Athreon is a market leader for audio to text transcription and employee cyber security training for multiple industries. Request your free trial!
  • Company
    • Overview
    • Mission & Vision
    • Outsourcing
    • Diversity Equity & Inclusion
    • Testimonials
    • Support
    • Contact us
  • Solutions
    • AI Machine Learning
    • Business
      • Business Overview
      • Speech Recognition
      • Human Transcription
        • How It Works
        • Quality
        • Turnaround Time
        • Value
    • Cybersecurity
      • Cybersecurity Overview
      • Dark Web
      • HIPAA Consulting
      • Phishing Simulations
      • Predictive Analytics
      • Security Awareness Training
      • Security Policy Development
      • Security Risk Assessment
    • Finance
      • Finance Overview
    • Healthcare
      • Healthcare Overview
      • Medical Specialties
        • A-O
          • Allergy and Immunology
          • Cardiology
          • Chiropractic
          • Dermatology
          • Family Medicine
          • Gastroenterology
          • Genetics
          • Hospice and Palliative Care
          • Independent Medical Exams
          • Infectious Disease
          • Internal Medicine
          • Nephrology
          • Neurology
          • OB/GYN
          • Oncology
          • Ophthalmology
          • Orthopaedic
        • P-Z
          • Pain Management
          • Pathology
          • Pediatrics
          • Plastic Surgery
          • Podiatry
          • Psychiatry
          • Psychology
          • Pulmonology
          • Radiology
          • Sports Medicine
          • Surgery
          • Urology
      • Speech Recognition
        • Front End
        • Back End
      • Human Transcription
        • Trans|IT for Healthcare
        • How It Works
        • Quality
        • Turnaround Time
        • Value
        • Text to Text
      • Virtual Scribing
        • AxiScribe Overview
        • AxiScribe Services
        • AxiScribe Benefits
        • AxiScribe FAQs
      • EHR Support
      • HIPAA Compliance
      • Telehealth
      • MOC
    • Insurance
      • Insurance Overview
      • Speech Recognition
      • Human Transcription
        • How It Works
        • Quality
        • Turnaround Time
        • Value
      • HIPAA Compliance
    • Law Enforcement
      • Law Enforcement Overview
      • Speech Recognition
      • Human Transcription
        • Trans | IT
        • How It Works
        • Quality
        • Turnaround Time
        • Value
      • Translation
      • CJIS Compliance
    • Legal
      • Legal Overview
      • Speech Recognition
      • Human Transcription
        • How It Works
        • Quality
        • Turnaround Time
        • Value
      • Depositions
    • Media
      • Media Overview
      • Speech Recognition
      • Human Transcription
        • How It Works
        • Quality
        • Turnaround Time
        • Value
    • Medico-Legal
      • Medico-Legal Overview
      • Speech Recognition
        • Front End
        • Back End
      • Human Transcription
        • How It Works
        • Quality
        • Turnaround Time
        • Value
      • HIPAA Compliance
    • Research
      • Research Overview
      • Speech Recognition
      • Human Transcription
        • How It Works
        • Quality
        • Turnaround Time
        • Value
      • Interview Transcripts
      • HIPAA Compliance
  • Technology
    • Overview
    • AxiScribe AI
    • Mobile Apps
    • Dictation Capture
      • Dictation Tips
    • System Interfaces
    • Speech Recognition
      • Front End
      • Back End
    • Online Portal
  • Trust
    • Overview
    • Security
    • Privacy
      • Mobile Policy
      • Web Policy
      • Privacy FAQs
    • Compliance
      • HIPAA Compliance
      • CJIS Compliance
      • Security Risk Assessment
  • Apply
    • Overview
    • Telework Opportunities
    • Telework FAQs
    • Apply Here
  • Blog
  • Contact
  • Login
    • InQuiry
    • Axis Online
    • ECN
    • NetScribe
  • Link 1
  • Link 2
  • Link 3
  • Link 4
  • LOG-IN
✕
  • Home
  • Blog Articles
  • Automation
  • Are we playing dice with EMR security?
Law enforcement agencies that emphasize physical and mental health can help their officers get in or stay in shape to meet their jobs' demands and mitigate their stress.
Police Transcription Services Can Help Agencies Emphasize Officer Well-Being
February 19, 2021
Physicians no longer need to train new scribes because professional virtual medical scribe companies handle the training.
Medical Scribes—Are On-site or Virtual Scribes Better?
March 8, 2021
Published by Athreon Corporation on March 3, 2021
Categories
  • Automation
  • Cybersecurity
Tags
Cyber attacks are growing due to unidentified system vulnerabilities. EHR systems are highly complex and can be exploited by technology and human interactions alike.

Cyber attacks are growing due to unidentified system vulnerabilities. EHR systems are highly complex and can be exploited by technology and human interactions alike.

Are we playing dice with EMR security?


EMR security echoes throughout every healthcare IT annual budget forecast, infrastructure planning, and hospital department nationwide. It keeps the technologists on their toes and healthcare industry leaders awake at night. In the advent of cyberattacks getting smarter and strategically more versed day by day, more vulnerabilities are being identified and exploited (see Figure 1). Information Technology and human practice—the how and what we do with personally identifiable information (PII) using technology—are at center stage.


Figure 1: Digital Attack Map


Did you know that every time you’ve gone to see your primary physician or medical specialist that there’s a digital record detailed with what your visit was about and its outcome? This record is known as an EMR (electronic medical record) or EHR (electronic health record)–often referred to interchangeably. It was a revolutionary invention to healthcare because patient information and billing became more centralized and streamlined. In other words, the task of keeping paper records was not only inefficient because it took a lot of time to keep up and store, but it also increased information disparity which information technology has solved. Information is connected now more than ever, and errors are easier to identify. Like all great inventions, there is the unanticipated effect that wasn’t seen coming—the downside of using an EMR is that patient trust remains mixed. The idea of providing personal information handled by at least one human being (or departments of people) you don’t know and technology systems at your doctor’s office or hospital, which you may or may not have access to, challenges human confidence that personal and sensitive information will actually remain completely secure. We start to question computer security and ethics and much more. Patient data is becoming a gold mine for AI research, which is categorized as secondary, and other parties using data to further our understanding of human disease and the future. In this article, we will look at EMR security based on dependability, integrity, and access coupled with countermeasures.


Dependability


Technology dependability means that at any time of the day or night, systems are running as expected 99.9% of the time. Furthermore, every authorized personnel based on his/her/their role may be able to access the system, conduct, and complete transactions on demand. This is critical because data is going through any of the five processes at any given time: transmission, storage, monitoring, algorithmic calculation, and look-ups. If no one can access the system or data isn’t going through the processes which support work continuity at a hospital or medical practice, then there is limited ability to accurately complete a patient encounter and it is now an emergency. The system is down. Data is information. Everything is working around or calling on information.


Athreon’s technology department assesses system dependability and commits to 99.99% up time by going through regular technology audits, continual monitoring, utilizing advanced intelligent software, listening (to systems), enforcing preventative measures, and following company standard protocols to reduce risk and handle downtime events quickly and correctly.


The other facet of dependability is from the patient trust perspective. Often, people don’t trust what they don’t see—or in this case, can’t access. To solve this problem, healthcare organizations have designed their processes and technology to give the access to the patient. However, to what extent patient control can be given will vary and depend. Patients may not be able to alter any information, just view only. This then results in the need to ensure that confidential information is handled right and securely. An empathetic way to look at it is, “Would you protect your information the same way you do mine?”


Integrity and Access


According to Dehling and Sunyaev, integrity requires that information is protected against unauthorized modification or deletion as well as accidental, irrevocable, and undesired changes by authorized users. Data integrity is about maintaining accurate data through consistent processes (in how and who accesses the data as well as how the data is transformed and translated in all technology systems). When data breaches occur, they fall in two types. One being accidental and unintentional, and the other being intentional. For example, a medical professional needs to access and submit a change to an EMR but, in the process, unintentionally accesses more records than he wanted and made a few more changes that he shouldn’t have. He was in a rush to get his task done. This unintentional breach in this example isn’t necessarily about unauthorized access but rather modifying data that now changes everything else downstream. On a nefarious end, another medical professional intentionally breaches the EMR system because they intend to sell personal information in the dark web. How did that happen? He was an employee who won his manager’s confidence very quickly by getting his work done promptly and well. Interestingly, he often pushed to get access to things sooner—and often suggested that protocols were a huge administrative burden that were pointless and not efficient. He’d boast, “Why can’t we just get it done?” Unfortunately, authorization is central to integrity and depending on how sensitive the data is, it will never be instantaneous. Do military and political officials go through background checks in one hour? Hardly.


Athreon upholds integrity in a very robust way, including its system integration efforts. Because trust is central to how technology and its human processes were designed, Athreon offers its clients advanced user management access controls which give clients a clear way of enforcing that everyone has the right access to certain aspects of PII data based on role. Not every role can change data. Some roles are view only. Not every role can extract and download data. Certain roles can authorize. The feature-rich technology offers great complexity in what a user can and cannot do. Likewise, password complexity and administration are rich too and meet the most stringent of audits. Capturing workflow clearly is critical to understand which roles need to do what.


Data Redaction and Cyber Security


Countermeasures designed and implemented to reduce the risk of breaches and handle them expeditiously and correctly will always be a continuous process. When someone or something breaches an EMR system, it endangers EMR security and steals confidentiality. Complex access controls are part of a strong preventative measure to uphold cyber security and trust. Another technology feat Athreon offers is redaction (also referred to as de-identification) on demand. According to NIST, de-identification is a process of concealing data in a certain way so that it reduces linking information revealed in a dataset to specific individuals. This feature is another layer to a robust design that Athreon technology considers to be essential to any strong cyber security policy and program. The less relationships can be determined between data, the better. The pieces of the puzzle for any cyber intruder will remain incomplete. Athreon is also invested in the future, including AI and automatic data redaction, which de-identifies sensitive and personal data (see Figure 2).


Redacted data is not only based on what is seen by the human eye but also what resides in its repositories. And, data also includes metadata which is data about data.

Figure 2: An example of automated data redaction based on recognized personal data.


The Future

Cyber wars and criminal invention will continue. The more interconnected and hyperconnected we are through the internet and our technology devices, the more vulnerabilities we are exposed to—and plenty of data everywhere. EMR security is in a precarious position—it is not just about the right technology but also about the right human processes and controls. Athreon’s expertise not only spans decades in converting speech to text and in technology—it now offers cyber security consulting services. Regardless of industry, if you’d like a one-time complimentary consultation about your business processes, technology designs, and EMR needs–from a current or future perspective–contact us today.

Share
2
Athreon Corporation
Athreon Corporation

Related posts

Explore the benefits of certified and notarized transcriptions for law enforcement agencies. Athreon's CJIS-compliant transcription service delivers both!

Explore the benefits of certified and notarized transcriptions for law enforcement agencies. Athreon's CJIS-compliant transcription service delivers both!

August 1, 2023

Certified vs. Notarized Transcriptions: Navigating Transcription Services for Law Enforcement Agencies


Read more
Learn why HIPAA compliance and cybersecurity training are essential for medical scribes in protecting ePHI. AxiScribe helps you protect your patient data.

Learn why HIPAA compliance and cybersecurity training are essential for medical scribes in protecting ePHI. AxiScribe helps you protect your patient data.

May 16, 2023

Ensuring Patient Data Privacy: The Critical Role of HIPAA Compliance and Cybersecurity Awareness Training for Medical Scribes


Read more
SMiShing, whaling, spear phishing, and more. Do your employees know how to keep your business safe? Athreon's security awareness training can help!

SMiShing, whaling, spear phishing, and more. Do your employees know how to keep your business safe? Athreon's security awareness training can help!

January 31, 2023

The Different Types of Phishing Attacks Your Business Needs to Know About


Read more

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Company

Overview

Mission & Vision

Testimonials

Support

Contact Us

Solutions

Business

Cybersecurity

Healthcare

Insurance

Law Enforcement

Legal

Media

Medico-Legal

Research

Technology

Overview

Mobile Apps

Dictation Capture

System Interfaces

Speech Recognition

Online Portal

Trust

Overview

Security

Privacy

Compliance

Apply

Overview

Telework Opportunities

Telework FAQs

Apply Here

Athreon
Contact Us
Login
Blog
Sitemap


Athreon Corporation, Document Imaging & Storage, Chicago, IL

Have a question? Call us!

800.935.0973

© 1988-2023 Athreon: A Leader Among Speech-to-Text Transcription and Cybersecurity Companies. All Rights Reserved.

      Sales: service@athreon.com

      Support: helpdesk@athreon.com

      Recruitment: recruiter@athreon.com

      Postal Mail: 8888 Keystone Crossing, Suite 1300 Indianapolis, IN 46240

      Telephone: 800-935-0973