scispace - formally typeset
Proceedings ArticleDOI

Cybersecurity in Medical Private Practice: Results of a Survey in Audiology

Josiah Dykstra, +2 more
- pp 169-176
Reads0
Chats0
TLDR
A survey of 131 clinical audiologists found that only 9.9% reported at least one data breach in 2019, significantly less than the average for small businesses and health care providers, and only 24.4% reported having cyber insurance as mentioned in this paper.
Abstract
Despite well-documented cyber threats to patients' protected health information (PHI), sparse evidence exists about the state of cybersecurity behavior of health care workers and medical private practices. There is evidence of insecure behavior in hospital settings, even though specific insights about private practice are still absent. In addition to mandatory standards for securing PHI, such as the Health Insurance Portability & Accountability Act (HIPAA), small business viability and their patients' security and privacy are critically dependent upon technology availability and reliability. In this survey of 131 clinical audiologists we show that many lack time, staff expertise, or funds to deploy adequate cybersecurity that prevents and mitigates threats to security and privacy. We find widespread deployment of HIPAA-compliant cybersecurity, including antivirus software and individual logins. Only 9.9% of participants reported at least one data breach in 2019, significantly less than the average for small businesses and health care providers, and only 24.4% reported having cyber insurance. Practice owners view patient data as well protected and unlikely victims for cyber attacks and breaches. These results have important implications for cybersecurity products and services, and to medical professionals who must acknowledge the acute importance of cybersecurity in securing protected health information and mitigating risks. Small business private practice health care providers who are particularly sensitive to the impacts of cyber attacks and must prioritize and adopt countermeasures that decrease the risks to patients and their own businesses.

read more

Citations
More filters
Journal ArticleDOI

For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.

TL;DR: In this article , the authors investigate if breach type and location are associated with business type, and if so, investigate how these factors affect information systems and protected health information in for-profit versus non-profit organizations.
Journal ArticleDOI

SoK: Analysis of User-Centered Studies Focusing on Healthcare Privacy & Security

TL;DR: In this paper , the authors systematically reviewed 26 research papers in this domain to explore the existing user studies in healthcare privacy and security, and conducted a card-sorting exercise, allowing them to identify 12 themes integral to this subject such as"Data Sharing,""Risk Awareness,"and"Privacy."
Journal ArticleDOI

Privacy and Security of Telehealth Services

TL;DR: In this paper , the authors discuss how current healthcare process designs and provider workflows associated with the use of telehealth technologies impact the security and privacy of patients' protected health information.
References
More filters
Proceedings ArticleDOI

The compliance budget: managing security behaviour in organisations

TL;DR: A new paradigm -- the Compliance Budget -- is presented as a means of understanding how individuals perceive the costs and benefits of compliance with organisational security goals, and a range of approaches that security managers can use to influence employee's perceptions are identified.
Proceedings ArticleDOI

Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat

TL;DR: The findings suggest that once a user needs to manage a larger number of passwords, they cope by partially and exactly reusing passwords across most of their accounts.
Journal ArticleDOI

Cybersecurity in Hospitals: A Systematic, Organizational Perspective

TL;DR: To enhance cybersecurity capabilities at hospitals, the main focus of chief information officers and chief information security officers should be on reducing end point complexity and improving internal stakeholder alignment.
Journal Article

Security Fatigue

TL;DR: The authors found that the security fatigue users experience contributes to their cost-benefit analyses in how to incorporate security practices and reinforces their ideas of lack of benefit for following security advice.
Journal ArticleDOI

The cost of HIPAA compliance.

TL;DR: The deadline for compliance with the regulations for patient privacy in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is now upon us, and hospitals and physician groups are being urged to comply.
Related Papers (5)