Sep 9, 2020

How Know Your Patient processes help fight healthcare fraud

Dean Nicolls, Vice President o...
3 min
Dean Nicolls, Vice President of Global Marketing, Jumio, examines how How Know Your Patient processes help fight healthcare fraud
Dean Nicolls, Vice President of Global Marketing, Jumio, examines how How Know Your Patient processes help fight healthcare fraud...

Healthcare data breaches have impacted more than 175 million medical records over the last decade — that’s the equivalent of affecting more than half of the U.S. population. 

What’s not commonly understood is that medical records command an exceedingly high value on the dark web because there is far more personal information attached to health records than any other electronic database.

Given the scope of recent data breaches in this space, and the growth of the dark web and identity theft, cybercriminals are now more empowered than ever to impersonate legitimate patients. Therefore, it is critical that all healthcare sectors properly vet and verify their patients to ensure that they are who they claim to be.

The emergence of KYP

Know Your Customer (KYC) has formed a vital part of today’s financial regulatory environment and is the basis of verifying the identity of clients to prevent banks from being used by criminal elements for money laundering activities.

Now is the time for the healthcare industry to adopt a similar standard – something we call Know Your Patient (KYP).

The growing need for online identity verification

There are a number of clear reasons for online identity verification. For example, there are growing regulations that require online pharmacies to verify the identities of patients seeking prescriptions. 

KYP can also streamline the patient intake process, automating data capture and drastically reducing the potential for human error. 

Health insurance fraud is yet another area for consideration. When a patient’s identity and privacy are compromised, not only do they suffer financial fallout, but the industry has to deal with fraudulent claims and any related legal fees. 

Underpinning all of these use cases is reputation management. If patient data falls into the wrong hands, it can tarnish that organization’s reputation instantly. 

It’s therefore vital that healthcare organizations get the verification process right. Advances in digital identity proofing and biometric-based authentication technologies hold great promise that healthcare can be delivered in smarter, simpler and more cost-effective ways.

KYP in practice

So how would a KYP process work? Patients creating a new account are asked to take a photo of their government-issued ID (e.g., driver’s license) using their smartphone or computer, followed by a live selfie (in which a 3D face map is created) to ensure that the ID is authentic and that the person pictured in the selfie matches the picture on the ID. 

Hospitals, offices, clinics and pharmacies could then check the returned identity for minimum age requirements and potential fraudulent activity through fraud detection analytics to help minimize risk and loss.

After an online account has been approved, providers could approve future online prescriptions and treatment requests by capturing a new 3D face map of the patient and using online identity verification technology to automatically compare it to the 3D face map captured at enrollment.

Now is the time for health care organizations to adopt a rigorous KYP process. These steps are essential to safeguarding their business and reputation while protecting legitimate patients. 

Share article

Jun 17, 2021

Check Point: Securing the future of enterprise IT

3 min
Erez Yarkoni, Global VP, explains how a three-way partnership between Check Point, HOOPP, and Microsoft is yielding optimum cloud security

Cybersecurity solutions provider Check Point was founded in 1993 with a mission to secure ‘everything,’ and that includes the cloud. Conscious that nothing remains static in the digital world, the company prides itself on an ability to integrate new technology with its solutions. Across almost three decades in operation, Check Point, with its team of over 3,500 experts, has become adept at protecting networks, endpoints, mobile, IoT, and cloud.

“The pandemic has been somewhat of an accelerator in the evolution of cyber risk,” explains Erez Yarkoni, Global VP for Cloud Business. “We had remote workers and cloud adoption a long time beforehand, but now the volume and surface area is far greater.” Formerly a CIO for several big-name telcos before joining Check Point in 2019, Yarkoni considers the cloud to be “part of [his] heritage” and one of modern IT’s most valuable tools.

Check Point has three important ‘product families’, Quantum, CloudGuard, and Harmony, with each one providing another layer of holistic IT protection:

  • Quantum: secures enterprise networks from sophisticated cyber attacks
  • CloudGuard: acts as a scalable and unified cloud-native security platform for the protection of any cloud
  • Harmony: protects remote users and devices from cyber threats that might compromise organisational data


However, more than just providing security, Yarkoni emphasises the need for software to be proactive and minimise the possibility of threats in the first instance. This is something Check Point assuredly delivers, “the industry recognises that preventing, not just detecting, is crucial. Check Point has one platform that gives customers the end-to-end cover they need; they don't have to go anywhere else. That level of threat prevention capability is core to our DNA and across all three product lines.”

In many ways, Check Point’s solutions’ capabilities have actually converged to meet the exact working requirements of contemporary enterprise IT. As more companies embark on their own digital transformation journeys in the wake of COVID-19, the inevitability of unforeseen threats increases, which also makes forming security-based partnerships essential. Healthcare of Ontario Pension Plan (HOOPP) sought out Check Point for this very reason when it was in the process of selecting Microsoft Azure as its cloud provider. “Let's be clear: Azure is a secure cloud, but when you operate in a cloud you need several layers of security and governance to prevent mistakes from becoming risks,” Yarkoni clarifies. 

The partnership is a distinctly three-way split, with each bringing its own core expertise and competencies. More than that, Check Point, HOOPP and Microsoft are all invested in deepening their understanding of each other at an engineering and developmental level. “Both of our organisations (Check Point and Microsoft) are customer-obsessed: we look at the problem from the eyes of the customer and ask, ‘Are we creating value?’” That kind of focus is proving to be invaluable in the digital era, when the challenges and threats of tomorrow remain unpredictable. In this climate, only the best protected will survive and Check Point is standing by, ready to help. 

“HOOPP is an amazing organisation,” concludes Yarkoni. “For us to be successful with a customer and be selected as a partner is actually a badge of honor. It says, ‘We passed a very intense and in-depth inspection by very smart people,’ and for me that’s the best thing about working with organisations like HOOPP.”


Share article