PHI Security: The Role of Encryption and Tokenization
Encryption and tokenization can play critical roles in preventing breaches. A recent survey conducted by HealthcareInfoSecurity confirms that the healthcare sector still has a long way to go in implementing these technologies. According to this survey, one of the top data protection steps organizations plan to take in the year ahead include encryption of all mobile device and removable media and implementing encryption for all end-user devices and over data transmissions. The survey shows that less than 50 percent of organizations currently apply encryption to all mobile devices and storage media, including backup tapes.
Despite the fact that so many of the breaches reported to Department of Health and Human Services (HHS) involve lost or stolen unencrypted mobile gear, the survey found that only half of organizations are requiring encryption on portable media, and even fewer organizations are encrypting data that's stored on or transmitted from mobile computing devices.
Listen to industry experts on a range of PHI data protection topics, including:
- Shared responsibility, vendor management and downstream compliance;
- Asset and data inventory;
- Minimizing and protecting sensitive ePHI;
- Framework adoption;
- Safe harbor through encryption, tokenization and data de-identification.
...and much more in the full webinar.