Secure Cloud Hosting for Healthcare Organizations



Similar documents
Obtaining CSF Certification Lessons Learned and Why Do It

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Sensitive Data Management: Current Trends in HIPAA and HITRUST

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Document Imaging Solutions. The secure exchange of protected health information.

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Nine Network Considerations in the New HIPAA Landscape

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Guided HIPAA Compliance

The Impact of HIPAA and HITECH

Discussion on Network Security & Privacy Liability Exposures and Insurance

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

Managing data security and privacy risk of third-party vendors

Best Practices for DLP Implementation in Healthcare Organizations

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue

What do you need to know?

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

The True Story of Data-At-Rest Encryption & the Cloud

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Anypoint Platform Cloud Security and Compliance. Whitepaper

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Well-Documented Controls Reduce Risk and Support Compliance Initiatives

Achieving Compliance with the PCI Data Security Standard

Cloud Services Overview

SECURETexas Health Information Privacy & Security Certification Program FAQs

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

SOOKASA WHITEPAPER HIPAA COMPLIANCE.

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

BMC s Security Strategy for ITSM in the SaaS Environment

A PCI Journey with Wichita State University

Payment Card Industry Data Security Standard

KeyLock Solutions Security and Privacy Protection Practices

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Managing Cloud Computing Risk

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA Violations Incur Multi-Million Dollar Penalties

StratusLIVE for Fundraisers Cloud Operations

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

VMware vcloud Air Security TECHNICAL WHITE PAPER

A Decision Maker s Guide to Securing an IT Infrastructure

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Our Key Security Features Are:

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Customer-Facing Information Security Policy

Protecting personally identifiable information: What data is at risk and what you can do about it

Consolidated Audit Program (CAP) A multi-compliance approach

Network Segmentation

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

How to ensure control and security when moving to SaaS/cloud applications

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

HIPAA Compliance and the Protection of Patient Health Information

Security Compliance, Vendor Questions, a Word on Encryption

Client Security Risk Assessment Questionnaire

Matthias Machowinski, Directing Analyst for Enterprise Networks and Video, Infonetics Research, 20152

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

VENDOR MANAGEMENT. General Overview

Injazat s Managed Services Portfolio

Security Is Everyone s Concern:

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

PCI Compliance. Top 10 Questions & Answers

White Paper September 2013 By Peer1 and CompliancePoint PCI DSS Compliance Clarity Out of Complexity

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Microsoft Azure. White Paper Security, Privacy, and Compliance in

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity

Transcription:

Secure Cloud Hosting for Healthcare Organizations

OUR MISSION FIREHOST MISSION Our core is an unshakable, no compromise commitment to protect our customer's digital assets with integrity and innovation by utilizing our expert experience in security, compliance, performance, and service.

FIREHOST PILLARS Security Fully managed security protecting you from real threats Compliance Exceeding compliance requirements to reduce your risk Performance Benchmarked performance - there's no competition Service Flexibility and control at your fingertips - backed by experts Noted in Gartner s 2012 Magic Quadrants for MANAGED HOSTING PUBLIC CLOUD &

GEOGRAPHIC DIVERSITY US, EU, and APAC Data Centers Full High-Availability Cloud Architecture Data Center Locations CDN Points of Presence DNS Points of Presence Secure MPLS Network

HIPAA INCIDENTS HIPAA Incidents Utah Department of Health: 780,000 affected individuals. Breach discovered more than 30 days later of server hack. 1 year Free Credit Monitoring and insurance (estimates of up to $234 million on just the monitoring portion alone) Sutter Medical Foundation: 943,000 individuals effected. 11 Lawsuits totaling between $944 million to $4.25 billion. Tricare Management: 4,901,432 individuals effected. $4.9 billion sought in class action lawsuit. (even with exhausted insurance from SAIC, best case scenario is Tricare is out a $10 million deductible)

HIPAA INCIDENTS But there s more June 13, 2013- Stanford Reports 5 th big HIPAA Breach (additional 13,000 records). January 9, 2013- Stanford has breach (57,000 records) after an unencrypted company laptop containing patient medical information was stolen from physician s car July 2013 Stanford University Medical Center loses 2,500 patient records of a HIPAA breach after unencrypted desktop stolen 2010 -Notified 20,000 patients that their protected information was wrongly posted on a student website (resulted in a $20 million lawsuit)

HIPAA PENALTIES Fines are trickling down and will continue to get worse! September 23 rd 2013, HIPAA Omnibus went into effect Increased Civil Penalty structure required under the HITECH Act (Penalties as high as $1.5 million per violation now) BAA (Business Associate Agreements) mandatory Smaller employers are finding themselves on the receiving end of HIPAA audits. Now is a good time to review all your information technology and HIPAA compliance programs to make sure all required safeguards are in place. Computer Networks: The HHS s Federal Office for Civil Rights (OCR) has stepped up HIPAA audits including covered entities. Significant monetary fines have been levied up to millions of dollars for what appeared to be small issue

A Layered Explanation THE HEALTHDATA REPOSITORY Move your healthcare data to a secure HealthData Repository A FireHost HealthData Repository can provide a safe haven for regulated healthcare data. Leverage the HITRUST certified private cloud infrastructure to decouple health records from existing IT environments.

A Layered Explanation THE HEALTHDATA REPOSITORY Current Situation HIPAA-regulated data sits in a monolithic IT environment High risk and broad scope for compliance Burdened by slow audit times and high costs Vulnerable to threats

A Layered Explanation THE HEALTHDATA REPOSITORY Why a Secure HealthData Repository? Reduce the scope of compliance for faster, more cost effective audits Increase the security of sensitive data

A Layered Explanation THE HEALTHDATA REPOSITORY Reduce Risk Decouple regulated data from local Infrastructure Access to sensitive data restricted and secured HITRUST-certified and BAA friendly

A Layered Explanation THE HEALTHDATA REPOSITORY Security Multiple layers of fully managed security Web application firewalls Unlimited firewall zones IP reputation management DDoS mitigation SSLVPN/L2LVPN secure access Physically isolated secure SAN

A Layered Explanation THE HEALTHDATA REPOSITORY Compliance HITRUST-certified infrastructure to address HIPAA compliance Reduced scope for compliance Faster audit times and lower costs Less procedural documentation and policies

A Layered Explanation THE HEALTHDATA REPOSITORY Performance Deploy quickly Multiple points of presence for global redundancy Ranked #1 in 3 rd party performance benchmarks Infrastructure close to application for low latency

A Layered Explanation THE HEALTHDATA REPOSITORY Service 24x7x365 certified engineer support Fully managed security hardware and software Seasoned compliance experts on staff

The Whole Story A Layered Explanation THE HEALTHDATA REPOSITORY

INTELLIGENT SECURITY MODEL

Stand Out in the Cloud FIREHOST PERFORMANCE Unmatched Benchmarked Performance We put performance to the test AND WON It's Easier to Win Races when Every Component is Built for Speed and Availability Ranked #1 in server performance, memory speed, processor speed, and storage speed

Stand Out in the Cloud FOR PARTNERS For Complete Compliance, it s a Shared Responsibility (but we have you covered)

Stand Out in the Cloud CREDENTIALS Security and Compliance Validation Auditor and security assessment friendly infrastructure PCI DSS 2.0 Compliant FireHost has been validated as a Level 1 Service Provider under PCI DSS v2.0 for our services. Our validation includes specific PCI DSS controls on which customers can rely. SSAE 16 SOC 1 / SOC 2 FireHost has received SOC 1 Type 2, SOC 2 Type 2, SOC 3 and ISAE 3402 reports. These reports demonstrate the viability of FireHost s control program over time. HIPAA/HITRUST FireHost has been certified against the Common Security Framework (CSF) from the Health Information Trust Alliance (HITRUST) and has been certified for HIPAA compliance. ISO 27001 FireHost has received a certificate of approval for our control program against the ISO/IEC 27001:2005 standard for Information Security Management Systems. Validated by multiple third parties

A Layered Explanation THE HEALTHDATA REPOSITORY Thank You Jim Cuddy VAR Partner Manager Jim.cuddy@firehost.com (US) +1 877 262 3473 x8160 (Cell) 512-391-9052