Emerging and Growing Threats to Healthcare InformationNow that many processes are standardized, threats against healthcare leverage weaknesses in data protocols and procedures used to store, process, and invoice for services. For example, consider the $65-million-dollar fraud allegedly committed in this article. The alleged criminals understood how the standardized billing services work for Tricare and invoiced millions of dollars using the system to commit the crime regardless of the scam itself. While this is an extreme case, hacking a healthcare provider to steal patient information must still be monetized on the dark web. If you understand the billing practices for insurers, or can syphon off information directly from protocols like DICOM, then monetizing the attack is much easier and potentially more profitable. This does not mean threats like ransomware and phishing are going away. They are still very real and a huge problem. The evolution of hacks is shifting to the weaknesses that regulation and standardization are requiring from all providers and insurers.
Improvements to Be made to Better Protect Healthcare InformationFor the healthcare industry, information technology needs to learn from the best practices in medicine and adopt preventive care. Information technology should perform regular tests, screening, assessments, and other security best practices to ensure all applications are up to date, properly patched for vulnerabilities, and not misconfigured. This is analogous to making sure your child has all of their shots, is checked regularly for hearing and vision problems, and does not have any conditions like scoliosis. If healthcare can think along the same mindset using standards like (medical protocols) SANS 20 and FedRAMP to protect information, then sensitive client information can be protected much better because the risks can be identified early and treated; just like diagnosing a person.
Barriers to Improving Cyber Security Efforts in the Healthcare SectorThe biggest barriers in improving cyber security in healthcare are not money or established technology. Security professionals know how to fix these problems even on a shoe string budget. The problems in healthcare cyber security are technologies they use daily that have been traditionally out of scope (until now) for hackers to monetize. Consider the revelations last month from St. Jude Medical devices and Muddy Waters. The heath care sector has embraced technology in so many ways that flaws in the devices, lack of regulations for device security, and the technology limitations to upgrade them have created a new hurdle for the industry to overcome. The biggest barrier for the industry is not traditional IT services, but rather all the medical equipment and devices that have been out of scope, locked down by the FDA via change control, and now classified as the Internet of Things that can be exploited and potentially cause loss of life. The biggest barrier is yet to come as the healthcare sector is forced to secure, replace, and manage these devices with a completely unknown scope and cost and most importantly, lack of expertise.
Addressing and Overcoming BarriersThe barrier of medical device security can be addressed by a basic plan for IT security. First understand the problem. Understanding how wide spread is it, what devices are affected, and then managing the risk until permanent solutions can be found. This includes basic information technology procedures like:
- Discovery – identifying all of the devices and assigning risk priorities to them
- Segmentation – isolating high risk devices on separate networks and limiting access and communications to prevent a hack
- Remediation – when available, apply updates, configurations, and other changes to mitigate the risk
- Reporting – provide reports to technical teams and executives to quantify the risk and exposure
Learn why Care New England selects PowerBroker to secure their desktop infrastructure in this customer success story.For more on how technologies like privileged access management and vulnerability management can help protect access to healthcare data, contact us today.
Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.