We intend to develop a strategy that will successfully leverage IT-based techniques and measures to reduce risks of breach and threats to patient privacy within electronic health record systems. We need to carry out research intensively and extensively. Rampant cybercrime activities have been linked to weak security infrastructure and financial constraints (Hellsten, 2018).
We will employ online research to identify and affirm how widespread cybercrime has become in the United States. The first step will be to identify the articles that we will require for our project. We will use peer-reviewed articles that have been recently written. Then we will examine the papers for information. Various cyber-criminal activities pose a risk to the healthcare sector. The activities include cybersquatting, cyberterrorism, internal threats, identity theft, and external threats (Luna et al., 2016). We need to identify the most common cyber-criminal activity in the United States. We will also get ideas about the strategies that have been employed in hospitals to curb cybercrime.
Delegate your assignment to our experts and they will do the rest.
We will also need to know how the healthcare sector or hospitals intend to solve the cybercrime problem. For this, we will need to talk to the concerned individuals. We will conduct face-to-face interviews with various personalities in the healthcare sector. Among them will be the chief information security officers, chief information officers, and healthcare cybersecurity experts (Jalali and Keiser, 2018). Observation will also be an excellent way to research since it will give us an accurate picture. Lastly, we will need to uncover the impact of cybercriminal activities on the lives of patients. This will help us to authenticate our project. We will carry out case studies to acquire information.
As mentioned above, we need to develop a strategy that will leverage IT-based techniques and measures to reduce risks of breach and threats to patient privacy within electronic health record systems. To achieve this, we need to conduct discussions with the stakeholders. Cybersecurity strategies are interdisciplinary, and they involve various stakeholders (Vuulen and Leenen, 2019). Our primary interest in developing the strategy is to prevent crime and police the electronic health record systems. The strategy has to consider and address electronic evidence that affects the capabilities of criminal justice. We need to convince healthcare facilities to adopt the strategy. In this way, we will prevent cybercrime.
By curbing cybercrime, we will be able to prevent cybercriminals from obtaining wares unlawfully. According to Fuentes (2017), there is a market for personally identifiable information (PII) in the criminal underground world. Electronic health record systems contain information about a patient’s insurance, mailing address, demographics, birthdate, social security number, medications, lifestyle, immunization record, mailing address, family medical history, radiology reports, laboratory results, and vital signs that can be peddled. It may also contain credit card details and invoices. Fuentes (2017) notes that financial information is highly-priced in the criminal underground world. Besides, they can combine portions of PII to acquire access to other services. For instance, a medical insurance ID, date of birth, and a social security number can be combined to obtain medical insurance.
Most small businesses have settled to use internal audits and strategies to protect their organizations' information (Maahs, 2018). They focus on implementing secure firewalls and regularly updating their antivirus software to prevent hacking. They also run security checks and conduct regular system back-up. This has helped them avoid attacks.
References
Fuentes, M. R. (2017). Cybercrime and other threats faced by the healthcare industry. Trend Micro .
Hellstén, H. (2018). Cyber risk management in the Finnish healthcare sector (Master's thesis).
Jalali, M. S., & Kaiser, J. P. (2018). Cybersecurity in hospitals: a systematic, organizational perspective. Journal of medical Internet research , 20 (5), e10059.
Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to health information systems: A systematic review. Technology and Health Care , 24 (1), 1-9.
Maahs, D. L. (2018). Managerial strategies small businesses use to prevent cybercrime.
Van Vuuren, J., Leenen, L., Pieterse, P., & Police, S. A. (2019, February). Framework for the Development and Implementation of a Cybercrime Strategy in Africa. In Proceedings of the ICCWS 2019 14th International Conference on Cyber Warfare and Security, edited by N. Van Der Waag-Cowling and L. Leenen (pp. 156-167).