Encrypt Healthcare Data Using Intel® Xeon® Processors
Lab testing with the Epic Systems Corporation’s EHR reporting solution demonstrates that encryption CPU overhead can be significantly reduced with hardware security technologies.
Blurring of Security Perimeter Brings Risk
Healthcare is undergoing major changes driven by several concurrent trends, including migration to ...electronic health records (EHR), mobile health, cloud computing, and health information exchange (HIE). While these promise compelling benefits, including improving the quality and reducing the cost of patient care, they also bring privacy and security risks.
These changes are blurring the traditional security perimeter, including firewalls in the logical sense and buildings in the physical sense. Mobile computing enables anytime, anywhere access to EHRs, and cloud computing moves sensitive healthcare data into the cloud, such as with an EHR software as a service (SaaS) solution. This blurring of the security perimeter is compounded by the growth of increasingly sophisticated malware and the reality that many healthcare organizations will experience a malware event at some point.
At the same time, breaches of sensitive healthcare data have reached alarming levels, both in frequency and business impact, affecting all types and sizes of healthcare organizations globally. The Ponemon Institute’s 2011 Cost of Data Breach Study: United States estimates the total average cost of a data breach at $5.2 million. Regulations and data protection laws are increasingly incorporating notification rules that require healthcare organizations to report security incidents such as breaches. Data breaches can result in costly damages, including the possibility of lost business, fines, and class action suits.
Read the full Encrypt Healthcare Data Using Intel® Xeon® Processors White Paper.