hacking healthcare: the current state of healthcare data security

31
Hacking Healthcare A Hacker’s Paradise

Upload: mapletronics

Post on 28-Jul-2015

103 views

Category:

Health & Medicine


1 download

TRANSCRIPT

Page 1: Hacking Healthcare: The Current State of Healthcare Data Security

Hacking HealthcareA Hacker’s Paradise

Page 2: Hacking Healthcare: The Current State of Healthcare Data Security

Paradise LostThe Current State of Healthcare Data Security

Presenter – Jeff Franks, vCTO at MapleTronics Computers

Page 3: Hacking Healthcare: The Current State of Healthcare Data Security

Why Healthcare is in the Crosshairs

•Black market medical records are a multi-billion dollar industry• Fraud can take years to

discover• Security is lacking in most

CE environments

Page 4: Hacking Healthcare: The Current State of Healthcare Data Security

Who are the Hackers?

Page 5: Hacking Healthcare: The Current State of Healthcare Data Security

Who are the Hackers?

•Yes, teenagers, but also…•Organized Crime•Nation States (China,

Russia, North Korea, etc.)•Anyone with an agenda

Page 6: Hacking Healthcare: The Current State of Healthcare Data Security

Why You Should Care

Black Market Value of a Credit Card

Black Market Value of a Medical Record

$0.50

$10.00

Page 7: Hacking Healthcare: The Current State of Healthcare Data Security

Size Doesn’t Matter

Page 8: Hacking Healthcare: The Current State of Healthcare Data Security

The Way In Vulnerabilities•Open Firewalls•Unrestricted Web Access•Unpatched Operating

Systems•Out of Date AntiVirus (or

no A/V)• Social Engineering

Page 9: Hacking Healthcare: The Current State of Healthcare Data Security

Your Biggest Vulnerability

Your Own People

• Don’t always follow policies• Can be easily manipulated• Underestimate their

role/impact• Fail to recognize/report

incidents

Because they don’t know!

Page 10: Hacking Healthcare: The Current State of Healthcare Data Security

Your Biggest Vulnerability

Your Own People

Whether they are ignorant, careless or have bad intentions, they have:

•Access•Time•Opportunity

Page 11: Hacking Healthcare: The Current State of Healthcare Data Security

What You Are Facing in 2015•ePHI is a highly valuable asset•ePHI is targeted by numerous people•Your size doesn’t hide you• IT security and risk management has not been a priority •Your own people can break your security• Increased enforcement by HHS & State Gvmnts

Page 12: Hacking Healthcare: The Current State of Healthcare Data Security

So, where do we start?

Page 13: Hacking Healthcare: The Current State of Healthcare Data Security

Beyond ComplianceWinning with the HIPAA Security RulePresenter – Phil Cooper, CIO at MapleTronics

Page 14: Hacking Healthcare: The Current State of Healthcare Data Security

The Stated Purpose of the Security Rule1. Of ePHI, to ensure

a) Confidentialityb) Integrityc) Availability

2. Protect against1. Threats2. Hazards

3. Protect against improper1. Uses2. Disclosures

4. Ensure compliance by workforce

Page 15: Hacking Healthcare: The Current State of Healthcare Data Security

The Real Object of the Security Rule

To create a corporate culture of decision-driven

IT security & risk management

Page 16: Hacking Healthcare: The Current State of Healthcare Data Security

The Real Object of the Security Rule

Your IT can’t be,• An Afterthought• Set & Forget• A one and done checklist

Your IT must be,• Intentional• Decision-Driven• A part of how you do business

Page 17: Hacking Healthcare: The Current State of Healthcare Data Security

The Business CaseA good compliance program will provide:

• Maximum uptime• Customer service/satisfaction• Productivity/efficiency• Employee morale

• Maximum Security• Reduced liability exposure• Marketing opportunity

• Business-wide protection and performance• Not just ePHI should be protected but your

entire business data.

Page 18: Hacking Healthcare: The Current State of Healthcare Data Security

The Business Case

The truth is, many of your IT issues stem from the same root cause:

IT SECURITY AND RISK MANAGEMENT ARE MERELY AN AFTERTHOUGHT.

And you can change that by being intentional with IT.

Page 19: Hacking Healthcare: The Current State of Healthcare Data Security

10 Years and Counting

Page 20: Hacking Healthcare: The Current State of Healthcare Data Security

10 Years and Counting

67%CE’s who have NOT performed an

adequate Risk Analysisand therefore,

“…have not identified the risks and vulnerabilities of their

environment and therefore are failing to adequately safeguard

ePHI.” – OCR, September 2014

Page 21: Hacking Healthcare: The Current State of Healthcare Data Security

10 Years and Counting

~60% The “message” is that these could ALL have been prevented by

encryption (safe harbor).

Theft & Loss

Page 22: Hacking Healthcare: The Current State of Healthcare Data Security

Getting Started or Getting Serious

• Read the Security Rule• Designate and Empower a Security Officer• Establish a HIPAA SR Team• Identify ALL of Your ePHI• Perform a Serious Risk Analysis and Act on it• Document Your Process & Actions• Sell it from the Top…Make it Part of Your Culture

Page 23: Hacking Healthcare: The Current State of Healthcare Data Security

Key Areas to Re-evaluate

• Provide regular security awareness to all workforce members• Craft & enforce an encryption policy• Deploy intrusion detection &

prevention• Perform regular vulnerability

assessments• Apply patching regularly• Control & secure mobile devices or

don’t use them• Use secure texting, or don’t text

• Leverage 3rd party resources & vendors• But don’t abdicate your responsibilities

• Use role-based security• Limit ePHI use by design (minimum

access approach)• Encourage incident reporting by

workforce• Enable proactive auditing• Secure your remote access• Evaluate your WiFi setup

Page 24: Hacking Healthcare: The Current State of Healthcare Data Security

You Can Do This

Page 25: Hacking Healthcare: The Current State of Healthcare Data Security

Questions

Page 26: Hacking Healthcare: The Current State of Healthcare Data Security
Page 27: Hacking Healthcare: The Current State of Healthcare Data Security

DELETED SLIDES

Page 28: Hacking Healthcare: The Current State of Healthcare Data Security

Final Word -- What Did You Attest To?

“Meaningful Use attestation of performing a risk analysis [Core Requirement #15]

equals attesting that you are compliant with the

HIPAA Security Rule.” - Deven McGraw, HHS Tiger Team Chair & Partner at Manat, Phelps & Phillips,

LLP

Page 29: Hacking Healthcare: The Current State of Healthcare Data Security

What’s Next??

Page 30: Hacking Healthcare: The Current State of Healthcare Data Security

Six Things To Do This Week

• Close down RDP from the Internet• Remove BYOD from your business network• Encrypt laptops (if ePHI exists)• Verify your data protection and recovery strategy• Perform/Start a REAL risk analysis• Assess your Security Rule compliance

Page 31: Hacking Healthcare: The Current State of Healthcare Data Security

Why Should You Care?

Your ePHI Health & Human Services