25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Serious Security Risks Found in Healthcare Laptops

A recent analysis of healthcare security risks by the Clearwater CyberIntelligence Institute (CCI) has shown laptop computers pose a major threat to hospitals, health systems, and their business associates.

Laptops are portable and can easily be lost or stolen which places data at risk. The devices can be accessed remotely and used to access healthcare networks, and many organizations fail to monitor how the devices are used by employees. CCI ranked laptop computers 6th among sources of risk for healthcare organizations.

CCI research showed 70% of high and critical risk scenarios for laptop vulnerabilities were in three areas: Endpoint data loss (29.9%), excessive user permissions (22.4%), and dormant accounts (17.8%).

The most serious risk is endpoint data loss, which was rated critical or high due to the number of vulnerabilities in this area. Within this category, 98.9% of laptops had vulnerabilities related to the failure to lock down external ports such as USB, CD, DVD, and Firewire. Consequently, it is easy for data to be copied onto portable storage devices by users.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

63.3% of devices lacked controls to prevent users from storing sensitive data locally. Healthcare organizations can address this vulnerability by using virtual desktop software to access the organization’s programs and data. If sensitive data is not stored on the laptop’s hard drive, data exposure can be avoided in the event of loss or theft of the device.

52.7% of laptops were not protected by tools to prevent data loss and the sending of sensitive data to unauthorized individuals. Tools exist that can scan both internal and external network traffic to increase protection.

Control deficiencies were identified in high numbers of laptops. 100% of those studied had deficiencies related to user activity reviews, 97.73% had deficiencies in user permissions reviews, and 91.57% had deficiencies in log aggregation & analysis.

It is important to periodically scan user activity to identify anomalous behavior that could be indicative of an attempt to compromise the system and gain access to sensitive data. User permission reviews are required to detect dormant accounts to allow them to be deactivated and for excessive user permissions to be found and corrected to reflect an individual’s role in the organization. Security information and event management applications should also be used for log aggregation and analysis to identify suspicious activity.

CCI urges all healthcare organizations to assess their laptop computers, through a comprehensive risk analysis, to determine whether the above mentioned controls have been implemented correctly, whether risks have been effectively reduced to an appropriate level, and to ensure that remediation plans have been implemented to address critical risks involving endpoint data loss, excessive user permissions, and dormant accounts.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist