Skip to main content
Best Practices

HIPAA Data Breaches: Bad Technology or Bad Training?

As regular readers of the qliqSOFT blog are now aware, the HIPAA Omnibus changes have been in effect for just over two weeks. In the wake of the September 23 compliance deadline, HIPAA compliance should be on the minds of most covered entities even more than usual, and rightfully so – HIPAA data breaches not only sacrifice the trust you’ve established with your patients, but also they’re extraordinarily expensive.

3 min read
hipaa data breaches|securing your healthcare organization from HIPAA data breaches

As regular readers of the qliqSOFT blog are now aware, the HIPAA Omnibus changes have been in effect for just over two weeks. In the wake of the September 23 compliance deadline, HIPAA compliance should be on the minds of most covered entities even more than usual, and rightfully so – HIPAA data breaches not only sacrifice the trust you’ve established with your patients, but also they’re extraordinarily expensive.

Healthcare Security IT Breaches

Understanding where the risk of breaches is the greatest is the most important step in risk analysis. To that end, Software Advice recently conducted an analysis of breach data. Software Advice, a company that reviews and writes buyer’s guides for web-based medical software, regularly talks to and hears concerns from medical practices. One of those concerns is security: can web-based systems really keep data safe?It’s a valid concern. Entrusting your PHI to “the cloud” or the Internet for safekeeping can feel risky, since you’re storing data “out there” instead of on your own servers. But the analysis Software Advice conducted suggests that the internet is not the biggest threat to PHI. Rather, it’s the people who use the technology themselves.

securing your healthcare organization from HIPAA data breaches

Most Breaches are from PHI

Of all the reported breaches that impact 500 or more individuals, Software Advice found that only eight percent involved hacking. The vast majority of these breaches involved the theft, loss, orunauthorized disclosure of PHI. And the breached data was most commonly found on paper or unencrypted digital devices.What does this mean? First of all, theft is the biggest risk. Although you can never eliminate the risk of theft completely, there are practical measures you can take to mitigate the risk. For starters, avoid keeping documents or devices containing PHI in unsecured locations. That may sound like a no-brainer, but stolen sensitive documentation from the back of a parked car led to two of the five biggest breaches in history, affecting 4.9 and 1.7 million individuals respectively.

Encrypted Security Protection for Healthcare

A further step would be to avoid paper altogether. Not using paper means there’s no physical document to steal. Then, of course, you’d need to encrypt the digital devices you used instead.  A laptop can be stolen just like a paper file. The difference is that proper encryption measures can make the data on the laptop inaccessible if stolen.Loss is another category that you can take action to avoid. Again, some loss may be inevitable – but loss is usually within your control (or your employees’ control). Many organizations involved in loss-related breaches noted undergoing extensive employee training in the wake of a breach. But why wait? You should regularly and thoroughly train anyone dealing with PHI before a breach ever happens. That way everyone is on the same page when it comes to how important the safeguarding of PHI is to your organization.

Security Throughout your Entire Healthcare Organization

The same goes for unauthorized access or disclosure. This category is entirely in the hands of you and your employees. Make sure your employees know (reinforcing through regular training) the boundaries of information that can be accessed and shared. For example, curiosity about a patient is not a valid reason to access that patient’s record. And a juicy medical story is not a valid reason to share someone’s personal health information with a friend.Health IT has given us enough empirical evidence by now to show us that the human element places PHI more at risk than the technology itself. By addressing this head on through rigorous training, covered entities can dramatically decrease their risk of suffering the dreaded data breach.

Frequently Asked Questions

Find answers to common questions about this topic.

Only 8% of reported breaches affecting 500+ individuals involve hacking. The vast majority are caused by theft, loss, or unauthorized disclosure of PHI by people, making human error the primary risk factor.

Implement regular employee training on PHI handling, avoid storing documents in unsecured locations, and use encrypted digital devices instead of paper records. Training staff on proper access boundaries and disclosure policies is crucial for prevention.

Encryption makes data on stolen digital devices inaccessible to unauthorized users. While a laptop can be stolen like a paper file, proper encryption ensures the PHI remains protected even if the device is compromised.

Unauthorized access includes accessing patient records out of curiosity rather than legitimate medical need, or sharing medical information with friends or unauthorized parties. Employees should only access PHI necessary for their job functions.

Data shows that internet-based systems are not the biggest threat to PHI security. The analysis reveals that human factors like theft, loss, and unauthorized disclosure pose greater risks than technology vulnerabilities in cloud systems.

Krishna Kurapati

Written by

Krishna Kurapati

Founder & CEO

Founder & CEO of QliqSOFT with 20+ years of healthcare technology experience.

View all posts

Related Articles

wellpoint hipaa breach alert|wellpoint hipaa breach settlement
Best Practices

HIPAA Breach Alert: WellPoint fined $1.7M

In what is believed to be one of the larger HIPAA breach settlements in recent memory, health insurer WellPoint has agreed to settle with HHS for $1.7M stemming from a 2009 and 2010 incident where WellPoint impermissibly disclosed the ePHI of over 600,000 individuals through an unsecured online application. During its investigation, OCR found that WellPoint had not enacted the appropriate administrative, technical, and physical safeguards mandated under HIPAA.

Krishna KurapatiKrishna Kurapati
1 min read
hipaa omnibus changes|hipaa omnibus changes for healthcare security
Best Practices

HIPAA Omnibus Changes – Just One Week Left

One week. That’s all that remains between now and September 23rd, the date at which the HIPAA Omnibus regulations go into effect. Covered entities under the law should have already completed most of the long-term compliance work under regulations – e.g., updating their Business Associate Agreements, revising their Notices of Privacy. Practices, completing a detailed risk assessment – but the biggest change that goes into effect in seven days is the shift in a presumption in what constitutes a breach.

Krishna KurapatiKrishna Kurapati
2 min read
sms hipaa compliance|is sms hipaa compliant
Best Practices

Is SMS Texting HIPAA Compliant?

Over the last 4 months I have given close to 200 demos of our secure messaging application, qliqConnect, to a variety of organizations, ranging from solo practices to large health systems... and just about everything in between. While our primary objective is to help healthcare professionals communicate securely and efficiently, there is no denying that the “SMS problem” is at the forefront of the compliance consciousness.

Krishna KurapatiKrishna Kurapati
2 min read
3m left