Introduction
Computers that have passed through the healthcare industry are some of the most valuable buys on the black market and dark web.
What should healthcare companies and institutions do with their old or spent hardware – that once contained patient data?
Improper disposal of sensitive information can potentially compromise thousands of patients and their most personal data.
When it’s time for a system to be discarded, there are various methods that can secure a drive – and prevent third-parties from accessing private data again.
Here’s your guide to safely disposing of hardware that once contained patient data.
The Data Danger
One of the worst data hacks to ever hit the healthcare industry happened in Ireland (2020), when the entire country’s healthcare database was compromised – and sensitive patient data hawked on dark web marketplaces for a fee.
Healthcare cybersecurity is under the spotlight everywhere.
If you handle any sensitive patient data, throwing away old files or computers just isn’t enough. Simple recovery software can pull as much as 90% or more from a deleted drive, and sophisticated forensic data recovery options can get back even more.
Data Safety for Healthcare
Backup Vital Data
The first step for any healthcare provider who is about to discard their old system is to backup all vital data, either on a secondary server or a reputable cloud-based provider.
Data can include past email servers, patient records or business and financial records that will be transferred to new systems.
If you are not sure how to do this, seek a professional data backup company to assist.
Inform All Personnel
When it’s time to discard old systems, inform personnel about this change far ahead of time. While people aren’t supposed to keep any of their personal information or home files on work systems, many still do it – and now is a good time to give them enough time to remove their files, whilst having a talk about proper cybersecurity measures.
Software Solutions
If it’s time for a PC to go to a good cause, new home or parts repository, there are software options that can make the computer safer for the previous owner – and easier to use for the next one.
Clear Cache & History
Software caches and browser history should best be cleared on their own. Remember to tick any boxes for the proper removal of passwords and other personal information that the browser might have collected over time.
Format the HDD
A professional hard drive format can clear out most of what’s on an HDD, though professional recovery software can still get most of the information back. If you want to prevent this, install another operating system after formatting – or use forensic erasure software.
Professional Erasure Software
Professional erasure software goes deeper than a simple format, but permanently deletes files and their associated tags in the very depth of the drive. When hoping to clear patient data for good, this is a much better bet for healthcare providers.
Hardware Solutions
Remove & Destroy the HDD
Most IT professionals prefer the reassurance of complete HDD removal, and its destruction to make sure no data can be recovered from the hard drive. While this could seem drastic, never underestimate how far hackers might go to try get at a patient’s personal information.
Remaining parts, including towers-sans-HDD, can be donated to good causes or charitable organizations.
Get in touch with us
Secutor Cybersecurity is a trusted partner comprised of industry leading experts in the fields of Cybersecurity and Governance, Risk and Compliance. We partner with our clients to deliver on-demand solutions tailored to expertly navigate the regulatory demands of their specific industries.
Our proven track record of successfully exceeding client expectations is achieved through the combination of our methodical approach, advanced technologies, subject matter experts, and synergy with client team members.
Secutor is your team of world-class problem solvers with vast expertise and experience delivering complete solutions keeping your organization protected, audit-ready, and running smoothly.