Do you let your employees take company resources home?


January 4, 2013

Many businesses across the country don’t think twice about allowing staff members to take corporate computers, laptops, tablets and other computing devices home with them, but there is a risk to having company computers in the homes of your staff.

The latest lesson learned comes from a hospital in southwest Indiana who recently reporting a HIPAA breach of over 29,000 patient records simply because an employee had a hospital laptop stolen from their home.

According to a company statement, an unencrypted laptop containing the personal health information of patients was stolen from one of their employee’s homes on Nov 27, 2012. Patient names, addresses, social security numbers and/or clinical treatment data were stored on this company laptop.

President & CEO of Gibson General Hospital, Emmett Schuster said “There is no evidence to believe that the data on the laptop was the target of the theft or that any information has been or will be accessed for fraudulent purposes.” Schuster commented that protecting the information of their patients is top priority for Gibson General Hospital.

Protecting your corporate information must be a priority no matter how important it is or if you have requirements under HIPAA that you must meet.

How often do you review your policies and procedures when it comes to safeguarding corporate resources and your data? Have you tested your business continuity and disaster recovery plan? Do you have systems in place to encrypt sensitive business data if a corporate asset is stolen or goes missing?

Shuster will be reviewing all policies and procedures with Gibson General Hospital and so should you. Contact us today to book a no obligation review of your IT safeguards, data protection systems and your IT security infrastructure.

We're Integris. We're always working to empower people through technology.

Keep reading

How the Best IT Companies in Minnesota Support the Hybrid Workforce

How the Best IT Companies in Minnesota Support the Hybrid Workforce

After the initial shutdowns and stay-at-home orders lifted following COVID-19, workers throughout the United States and Minnesota decided that the work-from-home model was here to stay. It makes sense -- working from home offers a lot of convenience to your team – and...

Do I Need To Improve My Endpoint Protection?

Do I Need To Improve My Endpoint Protection?

A compromised endpoint gives hackers everything they need to get a foothold in your security network. Once there, they can steal data and potentially hold it for ransom. That’s why it’s so important for business owners to secure their critical endpoints (including...

Multi-Factor Authentication

Multi-Factor Authentication

Granting access to information is a necessity, as is security for both the user needing access and for the information for which access is being granted. The best way to handle this is by establishing user accounts for users. This does several things at once: Allows...