Protect medical records from data breaches. Use the TrustDefender™ Cybercrime Protection Platform to protect the privacy of electronic healthcare data and medical records.

Government regulations mandate strict security for access to electronic healthcare data, and the penalties for data breaches can be severe. ThreatMetrix™ helps healthcare organizations prevent costly data breaches and secure their patient’s medical records and Protected Health Information (PHI) according to HIPAA rules.

HIPAA and HITECH Act Compliance

The Health Information Portability and Accountability Act requires healthcare organizations to reduce healthcare fraud and abuse by protecting personal health information (PHI). In conjunction with this mandate, the HITECH Act enforces strict penalties for any data breaches involving PHI. The key requirements of these legislations are first, strictly controlling user access to systems and applications containing PHI, and taking a risk-based approach to managing vulnerabilities in web applications and systems.

ThreatMetrix provides a combined healthcare data protection solution that fully addresses both of these requirements. The TrustDefender Cybercrime Protection Platform addresses the HIPAA and HITECH requirements to protect the integrity of patient’s medical records as follows.

  • Understand the user logging in to web applications holding PHI
  • Recognize returning health care workers using complex device intelligence
  • Identify high risk access attempts through device and contextual anomalies
  • Protect legitimate users and their devices from targeted malware
  • Detect compromised user accounts that represent risk to PHI

Account Takeover Protection

To protect the privacy of patient healthcare information, you have to prevent cybercriminals from compromising healthcare providers’ user accounts, and from logging in to health information management systems with stolen credentials. ThreatMetrix prevents unauthorized access to patient’s medical records by finding anomalies that might indicate that someone is not who they claim to be online, including:

  • Logins from compromised devices
  • Devices hiding behind proxies or spoofing IP addresses or locations
  • Sessions from uncommon, suspicious computer configurations
  • Prevent use of stolen credentials to create new identities and accounts
  • Flag suspicious accounts that may be illegitimately used to retrieve personal health information
  • Allow clinicians to use their own devices while securing their interaction with healthcare applications
  • Protect doctors, nurses and healthcare staff from attacks targeting sensitive PHI

To learn “how it works”, read about the TrustDefender Cybercrime Protection Platform