Firewall, software updates: some of the steps to avoid hacking.
“To write the program off saying it is too complicated or not worth it may be short-sighted,” Dr Shapiro concluded. “Almost anything that is incrementally beneficial to the practice financially becomes important in an era where there is pressure on declining reimbursement.”
Encryption acts as a safe harbor. In case PHI is lost, sent to the wrong person, or stolen, it isn’t considered a breach if it is encrypted.
Practices should review the list of 18 identifiers and remove each item before sharing data.