Is your EHR Secure?
by Core Solutions on October 25, 2019
If you are like the many organizations that believe “data” is your most important asset, then you would agree that securing your most important asset is critical. The chances are you know of someone or some organization who has been recently impacted by a computer security incident in the last year. According to Statistica (1),the number of data breaches in the United States amounted to 1,244 with over 446.5 million records exposed. How do you ensure your vendor has taken all the right steps to protect your data?
Core’s Cx360 is built with security in mind. Starting with security checkpoints within the software development lifecycle, Core has built a comprehensive set of security controls based on NIST standards. These controls cover physical infrastructure, software development, deployments, incident management and more. We are excited to share some key differentiators that Cx360 offers to provide a secure platform to safeguard your data.
Core has partnered with Amazon Web Services, the world’s largest hosting provider, to offer a scalable and reliable hosting platform for Cx360. In addition, Core leverges AWS’s advanced capabilities like Virtual Private Cloud (VPC), Web Application Firewall (WAF), Relational Database Services (RDS), Multi Zone Load Balancing and other capabilities to offer a secure and high availability solution that can support your disaster recovery goals. |
Security is an ongoing responsibility that requires 24x7x365 attention. Core’s investment in this area is unparalleled and includes a suite of products and services to ensure a secure environment with proactive monitoring. Our proactive monitoring starts with a robust patch management solution that identifies required operating system and other critical software updates and is supported by a process to ensure updates are completed within acceptable parameters. Going beyond robust patch management, Core uses industry leading solutions for Intrusion Detection and identifying other potential issues. Various alerts and weekly reviews ensures we stay proactive in addressing potential issues identified through our tools. Another important piece of our ongoing monitoring is consolidated log management to ensure application level issues and risks are available to appropriate stakeholders on an ongoing basis. |

Cx360 has several built in features that improves the overall security posture of our clients. Starting with granular security permissions for forms, reports and advanced features, Cx360 allows organizations to configure record level permissions to further client data. For example, record access can be restricted based on caseload, program or staff assignments One of the other key differentiators in Cx360 is Auditing. Most EHR vendors restrict access to audit data to a limited time period or place limitations in being able to query the data. The Cx360 audit utility maintains data through the entire history of the client/system and allows users to drill down to the field level to see changes made and who made them. |
Core and Cx360 have several other examples that demonstrate our commitment to security. Schedule your Cx360 demonstration today or talk to one of our experts to learn more about our security challenge.
- October 2023 (3)
- September 2023 (3)
- August 2023 (2)
- June 2023 (2)
- May 2023 (3)
- April 2023 (4)
- March 2023 (2)
- November 2022 (3)
- October 2022 (1)
- September 2022 (1)
- August 2022 (3)
- July 2022 (1)
- June 2022 (1)
- January 2022 (2)
- December 2021 (1)
- October 2021 (2)
- September 2021 (2)
- August 2021 (2)
- July 2021 (5)
- June 2021 (5)
- March 2021 (2)
- January 2020 (3)
- November 2019 (3)
- October 2019 (2)
- July 2019 (1)
- June 2019 (1)
- May 2019 (1)
- April 2019 (3)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- July 2018 (1)
- June 2018 (1)
- May 2018 (2)
- April 2018 (1)
- March 2018 (1)
- December 2017 (1)
- October 2017 (2)
- September 2017 (1)
- June 2017 (2)
- May 2017 (2)
- April 2017 (1)
- February 2017 (2)
- January 2017 (3)
- November 2016 (2)
- October 2016 (3)
- September 2016 (2)
- August 2016 (1)
- July 2016 (2)
- June 2016 (1)
- May 2016 (3)
- April 2016 (2)
- March 2016 (2)
- February 2016 (2)
- January 2016 (3)
- December 2015 (2)
- November 2015 (4)
- October 2015 (3)
- September 2015 (4)
- August 2015 (1)
Let us know what you think