Patient health information security is top priority for organizations, and with good reason. Recent data shows that health care experiences twice the number of cyber attacks as any other industry. Health data security is constantly evolving as patients and staff require access via mobile devices, while more traditional IT environments such as on-premise servers are now high-priority targets for malicious actors hoping to steal medical records and/or blackmail companies for access to their information. Enhance your security strategy to address your changing working environment and risk profile due to COVID-19, especially with the increase of virtual doctor appointments, telehealth, and telemedicine. As many are working from home and practicing social distancing to protect our physical health, we increased the risk to our data health. At HALOCK, we’ve put in the time and effort to create health record security solutions capable of both meeting current needs and growing with your organization to provide long-term support. Here’s how we can help.  

We have a long standing relationship with HALOCK in this area. Assessments are performed flawlessly with meaningful results.”

– Nationally Ranked Pediatric Hospital


healthcare syringe cyber security

The Health Care Trifecta: Complexity, Compliance and Cybercrime

There’s a reason health care companies face more cyber attacks than those in other industries: The sheer amount of data contained in medical records far outstrips information collected by retail, legal or financial institutions. These records often include personal information, medical histories, prescriptions, credit card data, and information about next-of-kin or other family members. Thus, when it comes to medical records security, health care businesses face the triple threat of complexity, compliance and cyber crime. Rapidly increasing data volumes from multiple sources grows infosec complexity, while government agencies and standards organizations create new compliance regulations require reasonable security controls based on mission, objectives, and obligations. Cyber criminals, meanwhile, are leveraging historic weaknesses and developing new threats to compromise patient health information security.  

cyber security heart monitor

HALOCK does good work.

– Healthcare Association


What We Do

HALOCK’s team of industry experts has developed a range of security services to help your health care organization better manage current issues and prepare for new attacks, including:

    • HIPAA and PCI Compliance: Compliance regulations such as HIPAA are critical to ensure medical records security meets government standards. With the evolution of physician and patient visits through interactive medicine through video conference apps and software making checkups more convenient, it has also surfaced new vulnerabilities for ePHI, sensitive data, and private information. Understand the HIPAA compliance requirements as it pertains to your healthcare organization. PCI compliance for health care is also essential. With the scope of health industry services rapidly expanding, many companies now store and retain at least some credit data, making them subject to PCI DSS requirements. It is a good time to review your PCI compliance in preparation for the new PCI DSS v4.0. HALOCK can help identify and satisfy key compliance obligations.
    • Risk Management Program: The massive volume of potential health care security issues means you need to spend InfoSec budgets wisely to ensure maximum impact and minimum disruption. Our experts have the industry knowledge you need to prioritize and optimize security investments while keeping you compliant. An ongoing risk management program provides continuous maintenance and insight on your risk profile and how to enhance your security.
    • Penetration Testing: As health care IT grows more complex, companies increasingly rely on third-party and open-source solutions to streamline deployments and infrastructure. Penetration testing from HALOCK helps identify potential vulnerabilities and deploy remediation strategies before cyber attackers compromise your network. Before launching a new telemedicine app, validate it is secure to handle private data. If you have changes on your network or are integrating systems with a recent acquisition, test your changing environment. Consider a Recurring Penetration Testing program to assess your safeguards throughout the year for a proactive security approach.
    • Health Care Incident Response: Should you experience a breach, HALOCK has the tools and expertise you need to quickly recover after a security incident and track the problem to its source. HALOCK’s incident response management, process, and planning provide comprehensive coverage in the event of a security breach. How your team responds, and how quickly they can can minimize risk and impact of a cyber attack. Explore an ongoing program that gets in front of any potential threats or attacks. You can be response ready with an Incident Response Readiness as a Service (IRRaaS) program.
    • Third Party Risk Management (TPRM)/Vendor Risk Management: Ensure your health care third-party partners are aligned with your organization’s risk controls. Vendors and contractors serve as an extension of your group. They represent you and should operate under your business requirements. Assess your business associates (BA) are compliant and managing your data properly and securely.  A required best practice is to always conduct a supplier risk assessment to keep your vendors on point with your security posture. HALOCK can help build and maintain a specific program for your healthcare environment. 
    • Risk Assessments: Health care regulations require your safeguards be reasonable to your organization, patients, and partners. With many frameworks available, how do you establish your acceptable risk? Do you know the best risk management strategy for you?  HALOCK guides you through a proper HIPAA Risk Assessment. The Duty of Care Risk Assessment (DoCRA) helps you define a reasonable security strategy factoring in compliance and safeguards based on your specific facility, objectives, and social responsibility.  
    • Privacy CCPA is the most sweeping legislation to date in the U.S. that concerns the protection of personal information.  It broadens the definition of what constitutes personal information and gives California citizens greater control over what companies can do with their personal data.  This includes the right to exempt their own personal information from being shared or purchased on the open market. Understand the impact this change and other states’ requirements have on your organization. Know what private information you manage and where it is located to properly secure. Conduct sensitive data scanning to ensure you have a current data inventory of sensitive information.
    • Legal Advisory: Get the proper support for your legal team when addressing a security incident or litigation. See how we can partner with you in this engagement example of post-breach risk assessment for a university health system. 
    • Cyber Security Awareness Training – With many employees now working remotely, they are targets for hackers. Ensure they understand the potential threats they may experience and best practices to prevent cyber attacks. Security Awareness training will provide guidance on how to detect suspicious activity and what to do in the event of a security incident.
    • Security Engineering & Tools: Ensure you have the proper infrastructure security controls to defend sensitive data of your medical staff, patients, payers, providers, and more.  Proactively assess common threats to the healthcare industry through the HALOCK Industry Threat (HIT) Index to best prepare. Conduct security architecture reviews, sensitive data scanning, and implement threat monitoring programs to proactively secure against cyber threats. A consistent and steady review of your threat landscape is a best practice for your industry through a managed detection and response program (MDR) or Threat Hunting Program.


Blue Cyber Security Medication

Why HALOCK for Health Care?

HALOCK and the health care industry share common ground — purpose-driven results. For health care, this means designing treatment options that target root causes and solve underlying issues. At HALOCK, our purpose-driven security mandate means delivering optimal security in the right place at the right time to boost overall health data security without causing unintended side effects to productivity. When you require reasonable safeguards for health care information security,  talk to HALOCK.  

Blue Case Study PCI Compliance
CASE STUDY: Research University

Develop a reasonable security strategy to address your changing working environment and risk profile due to COVID-19. HALOCK is a trusted cyber security consulting firm, compliance, and penetration testing company headquartered in Schaumburg, IL in the Chicago area servicing clients with reasonable security strategies throughout the United States.



Reasonable Security is Now Defined

The Sedona Conference – an influential think tank that advices attorneys, regulators, and judges on challenging technical matters – just released its Commentary on a Reasonable Security Test. The Commentary is the first document of its kind that provides the legal community with a clear definition of a “reasonable” security control.

HALOCK’s Chris Cronin was a co-author of Commentary on a Reasonable Security Test. To learn how to apply the test, contact us.