	
   threat	
   while	
  
aiding	
   in	
   HIPAA	
   compliancy,	
   iScan	
   Online,	
  
1
recently	
   awarded	
   security	
   innovator	
   of	
   the	
   year,	
  
has	
   stepped	
   up	
   to	
   the	
   challenge	
   to	
   proactively	
  
identify	
  and	
  eliminate	
  PHI	
  related	
  incidents.	
  

ISCAN RESPONDS TO HIPAA SAFEGUARDS
iScan	
   Online	
   specializes	
   in	
   the	
   identification	
   of	
  
u n p ro t e c t e d	
   P H I	
   d a t a	
   a n d	
   v u l n e ra b i l i t i e s ,	
  
outlined	
   in	
   the	
   Administrative	
   and	
   Technical	
  
safeguards	
   to	
   mitigate	
   data	
   loss	
   should	
   a	
  
security	
  incident	
  occur.	
  	
  
Here	
   at	
   iScan,	
   we	
   call	
   this	
   Data	
   Discovery	
   and	
  
Vulnerability	
   Scanning.	
   What’s	
   unique	
   is	
   the	
  
fact	
   that	
   we	
   can	
   do	
   this	
   without	
   requiring	
  
hardware	
   or	
   complex	
   software	
   and	
   provide	
  
healthcare	
   organizations	
   to	
   know	
   exactly	
   what	
  
data	
  is	
  at	
  risk	
  within	
  minutes.	
  

!
!
!
!
MOBILE AND BYOD
To d ay,	
   m o s t	
   h e a l t h c a r e	
   o r g a n i z a t i o n s	
   a r e	
  
utilizing	
   smartphones,	
   tablets	
   and	
   computers.	
  
	
  
Don’t	
  dismiss	
  the	
  mobile	
  threat	
  as	
  it	
  is	
  very	
  real.	
  
Mobile	
   risks	
   include	
   traditional	
   vulnerabilities	
  
a n d	
   u n p r o t e c t e d	
   s e n s i t i v e	
   d a t a	
   j u s t	
   a s	
  
traditional	
   computers	
   do.	
   In	
   fact,	
   mobile	
   devices	
  
present	
   new	
   dangers	
   that	
   one	
   might	
   not	
   have	
  
previously	
  anticipated.	
  	
  
iScan	
   Online	
   is	
   the	
   industry’s	
   first	
   security	
  
scanning	
   solution	
   identifying	
   both	
   PHI	
   data	
   and	
  
i t s	
   v u l n e ra b i l i t y	
   p o s t u re	
   s i m p l e ,	
   fa s t	
   a n d	
  
affordable	
   for	
   all	
   of	
   your	
   endpoints	
   including	
  
BYOD.	
  	
  

QUESTION FOR YOU
How	
   important	
   is	
   it	
   for	
   you	
   to	
   know	
   what	
  
u n p r o t e c t e d	
   d a t a	
   i s	
   a t	
   r i s k	
   o n	
   y o u r	
  
computers,	
  laptops	
  and	
  mobile	
  devices?

iScan Online, Inc.!
5600 Tennyson Pkwy, #380!

phishing, malware, hacking and

Plano, TX 75024!

vulnerability exploitation.

19%

19% of breaches include

214-276-1150!
www.iscanonline.com

1. SC Magazine awards iScan Online Industry Innovator of the Year - 2013

More Related Content

More from MAX Risk Intelligence by LOGICnow (7)

Data Breach Risk Intelligence
Data Breach Risk IntelligenceData Breach Risk Intelligence
Data Breach Risk Intelligence
 
iScan Risk Intelligence for Regional Banks
iScan Risk Intelligence for Regional BanksiScan Risk Intelligence for Regional Banks
iScan Risk Intelligence for Regional Banks
 
5 Phrases Every Security Chief Needs to Speak - Business
5 Phrases Every Security Chief Needs to Speak - Business5 Phrases Every Security Chief Needs to Speak - Business
5 Phrases Every Security Chief Needs to Speak - Business
 
Data Breach Risk Intelligence for Higher Education
Data Breach Risk Intelligence for Higher EducationData Breach Risk Intelligence for Higher Education
Data Breach Risk Intelligence for Higher Education
 
5 Data Breach Charts for the Board Room
5 Data Breach Charts for the Board Room5 Data Breach Charts for the Board Room
5 Data Breach Charts for the Board Room
 
BYOD Security Scanning
BYOD Security ScanningBYOD Security Scanning
BYOD Security Scanning
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 

Recently uploaded

WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 

Recently uploaded (20)

WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

iScan Online HIPAA Solutions Brief

  • 1. H I P A A S O L U T I O N S Identify  unprotected  PHI  data  on   computers  and  mobile  devices. 66% of breaches include data stored ‘at rest’ on servers, laptops and mobile devices. 2009 2010 2011 2012 2013 Data  breaches  cost  the  healthcare  industry  $6  billion  in  2010   and  is  on  the  rise DATA BREACHES Healthcare   organizations   are   at   war   with   Cyber   Data  Thieves  in  their  efforts  to  reduce  the  volume   of   security   incidents   related   to   protected   health   information   (PHI).   The   impact   of   not   protecting   patient  data  is  apparent.  Recent  studies  show  that   over   90%   of   healthcare   organizations   have   experienced   a   data   breach   within   the   last   2   years.   To   further   complicate   the   battle   against   data   crime,   the   adoption   of   mobile   devices,   BYOD   and   cloud  sharing  technologies  add  fuel  to  the  fire.
  • 2. HIPAA COMPLIANCE The   HIPAA   Security   &   Privacy   Rule   includes   several   safeguards   to   assure   the   confidentiality,   integrity   and   availability   of   electronic   protected   health   information.   iScan   Online   provides   security   scanning   solutions  to  address  the  Administrative  and  Technical  safeguards. DATA BREACH SUMMARY PHI DISCOVERY SCAN The   number   of   data   breaches   and   security   i n c i d e n t s   c o n t i n u e   t o   r i s e ,   w i t h   H I PA A   regulations   pushing   for   transparency.   All   signs   are   pointing   to   2014   being   a   critical   year   for   organizations   to   prevent   becoming   yet   another   headline.   S c a n   y o u r   c o m p u t e r   a n d   m o b i l e   d e v i c e s ,   immediately   uncovering   unprotected   data   that   is   at   risk.   We   include   pre-­‐defined   popular   data   type   discovery   for   credit   card,   drivers   license,   social   security   numbers   and   even   can   add   your   own  sensitive  data  patterns.   Over   the   past   decade   we   have   experienced   an   explosion   of   incidents   affecting   all   sizes   of   healthcare   organizations.   The   end   of   last   year   showed  no  signs  of  slowing  down.   HIPAA   safeguards   explicitly   call   out   an   Audit   Control   standard   for   implementing   a   solution   that  examines  information  systems  containing  or   using  electronic  PHI.   To   better   prepare   for   tomorrow’s   threat   while   aiding   in   HIPAA   compliancy,   iScan   Online,   1 recently   awarded   security   innovator   of   the   year,   has   stepped   up   to   the   challenge   to   proactively   identify  and  eliminate  PHI  related  incidents.   ISCAN RESPONDS TO HIPAA SAFEGUARDS iScan   Online   specializes   in   the   identification   of   u n p ro t e c t e d   P H I   d a t a   a n d   v u l n e ra b i l i t i e s ,   outlined   in   the   Administrative   and   Technical   safeguards   to   mitigate   data   loss   should   a   security  incident  occur.     Here   at   iScan,   we   call   this   Data   Discovery   and   Vulnerability   Scanning.   What’s   unique   is   the   fact   that   we   can   do   this   without   requiring   hardware   or   complex   software   and   provide   healthcare   organizations   to   know   exactly   what   data  is  at  risk  within  minutes.   ! ! ! ! MOBILE AND BYOD To d ay,   m o s t   h e a l t h c a r e   o r g a n i z a t i o n s   a r e   utilizing   smartphones,   tablets   and   computers.     Don’t  dismiss  the  mobile  threat  as  it  is  very  real.   Mobile   risks   include   traditional   vulnerabilities   a n d   u n p r o t e c t e d   s e n s i t i v e   d a t a   j u s t   a s   traditional   computers   do.   In   fact,   mobile   devices   present   new   dangers   that   one   might   not   have   previously  anticipated.     iScan   Online   is   the   industry’s   first   security   scanning   solution   identifying   both   PHI   data   and   i t s   v u l n e ra b i l i t y   p o s t u re   s i m p l e ,   fa s t   a n d   affordable   for   all   of   your   endpoints   including   BYOD.     QUESTION FOR YOU How   important   is   it   for   you   to   know   what   u n p r o t e c t e d   d a t a   i s   a t   r i s k   o n   y o u r   computers,  laptops  and  mobile  devices? iScan Online, Inc.! 5600 Tennyson Pkwy, #380! phishing, malware, hacking and Plano, TX 75024! vulnerability exploitation. 19% 19% of breaches include 214-276-1150! www.iscanonline.com 1. SC Magazine awards iScan Online Industry Innovator of the Year - 2013