Commercial Enterprises:

INTEGRITY—When Life Depends On It
Securing Medical Information from Cyber Attack

Medical services leaders have been put on notice...

$2.3 trillion spent on healthcare in 2007 in the US. Could double by 2017. 250,000 to 1 million medical identities are stolen annually. Over 7 million medical data records stolen since 2000. $2.8 million in false Medicare claims made by single hacker in one incident.

An entire medical services industry subject to attack by a single hacker working from anywhere in the world. It's not a matter of if; it's only a matter of when.

Sooner or later, cyber security strategies based on "pierce and patch" will result in:

  • Executives not in compliance with Federal laws and facing fines and/or prison sentences
  • Loss of value — market capitalization, revenue, earnings
  • Millions lost defending or settling class action lawsuits
  • Millions of dollars spent on restoring service or refunding money to customers
  • Bankruptcy
  • Customer health and medical emergencies, including death
  • Widespread economic upheaval
  • Widespread political and social upheaval
  • Compromised national defense due to a weakened medical services industry

A cyber security strategy based on "pierce and patch" is--

Unfathomable. Unacceptable. Untenable. Uneconomic.
And has largely been unfixable — until now.

INTEGRITY — the most secure and reliable software system ever developed — can provide medical institutions with certified unbeatable cyber asset security. The National Information Assurance Partnership (NIAP) has awarded INTEGRITY a rating of EAL6+ High Robustness. No software system has ever come close to these ratings before INTEGRITY.

With INTEGRITY, mission critical applications stay secure, customer data remains private, and control and command applications work without the possibility of intentional, hostile, well-funded, internal or external attack. And it's been certified — not once, but multiple times.

INTEGRITY helps medical services providers meet and exceed Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule requirements:

  • Protect the confidentiality, integrity and availability of all electronic protected health information (e-PHI) the covered entity creates, receives, maintains or transmits — INTEGRITY eliminates the possibility of cyber theft of records
  • Protect against any reasonably anticipated threats or hazards to the security or integrity of such information — INTEGRITY keeps medical records separate and secure from open or public information and prevents medical records from being accessed, copied, deleted, or changed by anyone not authorized to have access to the data
  • Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required by the Privacy Rule — INTEGRITY allows medical services companies to establish their own enterprise-wide and system-level protocols
  • Ensure compliance by its workforce — Because INTEGRITY allows for organizations to establish their own usage protocols, workforce compliance is not a choice made by workers, it's inherent to the system
  • The HIPAA Security Rule includes specific security standards in three main areas that must be met in order to ensure compliance:
    • Administrative Safeguards includes four required implementation specifications: risk analysis, risk management, sanction policy and information system activity review
      • INTEGRITY makes compliance simpler by completely eliminating risk
    • Physical Safeguards includes standards for facility access controls; standards for proper workstation use and physical security of workstations that access e-PHI; and policies and procedures that control receipt, movement and removal of hardware and electronic media that contain e-PHI
      • INTEGRITY makes compliance simpler by enabling the development of system-level usage protocols that ensure proper workstation use and can make it impossible to successfully move data from one media to another
    • Technical Safeguards includes specifies on how to use technology to protect e-PHI. These standards focus on access control and authentication; transmission security (including the need to protect both the data's integrity and confidentiality such as with encryption); policies and procedures to protect e-PHI from improper alteration or destruction; and methods for providing audit controls
      • INTEGRITY makes compliance simpler as it has been certified 100% secure and reliable, enables enterprise-wide and system-level protocols to set, and its Secure Separation Architecture ensures e-PHI is safe from edit or deletion

Certified as secure and reliable for both military and non-military use as a result of the most rigorous testing and evaluation possible, INTEGRITY offers:

  • True security
    • Open communication is possible without risk to critical assets
    • Mission critical assets and applications remain completely safe and secure
  • Cost savings
    • INTEGRITY Secure Consolidated Client (ISCC)
    • Simultaneous support of legacy and mission critical applications
  • Form flexibility
    • Protect desktop PCs, servers, Thin-Client Workstations and even PDAs
  • Open Standards
    • Supports Windows and Linux
    • Supports native POSIX-compliant applications
  • Certified security and reliability—no other operating system can offer this level of security and reliability and no other operating system has ever been certified to the levels of INTEGRITY

To learn more about how INTEGRITY Global Security can secure your medical information, please call 805.882.2500 or send email.

© INTEGRITY Global Security    |    Site Map    |    Contact Us