{"id":9544,"date":"2016-06-08T00:00:00","date_gmt":"2016-06-08T00:00:00","guid":{"rendered":"uncategorized\/protect-patient-data-and-trust-the-harmful-consequence-of-a-data-breach\/"},"modified":"2020-07-29T15:25:10","modified_gmt":"2020-07-29T15:25:10","slug":"protect-patient-data-trust-harmful-consequence-data-breach","status":"publish","type":"post","link":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/","title":{"rendered":"Protect Patient Data and Trust- The Harmful Consequence of a Data Breach"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-2574 size-medium alignleft\" title=\"The Harmful Consequences of a Data Breach\" src=\"wp-content\/uploads\/keyboard-895556_1920-300x169.jpg\" alt=\"The Harmful Consequences of a Data Breach\" width=\"300\" height=\"169\" \/>Healthcare providers are required to follow the Health Insurance Portability and Accountability Act (HIPAA) rules to offer protection of patient health information; however, in last year alone, millions of patient records have been left vulnerable because of the more than <a title=\"7 Largest Data Breaches of 2015\" href=\"http:\/\/www.healthcareitnews.com\/news\/7-largest-data-breaches-2015\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">720 healthcare-related data breache<\/a>s. Such attacks, like a data breach, have a long-lasting impact, not only on the patients whose sensitive medical information has been compromised, but on many other individuals who no longer are willing trust their own private information in the hands of the organization affected. As our world continues to become more and more interconnected, <a title=\"Cyber Security Protection: Has Your Data Been Hacked?\" href=\"articles\/cyber-security-protection\/\">cyber security<\/a> has never been more important. Just look at these staggering data breach stats:<\/p>\n<h2>Staggering Data Breach Stats<\/h2>\n<ul>\n<li>According to <a title=\"What a Difference a Year Makes\" href=\"https:\/\/pages.bitglass.com\/Healthcare-Breach-Report-2016.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Bitglass\u2019 2016 Healthcare Breach Report<\/a>, 1 in 3 Americans were victims of healthcare data breaches, attributed to a series of large-scale attacks that each affected more than 10 million individuals.<\/li>\n<li>Among the most significant findings of the report was that in 2015, 98 percent of record leaks were due to large-scale breaches.<\/li>\n<li>This is an 80% increase in data breach hacks making it clear that hackers are targeting the healthcare industry.<\/li>\n<li>Over 60% <a title=\"Concern About Security and Privacy\" href=\"http:\/\/www.ncbi.nlm.nih.gov\/pubmed\/23975624\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">worry about the possibility of a data breach<\/a> when their patient information was being transferred by fax or electronically.<\/li>\n<li>Because of this worry, 12% withhold important medical information from doctors leading to serious consequences such as a misdiagnosis of medical conditions, unnecessary tests and prescribed medications.<\/li>\n<\/ul>\n<p><em>According to the <a title=\"Guide to Privacy and Security Of Electronic Health Information\" href=\"https:\/\/www.healthit.gov\/sites\/default\/files\/pdf\/privacy\/privacy-and-security-guide.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Office of the National Coordinator of Health Information Technology<\/a>, \u201cIf your patients lack trust in Electronic Health Records (EHRs) and Health Information Exchanges (HIEs), feeling that the confidentiality and accuracy of their electronic health information is at risk, they may not want to disclose health information to you. Withholding their health information could have life-threatening consequences.\u201d<\/em><\/p>\n<h2>Protected Health Information is the Target for Data Breach<\/h2>\n<p>Protected health information (PHI) \u2014 which includes sensitive information such as Social Security numbers, medical record data, genders, marital status, addresses, phone numbers, insurance information and dates of birth \u2014all has big value on the black market. The <a title=\"Security Intelligence\" href=\"https:\/\/securityintelligence.com\/cost-of-a-data-breach-2015\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Ponemon Institute<\/a> recently reported on the cost of breaches and found the average cost per stolen record to average $154. For healthcare organizations, however, that number skyrockets to a lofty $363 on average.<\/p>\n<p>HIPAA has the legislation (<a title=\"Health Insurance Portability and Accountability Act\" href=\"https:\/\/en.wikipedia.org\/wiki\/Health_Insurance_Portability_and_Accountability_Act\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">passed in 1996<\/a>) designed to protect patients against loss, theft or disclosure of their sensitive medical information, but despite these painful lessons, the fines and penalties don\u2019t appear to be having a discernible effect on either patient privacy or data security. When it comes to the safety of your organization (and patient information) it\u2019s best to be proactive with strong cyber security protection.<\/p>\n<h2>Protection from a Data Breach with Lexodant Solar TechnologyCyber Security<\/h2>\n<p>Keeping data secure is an important step to maintaining patient trust. Our priority is protecting your organization from a data breach. Lexodant Solar Technologyhas the experience and knowledge to protect your network from becoming compromised. From IT gap analysis, IT, strategic and technical consulting, we are able to determine the best methods of protecting your company site from hackers. <a title=\"Contact Lexodant Solar Technology\" href=\"contact-kmb\/\">Contact us<\/a> today to get started!<\/p>\n","protected":false},"excerpt":{"rendered":"Healthcare providers are required to follow the Health Insurance Portability and Accountability Act (HIPAA) rules to offer protection of patient health information; however, in last year alone, millions of patient [&hellip;]","protected":false},"author":1,"featured_media":9545,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[16],"tags":[158,476,477,478,479,480,481,482,483],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Harmful Consequence of a Data Breach | Lexodant Solar Technology<\/title>\n<meta name=\"description\" content=\"Don&#039;t lose your clients&#039; trust because of a data breach in your system. Protect their personal information, like it was your own, with Lexodant Solar Technologycyber security.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Harmful Consequence of a Data Breach | Lexodant Solar Technology\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t lose your clients&#039; trust because of a data breach in your system. Protect their personal information, like it was your own, with Lexodant Solar Technologycyber security.\u00a0\" \/>\n<meta property=\"og:url\" content=\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Lexodant Solar Technology\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-08T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-29T15:25:10+00:00\" \/>\n<meta property=\"og:image\" content=\"wp-content\/uploads\/keyboard-895556_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1082\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cmdsonline\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cmdsonline\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/#article\",\"isPartOf\":{\"@id\":\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/\"},\"author\":{\"name\":\"cmdsonline\",\"@id\":\"schema\/person\/8933ab0b94a695efa9c683e177bb1146\"},\"headline\":\"Protect Patient Data and Trust- The Harmful Consequence of a Data Breach\",\"datePublished\":\"2016-06-08T00:00:00+00:00\",\"dateModified\":\"2020-07-29T15:25:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/\"},\"wordCount\":517,\"publisher\":{\"@id\":\"#organization\"},\"keywords\":[\"Cyber Security\",\"Data Breach\",\"Health Insurance Portability and Accountability Act\",\"HIPAA Rules\",\"Protect Organization from Data Breach\",\"Protected Health Information\",\"Protection of Patient Health Information\",\"Secure Data\",\"Staggering Data Breach Stats\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/\",\"url\":\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/\",\"name\":\"The Harmful Consequence of a Data Breach | Lexodant Solar Technology\",\"isPartOf\":{\"@id\":\"#website\"},\"datePublished\":\"2016-06-08T00:00:00+00:00\",\"dateModified\":\"2020-07-29T15:25:10+00:00\",\"description\":\"Don't lose your clients' trust because of a data breach in your system. Protect their personal information, like it was your own, with Lexodant Solar Technologycyber security.\u00a0\",\"breadcrumb\":{\"@id\":\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"news\/protect-patient-data-trust-harmful-consequence-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Patient Data and Trust- The Harmful Consequence of a Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"#website\",\"url\":\""name\":\"Lexodant Solar Technology\",\"description\":\"Responsive Engineering | Proven Results\",\"publisher\":{\"@id\":\"#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"#organization\",\"name\":\"Lexodant Solar Technology\",\"url\":\""logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"schema\/logo\/image\/\",\"url\":\"wp-content\/uploads\/kmb-logo-color.png\",\"contentUrl\":\"wp-content\/uploads\/kmb-logo-color.png\",\"width\":290,\"height\":173,\"caption\":\"Lexodant Solar Technology\"},\"image\":{\"@id\":\"schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"schema\/person\/8933ab0b94a695efa9c683e177bb1146\",\"name\":\"cmdsonline\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Harmful Consequence of a Data Breach | Lexodant Solar Technology","description":"Don't lose your clients' trust because of a data breach in your system. Protect their personal information, like it was your own, with Lexodant Solar Technologycyber security.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"The Harmful Consequence of a Data Breach | Lexodant Solar Technology","og_description":"Don't lose your clients' trust because of a data breach in your system. Protect their personal information, like it was your own, with Lexodant Solar Technologycyber security.\u00a0","og_url":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/","og_site_name":"Lexodant Solar Technology","article_published_time":"2016-06-08T00:00:00+00:00","article_modified_time":"2020-07-29T15:25:10+00:00","og_image":[{"width":1920,"height":1082,"url":"wp-content\/uploads\/keyboard-895556_1920.jpg","type":"image\/jpeg"}],"author":"cmdsonline","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cmdsonline","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/#article","isPartOf":{"@id":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/"},"author":{"name":"cmdsonline","@id":"schema\/person\/8933ab0b94a695efa9c683e177bb1146"},"headline":"Protect Patient Data and Trust- The Harmful Consequence of a Data Breach","datePublished":"2016-06-08T00:00:00+00:00","dateModified":"2020-07-29T15:25:10+00:00","mainEntityOfPage":{"@id":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/"},"wordCount":517,"publisher":{"@id":"#organization"},"keywords":["Cyber Security","Data Breach","Health Insurance Portability and Accountability Act","HIPAA Rules","Protect Organization from Data Breach","Protected Health Information","Protection of Patient Health Information","Secure Data","Staggering Data Breach Stats"],"articleSection":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/","url":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/","name":"The Harmful Consequence of a Data Breach | Lexodant Solar Technology","isPartOf":{"@id":"#website"},"datePublished":"2016-06-08T00:00:00+00:00","dateModified":"2020-07-29T15:25:10+00:00","description":"Don't lose your clients' trust because of a data breach in your system. Protect their personal information, like it was your own, with Lexodant Solar Technologycyber security.\u00a0","breadcrumb":{"@id":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["news\/protect-patient-data-trust-harmful-consequence-data-breach\/"]}]},{"@type":"BreadcrumbList","@id":"news\/protect-patient-data-trust-harmful-consequence-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":""},{"@type":"ListItem","position":2,"name":"Protect Patient Data and Trust- The Harmful Consequence of a Data Breach"}]},{"@type":"WebSite","@id":"#website","url":"","name":"Lexodant Solar Technology","description":"Responsive Engineering | Proven Results","publisher":{"@id":"#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"#organization","name":"Lexodant Solar Technology","url":"","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"schema\/logo\/image\/","url":"wp-content\/uploads\/kmb-logo-color.png","contentUrl":"wp-content\/uploads\/kmb-logo-color.png","width":290,"height":173,"caption":"Lexodant Solar Technology"},"image":{"@id":"schema\/logo\/image\/"}},{"@type":"Person","@id":"schema\/person\/8933ab0b94a695efa9c683e177bb1146","name":"cmdsonline"}]}},"_links":{"self":[{"href":"wp-json\/wp\/v2\/posts\/9544"}],"collection":[{"href":"wp-json\/wp\/v2\/posts"}],"about":[{"href":"wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"wp-json\/wp\/v2\/comments?post=9544"}],"version-history":[{"count":0,"href":"wp-json\/wp\/v2\/posts\/9544\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"wp-json\/wp\/v2\/media\/9545"}],"wp:attachment":[{"href":"wp-json\/wp\/v2\/media?parent=9544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"wp-json\/wp\/v2\/categories?post=9544"},{"taxonomy":"post_tag","embeddable":true,"href":"wp-json\/wp\/v2\/tags?post=9544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}