{"id":13404,"date":"2022-08-01T03:59:29","date_gmt":"2022-08-01T03:59:29","guid":{"rendered":"https:\/\/blog.cloudthat.com\/?p=13404"},"modified":"2024-06-25T10:56:35","modified_gmt":"2024-06-25T10:56:35","slug":"how-to-secure-electronic-health-data-on-cloud","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/how-to-secure-electronic-health-data-on-cloud","title":{"rendered":"How to Secure Electronic Health Data on Cloud?"},"content":{"rendered":"<table border=\"0\">\n<tbody>\n<tr>\n<td><span style=\"color: #000080;\"><strong>TABLE OF CONTENT<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>\n<h2><a style=\"margin-left: 20px;\" href=\"#Introduction\">1. Introduction<\/a><\/h2>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h2><a style=\"margin-left: 20px;\" href=\"#What is Electronic Health Record?\">2. What is Electronic Health Record?<\/a><\/h2>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h2><a style=\"margin-left: 20px;\" href=\"#Role of Cloud Computing in the Healthcare Industry\">3. Role of Cloud Computing in the Healthcare Industry<\/a><\/h2>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h2><a style=\"margin-left: 20px;\" href=\"#Threats to Electronic Health Data on the Cloud\">4. Threats to Electronic Health Data on the Cloud<\/a><\/h2>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h2><a style=\"margin-left: 20px;\" href=\"#Preventive Measures\">5. Preventive Measures<\/a><\/h2>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h2><a style=\"margin-left: 20px;\" href=\"#Conclusion\">6. Conclusion<\/a><\/h2>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h2><a style=\"margin-left: 20px;\" href=\"#About CloudThat\">7. About CloudThat<\/a><\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2 id=\"Introduction\">Introduction<\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">According to a report by Markets and Markets&#8217;, the global market for healthcare cloud computing will reach USD 89.4 billion by 2027 from USD 39.4 billion in 2022, at a CAGR of 17.8%.\u00a0<\/span><span style=\"color: #000000;\">The adoption of EHR, mHealth, telehealth, and other IT solutions due to COVID-19 are the main drivers for the growth in the cloud computing healthcare market. The increasing cloud deployment, adoption of big data analytics, cost-effective, scalable, flexible, and efficient data storage and access solutions of cloud computing accelerates the healthcare industry&#8217;s growth. Despite the many benefits of cloud computing, data security and privacy is a major concerns and restrict growth to a certain extent.<\/span><\/p>\n<p><span style=\"color: #000000;\">We will discuss the security breaches for the adoption of the cloud in the healthcare industry and solutions to address these concerns.<\/span><\/p>\n<h2 id=\"What is Electronic Health Record?\">What is Electronic Health Record?<\/h2>\n<p style=\"text-align: left;\">Electronic Health Record (EHR) is patient-centric, digital information that is easily and securely accessible to authorized healthcare providers. EHRs mainly contain a patient\u2019s medical history, diagnosis data, treatment plans, immunization schedules, laboratory reports, allergies, radiology, and medication details. EHRs are implemented under the national health authority, responsible for maintaining patients\u2019 medical and treatment history and providing support to other healthcare services like pharmacies, pathology labs, and insurance agencies.<\/p>\n<p><a href=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture189.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13428\" src=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture189-300x165.png\" alt=\"\" width=\"569\" height=\"313\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Figure 1: A simple Electronic Health Record System<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>(source:<\/strong> <strong>Al Hajeri, Amani. (2011). Electronic Health Records in Primary Care: Are we ready?. Bahrain Medical Bulletin.)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><strong style=\"font-size: 18px;\">Types of Electronic Health Record Systems:<\/strong><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">Based on the medical practitioner\u2019s requirements, there are different ways to configure EHR systems. It is broadly categorized into three types: Physician-hosted, remotely hosted, and Remote Systems, as shown in Figure 2. In physician-hosted systems, patients\u2019 data is hosted on the physician\u2019s own server. The provisioning of hardware and software, their security, and maintenance is the responsibility of the physician itself. It gives fast access to data and is beneficial for larger practices. Whereas in the remotely hosted system, data is stored with a third party, and the practitioner will get access to the information whenever required, eliminating provisioning, maintenance, and security of IT resources. The remote system is further categorized into three: subsidized, dedicated, and cloud. In a subsidized system, the physician involves with an entity like a hospital that subsidizes the cost of the EHR system. This leads to legal issues such as data ownership and trust. A dedicated system is managed by a vendor on dedicated hosts and gives remote access to physicians. Whereas in a cloud-based system, data is stored remotely and accessed over the internet. Physicians can be able to access data anytime from anywhere.<\/span><\/p>\n<p><a href=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture237.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13429\" src=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture237-300x122.png\" alt=\"\" width=\"570\" height=\"232\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Figure 2: Types of EHR Systems<\/strong><\/p>\n<p><span style=\"color: #000000;\">EHR systems are further categorized on type of treatment: inpatient or outpatient. In inpatient treatment, EHR systems integrate data from all the departments within a single hospital, whereas in outpatient treatment, patients visit different physicians, labs, etc., and need to pull data in the EHR system. Figure 3 gives the top five inpatient vendors of inpatient EHR systems.<\/span><\/p>\n<p><a href=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture323.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13430\" src=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture323-300x166.png\" alt=\"\" width=\"569\" height=\"315\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Figure 3: Inpatient\u202fEHR vendor market share.<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>(source:<\/strong> <strong>https:\/\/mobius.md\/2022\/01\/04\/top-5-ehrs-on-the-market-in-2022\/)<\/strong><\/p>\n<p style=\"text-align: left;\"><strong style=\"font-size: 18px;\">Advantages of Electronic Health Records:<\/strong><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">EHRs provide better care to patients by providing:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><strong>Quick and coordinated<\/strong> access to patients\u2019 history<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Up-to-date and accurate information<\/strong> about the patient<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Convenient health care support <\/strong>to the patient<\/span><\/li>\n<li><span style=\"color: #000000;\">Securely <strong>sharing patients\u2019 information<\/strong> with patients, healthcare providers, and researchers.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Reduced cost, improved productivity,<\/strong> and provided <strong>support for legal and correct documentation.<\/strong><\/span><\/li>\n<\/ul>\n<h2 id=\"Role of Cloud Computing in the Healthcare Industry\">Role of Cloud Computing in the Healthcare Industry<\/h2>\n<p><span style=\"color: #000000;\">In the era of cloud computing, anyone can access IT resources and facilities anywhere, anytime with a pay-as-you-go model. Many organizations and businesses have got benefited due to the early adoption of cloud computing. Evolving organizations and industries like healthcare can anticipate a cloud-based model to collaborate, communicate and coordinate among different healthcare providers like hospitals, pathology labs, pharmacists, doctors, nurses, and insurance. This will replace the traditional paper-based healthcare system with an automated computerized cloud healthcare system. During the Covid-19 pandemic, it was observed that digitization of patients&#8217; health records could help in online diagnosis as well as patients get better treatment due to up-to-date records and continuous interaction with healthcare providers. The integration of patient-centric data on the cloud leads to security and privacy concerns for patients and healthcare providers.<\/span><\/p>\n<h2 id=\"Threats to Electronic Health Data on the Cloud\">Threats to Electronic Health Data on the Cloud<\/h2>\n<h2><\/h2>\n<p><span style=\"color: #000000;\">In 2021, the U.S. Department of Health and Human Services traced 618 breaches and cyberattacks affecting at least 500 people. According to IBM, data breach costs increased from USD 3.86 million to USD 4.24 million, which is the highest average total cost in the 17-year history.<\/span><\/p>\n<p><a href=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture419.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13431\" src=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture419-300x115.png\" alt=\"\" width=\"569\" height=\"218\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Figure 4: Healthcare Records breached in the past 12 Months<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>(source: <\/strong><a href=\"https:\/\/www.hipaajournal.com\/april-2022-healthcare-data-breach-report\/\">https:\/\/www.hipaajournal.com\/april-2022-healthcare-data-breach-report\/<\/a><strong>)<\/strong><\/p>\n<p><span style=\"color: #000000;\">According to the HIPAA journal on healthcare data breach, 22 healthcare data breaches were reported in April 2022 that affected 10,000 or more individuals. The number of data breaches reported in April 2022 is comparatively less compared to October 2021.<\/span><\/p>\n<p><span style=\"color: #000000;\">The top 5 threats against Electronic Healthcare Records are Phishing Attacks, Malware &amp; Ransomware Attacks, Encryption Blind Spots, Cloud Threats, and Employees.<\/span><\/p>\n<p><span style=\"color: #000000;\">\u00a0A. Phishing Attacks: It is a type of social engineering attack where an attacker tries to steal credit card and user credentials details by pretending as a trusted authority. An attacker deceives the target to open the email, link, or text message.<\/span><\/p>\n<p><a href=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture515.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13432\" src=\"https:\/\/d1f7lmxeo98xps.cloudfront.net\/resources\/wp-content\/uploads\/2022\/11\/Picture515-300x166.png\" alt=\"\" width=\"533\" height=\"295\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Figure 5: Phishing Attack<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>(source: https:\/\/www.simplilearn.com\/tutorials\/cryptography-tutorial\/what-is-phishing-attack\/)<\/strong><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">B. Malware &amp; Ransomware Attacks: Malware is &#8220;malicious software&#8221; designed to infect or disrupt computers by sending files or code over a network. Malware includes viruses, ransomware, spyware, and other malicious software that gets secretly installed onto your system. Ransomware is one kind of malware that restricts or prevents users from accessing their systems, either by locking users&#8217; files or screening until a ransom is paid to the attacker. Ransomware is further categorized as crypto-ransomware, file encryption, and forcing to pay ransom online to retrieve the decryption key. The ransomware is very much dangerous for hospitals and healthcare providers who store up-to-date data of patients to provide better health care.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">C. Encryption Blind Spots: Encryption techniques are basically designed to protect data, but attackers use encrypted channels to propagate and update the malware. Attackers can be able to use the encrypted blind spot to hide and avoid the detection and execution of malware. It is necessary to strengthen the encryption techniques and control and management of secret keys used in cryptographic operations.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">D. Cloud Threat: The healthcare industries are developed using cloud computing to provide better health care to patients. But along with the benefits of cloud computing, it also increases the security threat associated with it. It is necessary to securely store, access, and share patients&#8217; data among healthcare providers.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">E. Employees: Insider attacks are one of the major concerns in the healthcare industry. Insider threats are caused intentionally by disgruntled employees or intentional. It is recommended to educate and train all healthcare providers, adhere to the principle of least privilege, and incorporate auditing and monitoring controls.<\/span><\/p>\n<h2 id=\"Preventive Measures\">Preventive Measures<\/h2>\n<p><span style=\"color: #000000;\">To protect the EHR system against a phishing attack, educate healthcare providers about the phishing attack, do not open emails, messages, and links received from an unknown entity or suspicious sites, and verify requests before sharing any data. The preventive measures against ransomware attacks include backup your data on a regular basis, performing regular risk assessments, validating firewalls that protect the EHR system network, and providing training to all employees on information security. <\/span><\/p>\n<p><span style=\"color: #000000;\">Healthcare providers should consider common strategies to strengthen the cybersecurity of their EHR systems are:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Evaluate risk associated or operational vulnerability associated with critical health records before an attack.<\/span><\/li>\n<li><span style=\"color: #000000;\">Incorporate multi-factor authentication and use VPN to countermeasure against a ransomware attack.<\/span><\/li>\n<li><span style=\"color: #000000;\">Apply security at each layer so that risk of an attack can be mitigated before it harms the patient&#8217;s confidential data.<\/span><\/li>\n<li><span style=\"color: #000000;\">Use Email security software to mitigate phishing attacks by filtering URLs and attaching a sandbox.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Incorporate proactive practices by hiring Cyber Threat Hunters who will track, detect and prevent potential cyber-attack.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 id=\"Conclusion\">Conclusion<\/h2>\n<p><span style=\"color: #000000;\">Adoption of cloud computing in the <span style=\"color: #000000;\">healthcare<\/span> industry to maintain, store, share, and access patients&#8217; data from various healthcare providers helps physicians to improve patient care. EHR on the cloud gives quick and secure access to data at any time from anywhere to the physician and enables to give online treatment. Despite several benefits of EHR on the cloud, security and privacy of data are major concerns. Here we discussed the security breaches and their corrective measures for EHR on Cloud.<\/span><\/p>\n<h2 id=\"About CloudThat\">About CloudThat<\/h2>\n<p><strong><a href=\"https:\/\/www.cloudthat.com\/\" target=\"_blank\" rel=\"noopener\">CloudThat<\/a>\u00a0is the official AWS (Amazon Web Services) Advanced Consulting Partner and Training partner and Microsoft Gold Partner, helping people develop knowledge on the cloud and help their businesses aim for higher goals using best in industry cloud computing practices and expertise. We are on a mission to build\u00a0a robust\u00a0cloud computing ecosystem by disseminating\u00a0knowledge on technological intricacies within the cloud space.\u00a0Our blogs, webinars,\u00a0case studies, and white papers\u00a0enable all the stakeholders in the cloud computing sphere.<\/strong><\/p>\n<h2 id=\"&quot;About\"><\/h2>\n","protected":false},"author":316,"featured_media":13728,"parent":0,"comment_status":"open","ping_status":"open","template":"","blog_category":[3607,5897,4459],"user_email":"rashmi.d@cloudthat.com","published_by":"324","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/13404"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=13404"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/13404\/revisions"}],"predecessor-version":[{"id":45702,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/13404\/revisions\/45702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=13404"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=13404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}