Overview. Figure 1 - Penetration testing screenshot examples showing (i) PACS image and (ii) breached Electronic Health Record system

Size: px
Start display at page:

Download "Overview. Figure 1 - Penetration testing screenshot examples showing (i) PACS image and (ii) breached Electronic Health Record system"

Transcription

1

2 Contents Overview... 3 Why Should We Hack Our Own Systems?... 4 Healthcare is a Soft Target... 4 How About Those Compliance Requirements... 5 Breach Avoidance: Compliance Is Not Enough... 6 Supporting Information Security Teams... 6 Anatomy of a Penetration Test & Top 10 Exposure Areas... 7 Overview... 7 Penetration Testing Methodology... 7 Top 10 Hacking Exposure Areas... 8 Penetration Testing Approaches... 9 Internal and External Penetration Testing... 9 Social Engineering and Phishing Testing... 9 Wireless Security Testing a View into the Company Network from the Parking Lot Web Application and Patient Portal Testing Medical Device Security Testing Account and Password Security Assessments Getting Help with Penetration Testing What to Look for When Hiring a Vendor How Often Should You Conduct a Penetration Test? Conclusion About Meditology For More Information

3 Overview Many organizations make assumptions regarding the security and integrity of their IT systems and network without ever confirming that these assumptions are valid. Oftentimes it is not until an actual security incident occurs that the security risk is exposed and the response capabilities are tested, which is often too late to prevent damage to the organization. One does not have to look far to see the increase of data breaches and hacking attacks that are have been occurring recently, as this seems to be almost a daily headline in the news. Although many of the recent large breaches have been targeted at organizations outside of healthcare, the increase of attacks on health data is significantly on the rise, as highlighted by the recent Anthem and Premera Blue Cross data breaches. Penetration testing, also sometimes referred to as ethical hacking, is terminology used by members of the information technology security community to describe an authorized assessment that simulates the activities a hacker or malicious insider might carry out. Such a test provides the closest thing to a reallife scenario for dealing with an attack. Performing a penetration test can help identify the current state of the security posture and actual technical exposures of an organization to support the prioritization of remediation activities. Testing helps to validate if patching processes are operating effectively, users have strong passwords, IT teams are securely implementing applications and infrastructure components, firewalls are securely configured, medical devices are protected, and other critical security controls are effective. Figure 1 - Penetration testing screenshot examples showing (i) PACS image and (ii) breached Electronic Health Record system 3

4 Why Should We Hack Our Own Systems? Healthcare is a Soft Target Organizations often struggle to understand why a cybercriminal would want to attack a healthcare facility versus other industries with direct access to payment systems such finance or retail. The primary reason to target healthcare data is because medical data and medical identity theft can be very lucrative and it is relatively easier to access due to the lax state of information security in healthcare. Credit card numbers sell for anywhere between $1 and $20 on the black market and Social Security numbers sell for about a $1, whereas medical data sells for an estimated $50 per record. 1 As such, medical data is effectively 50 times more valuable than other data types. Medical data is more valuable because it can be used to file false medical insurance claims, commit traditional identity theft, or to order controlled substances and other prescription medications. A typical healthcare facility may have one or more of the following factors that increase the likelihood of a breach event: Storing large volumes of medical data on dozens of systems and applications with varying security controls. Maintaining sensitive data types including Social Security numbers of patients and employees, and credit card data for patient payment systems, gift shops, donations, and other purposes. Supporting legacy systems that are not configured with routine security updates. Allowing open physical security policies and procedures intended to permit patients and visitors access to healthcare services. Connecting unsecure medical devices to the network. Granting access to vendors and Business Associates with limited security and monitoring controls. Under-funding security budgets that must address both regulatory and risk-based security remediation and controls. According to the Ponemon Institute, Criminal attacks on healthcare organizations have increased 100% since Healthcare breaches have a per record cost of $305 which is higher than the $188 per record cost in other industries. 2 1 RSA, the security division of EMC. (2013) Cybercrime and the Healthcare Industry. Available from 2 Ponemon Institute Cost of Data Breach Study: Global Analysis. Available from 4

5 How About Those Compliance Requirements Healthcare organizations are faced with regulatory compliance programs with formidable security requirements that must be addressed on a continuous basis. The most common regulatory programs include the HIPAA Security Rule, HIPAA Omnibus, American Recovery and Reinvestment Act (HITECH), Meaningful Use incentive program requirements, and the Payment Card Industry Data Security Standard (PCI DSS). Each compliance program has specific requirements for security testing as outlined below. The HITECH Act and HIPAA Omnibus Rule acknowledge the increased risk associated with storing and transmitting Protected Health Information (PHI) by introducing strong penalties (i.e. using a heavy stick approach) for healthcare providers and their Business Associates and subcontractors who fail to meet the HIPAA Security and Privacy Rule mandates. Prior to the enactment of the HITECH Act, the imposition of civil penalties under HIPAA was limited to a maximum of $100 per violation and $25,000 for all violations of an identical requirement or prohibition occurring within the same calendar year. In February 2009, HITECH increased the penalties with a minimum of $100 up to $50,000 per violation, with maximum penalties for violations of the same HIPAA provision of $1.5 million per year. Additionally, criminal penalties of up to $250,000 and up to 10 years in prison for HIPAA violations apply to healthcare covered entities and also to employees and other individuals. In 2013, the Omnibus Rule upped the ante even further by allowing for fines of up to $1.5 million per violation, regardless of how many violations occur concurrently within a given calendar year. The Meaningful Use incentive provisions also threaten reduced reimbursement, starting in 2015, for entities who have not met the requirements for securing Electronic Health Records (EHRs) and patient portals. HIPAA/HITECH/ Omnibus & Meaningful Use NIST SP states a penetration test should be conducted as part of a HIPAA security risk technical evaluation. Supports a thorough risk analysis of environment and application testing in line with Meaningful Use. Can be aligned with HITRUST framework and testing of risk domains. PCI - DSS PCI Requirement requires penetration testing (internal and external testing) if an organization accepts credit card payments from patients or visitors. Required annually or after any major infrastructure change. Exploited vulnerablities must be corrected and re-tested. 3 NIST Special Publications (800 Series). (2008) An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Available from 4 PCI Security Standards Council. (2015) Payment Card Industry (PCI) Data Security Standard, Version 3.1. Available from 5

6 Breach Avoidance: Compliance Is Not Enough There is no silver bullet for preventing breaches, mature security programs need to provide multiple layers of protection to be effective at addressing risks and threats. Hardening systems, conducting regular vulnerability scanning, testing application code, putting robust processes and procedures in place, and having tools to detect and stop attacks are all necessary for building an effective security program. Conducting penetration tests can provide an organization with a check-up on whether or not the security program is working as designed. Conducting an annual penetration test can also help show the progress of the security program and whether the program is moving forward and keeping pace with emerging threats. Figure 2 - Example vulnerability assessment conducted as part of a penetration test Supporting Information Security Teams The importance of information security and risk management is not always well understood at the senior leadership level of many healthcare organizations. This can lead to the information security team not having the full support of the leadership team resulting in difficulties justifying the resources and budgets necessary to support the security program. Presenting the results of a penetration test and demonstrating possible attack scenarios and outcomes specific to the organization can create an eye-opening experience for senior leadership. During recent penetration testing exercises, Meditology was able to obtain millions of patient records and gain access to the organization s most sensitive applications and systems both from the internal network as well as from public-facing Internet touch points. These exercises exposed security weaknesses that IT and security teams were able to rectify well in advance of any potential malicious attacks which could exploit those weaknesses. These real-world attack simulations emphasized to senior leadership the importance of continuing to build and maintain a robust security and risk management program. Penetration tests are also valuable as an educational tool to help IT departments understand the implications of misconfigured systems and applications. Such tests provide teachable moments, which can be one of the most effective ways to impact the overall security posture of an organization over time. 6

7 Anatomy of a Penetration Test & Top 10 Exposure Areas Overview A typical penetration testing assessment may take several weeks to complete depending on the size of the organization and includes both external (malicious outsider) and internal (malicious insider) testing assessments. After testing is complete, a detailed report is produced that outlines the tests conducted, access propagation, security weaknesses and recommendations to correct them, and details of each component tested. Typical penetration testing assessments include: External Penetration Testing Internal Penetration Testing Social Engineering Exercises Phishing Campaigns Physical Security Testing Wireless Security Assessments Patient Portal and Web Application Testing Medical Device Assessments Account and Password Assessments These assessments are further outlined in the document section, Penetration Testing Approaches. Penetration Testing Methodology Penetration testing assessments are conducted according to specific methodologies depending on the type of testing. The following describes five phases for typical internal and external testing assessments. Each phase builds upon the previous phase. Reconnaissance Network Surveying Vulnerability Testing Manual Testing (Ethical Hacking) Analysis and Reporting 7

8 Top 10 Hacking Exposure Areas The following list is the top 10 most common security exposure areas that Meditology has observed from penetration tests of healthcare organizations across the country from the period of 2013 through Weak & Easily Guessable Passwords Plaintext Credentials Missing Critical Security Patches / Outdated OS's Weak Database Administrative Passwords Generic or Default Accounts & Passwords Network Shares with Improper Access Controls Unauthenticated VNC Remote System Access Insecure File Transfer Protocol (FTP) Physical Security Gaps Social Engineering Weaknesses 8

9 Penetration Testing Approaches Internal and External Penetration Testing Internal penetration testing examines the security surrounding internally connected systems, typically within a corporate network. An internal assessment involves the finding and exploitation of actual known and unknown vulnerabilities from the perspective of an inside attacker or someone with physical or logical access to the internal network. An internal assessment attempts to breach the target as a user with vary levels of access. The internal assessment can simulate: A malicious employee or malevolent contractor A hacker who gains physical access to a network port or computer External penetration testing examines the external systems for any weakness that could be used by an attacker to disrupt the confidentially, availability or integrity of the network. This test is conducted from the viewpoint of an outside attacker (from the Internet) exploiting a weakness in the security of a publicfacing network or application. An external penetration test also involves finding and exploiting actual known and unknown vulnerabilities to determine what information is exposed to the outside world. The external assessment can simulate: A hacker targeting systems from the Internet A competitor or foreign entity targeting the organization Social Engineering and Phishing Testing Social Engineering involves psychologically manipulating people into performing actions or divulging confidential information, such as their password, and as a result bypassing normal security procedures. The attacker uses public information from company websites, social media sites, social skills and human interaction to obtain information about an organization, its computer systems and other information in order to gain access to the network. Phishing is a method of obtaining sensitive information from users through deception. Phishing attacks target the acquisition of account information, including user names and passwords, that can be used to obtain unauthorized access to systems that contain PHI or other confidential information. Phishing techniques, typically conducted via , involve deception to try and convince users to provide personal information that should not be released. According to the Verizon Data Breach Report: Analysis found that 78 percent of initial intrusions into corporate networks were relatively easy. Many attackers used a phishing attack, convincing employees to give up credentials, and taking advantage of weak or default passwords on remote services to gain initial access to the network. 5 9

10 Conducting social engineering and phishing exercises helps to reduce the risk and exposure to some of these attacks, and also helps to determine the effectiveness of the security training and awareness program. Social engineering exercises also help an organization test the effectiveness of their policies and procedures. Figure 3 - Example s used in Meditology phishing campaigns 5 Verizon Data Breach Investigations Report. Available from Wireless Security Testing a View into the Company Network from the Parking Lot Wireless testing examines the wireless network to identify and exploit accessible wireless access points and wireless traffic to gain access to the organization s network and sensitive data. Since wireless signals often leak outside buildings or can be reached with high-range antennas, wireless security poses additional risks to an organization. Wireless testing may include encryption key attacks, wireless traffic sniffing, man-in-the-middle attacks, and vulnerability attacks. The wireless assessment can simulate: A malicious user connected to the guest network and attempting to gain access to the internal network. A hacker attempting to bypass wireless security and gain access to the internal network or sensitive data. Web Application and Patient Portal Testing Web application security testing combines application-specific vulnerability and penetration testing to assess the security and integrity of the application. This test checks the application for security and coding weaknesses and attempts to exploit them to gain unauthorized access to the application or to sensitive data and functions. Patient portals serve as a critical component of a healthcare organization. Meaningful Use Stage 2 requires the establishment of a secure web-based patient portal used by both providers and a substantial number of patients. Conducting a patient portal assessment helps demonstrate the portal is secure and can meet Meaningful Use Stage 2 requirements. 10

11 The web application and patient portal assessment can simulate: A hacker from the outside attempting to exploit a vulnerability or security weakness to gain access. A malicious authorized user that attempts to circumvent security controls within the application to gain access to unauthorized sensitive data or manipulate data. For more information, see Meditology s patient portal security whitepaper available from Medical Device Security Testing The security of medical devices and biomedical equipment is an area increasingly subject to scrutiny by the healthcare industry and associated regulators. Many medical devices contain configurable embedded operating systems that can be vulnerable to security breaches. In addition, medical devices are increasingly interconnected both within and outside an organization s network. As such, there is an increased risk of security breaches which could affect how a medical device operates or the safety of patients. The FDA recently issued recommendations for medical device manufacturers and health care facilities to ensure that appropriate safeguards are in place to reduce the risk of failure due to cyber security attacks. Conducting an assessment of medical devices can help to identify security weakness before a breach occurs and potentially causes harm to a patient. The medical device assessment can simulate: A cyber security attack initiated by the introduction of malware into the medical device. Unauthorized access to configuration settings in medical devices and the organization s network. Figure 4 - Penetration testing of medical devices commonly connected to the network Account and Password Security Assessments Network accounts and their associated passwords are oftentimes the weakest security link in healthcare organizations. Organizations maintain many accounts, and these accounts may have weaknesses such as generic or default accounts with default or easily guessable passwords. A simple weakness of having a generic account with an easily guessable password could lead to a full compromise of the network. 11

12 Number of Accounts Conducting periodic account and password assessments can help to find and correct these weaknesses before a hacker does. This testing involves obtaining the account database and using password cracking and analysis tools to report on what is in place and what actions can be taken (technical, process, and training) to help mitigate the risks identified Password Complexity Password Complexity Requirements Figure 5 - The above shows examples of analysis from a typical password assessment 12

13 Getting Help with Penetration Testing What to Look for When Hiring a Vendor There are a many different vendors that offer penetration testing services, but the quality and types of services vary. Use the following tips to help select the right security partner: 1. Does the vendor have experience in conducting healthcare penetration testing? Is healthcare the primary focus? What are the vendor s qualifications in the industry? Is the vendor familiar with healthcare environments and their unique issues, healthcare applications, and medical equipment? Ask the vendor for references from healthcare organizations. 2. Does the vendor know the healthcare regulatory landscape (e.g., HIPAA, HITECH, Omnibus, and PCI)? 3. Does the vendor conduct a comprehensive test that includes many types of scenarios? 4. Is the vendor only conducting a vulnerability scanning assessment? A penetration test consists of more than just identifying vulnerabilities. A thorough test also involves exploiting the vulnerabilities and manually testing for security holes that an automated tool might not be able to discover. 5. Does the vendor try to gain access as well as identify an organization s security weaknesses through the penetration tests? 6. Is the vendor s staff professional and do they know how to communicate the technical results through reporting and presentation to senior leadership and other non-technical stakeholders? Does the vendor have testing methodologies? 7. Does the vendor know how to minimize the potential for impacting patient safety and critical systems including common healthcare applications that may be brought offline due to vulnerability scanning activities? 8. Does the vendor provide clear, prescriptive, and tailored recommendations and offer advice to help an organization address and correct the weaknesses discovered during the testing? How Often Should You Conduct a Penetration Test? There is no hard and fast rule regarding when and how often an organization should conduct a penetration test. The frequency is based on many factors such as regulatory compliance obligations, the value of the information being protected, the objectives and type of security problem being assessed, major changes to the environment, the size of the organization, and the type of support and budget for these activities. The following section offers recommendations regarding the frequency of penetration tests: If an organization has never conducted a penetration test and wants to protect valuable assets, conduct a comprehensive test as soon as possible. If an organization has conducted its first penetration test, plan to conduct penetration tests annually and after any major infrastructure change. If a penetration test identifies critical vulnerabilities, retest after remediation is complete. If an organization conducts a risk assessment (e.g., HIPAA, PCI), conduct a penetration test at the same time to support the risk assessment process from a deep technical perspective. If an organization wants to address specific security concerns, schedule targeted types of penetrations tests either quarterly or semiannually. These tests may include vulnerability scanning (external and internal), security awareness testing (social engineering and phishing), wireless security assessments, application assessments, or account and password assessments. 13

14 Conclusion Healthcare organizations are increasingly becoming a target for hackers and cybercriminals as the recent major healthcare data breaches have shown. The value of patient data, coupled with a growing number of complex systems and applications electronically storing, communicating and exchanging sensitive data within a typical healthcare facility, have made it a rich target. Conducting regular penetration testing as described in this white paper can assist organizations in identifying their weaknesses, gaining the support they need, and taking the necessary actions to prevent a data breach from occurring and maturing their overall security program. About Meditology Meditology Services LLC is a healthcare-focused advisory services firm with core principles of quality, integrity, loyalty, and value. Our executive team has an average of 15 years of consulting and operational experience in healthcare with provider and payer clients nationally of varying size and complexity. We understand the importance of relationships, and derive much of our business from a long list of satisfied clients who value the quality of our work products combined with the professionalism, approach, and innovative solutions we bring to our engagements. Meditology s security professionals have decades of experience and expertise in conducting penetration testing specifically for healthcare organizations across the country. For More Information Meditology Services LLC 5256 Peachtree Road, Suite 190 Atlanta, GA [email protected] Tel. (404)

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing

More information

Nine Network Considerations in the New HIPAA Landscape

Nine Network Considerations in the New HIPAA Landscape Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant

More information

Cyber Security Management

Cyber Security Management Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

Cyber Security An Exercise in Predicting the Future

Cyber Security An Exercise in Predicting the Future Cyber Security An Exercise in Predicting the Future Paul Douglas, August 25, 2014 AUDIT & ACCOUNTING + CONSULTING + TAX SERVICES + TECHNOLOGY I www.pncpa.com I www.pntech.net What is Cyber Security? Measures

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS Ebook YOUR HIPAA RISK ANALYSIS IN FIVE STEPS A HOW-TO GUIDE FOR YOUR HIPAA RISK ANALYSIS AND MANAGEMENT PLAN 2015 SecurityMetrics YOUR HIPAA RISK ANALYSIS IN FIVE STEPS 1 YOUR HIPAA RISK ANALYSIS IN FIVE

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com 7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information

More information

I ve been breached! Now what?

I ve been breached! Now what? I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone

More information

Cybersecurity for Meaningful Use. 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

Cybersecurity for Meaningful Use. 2013 FRHA Annual Summit Setting the Health Care Table: Politics, Economics, Health November 20-22, 2013 Cybersecurity for Meaningful Use 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013 Healthcare Sector Vulnerable to Hackers By Robert O Harrow Jr.,

More information

FACT SHEET: Ransomware and HIPAA

FACT SHEET: Ransomware and HIPAA FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology

More information

SecurityMetrics Vision whitepaper

SecurityMetrics Vision whitepaper SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,

More information

2016 OCR AUDIT E-BOOK

2016 OCR AUDIT E-BOOK !! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?

More information

Technical Testing. Network Testing DATA SHEET

Technical Testing. Network Testing DATA SHEET DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

What is required of a compliant Risk Assessment?

What is required of a compliant Risk Assessment? What is required of a compliant Risk Assessment? ACR 2 Solutions President Jack Kolk discusses the nine elements that the Office of Civil Rights requires Covered Entities perform when conducting a HIPAA

More information

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help The Health Information Portability and Accountability Act (HIPAA) Omnibus Rule which will begin to be enforced September 23, 2013,

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

KEY STEPS FOLLOWING A DATA BREACH

KEY STEPS FOLLOWING A DATA BREACH KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,

More information

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001 001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Guided HIPAA Compliance

Guided HIPAA Compliance Guided HIPAA Compliance HIPAA Solutions for Office Managers and Practitioners SecurityMetrics We protect business Since its founding in 2000, privately-held SecurityMetrics has grown from a small security

More information

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1 PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a

More information

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities

More information

Orbograph HIPAA/HITECH Compliance, Resiliency and Security

Orbograph HIPAA/HITECH Compliance, Resiliency and Security Orbograph HIPAA/HITECH Compliance, Resiliency and Security Version 1.0 August 2013 Legal Notice This document is delivered subject to the following conditions and restrictions: The document contains proprietary

More information

Franchise Data Compromise Trends and Cardholder. December, 2010

Franchise Data Compromise Trends and Cardholder. December, 2010 Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee

More information

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

Somansa Data Security and Regulatory Compliance for Healthcare

Somansa Data Security and Regulatory Compliance for Healthcare Somansa White Paper Somansa Data Security and Regulatory Compliance for Healthcare How Somansa can protect ephi- electronic patient health information and meet the requirements for healthcare compliances,

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

How To Protect Yourself From Cyber Threats

How To Protect Yourself From Cyber Threats Cyber Security for Non- Profit Organizations Scott Lawler CISSP- ISSAP, ISSMP, HCISPP Copyright 2015 LP3 May 2015 Agenda IT Security Basics e- Discovery Compliance Legal Risk Disaster Plans Non- Profit

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

Best Practices for DLP Implementation in Healthcare Organizations

Best Practices for DLP Implementation in Healthcare Organizations Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology

More information

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments DATA SHEET Technical Testing Application, Network and Red Team Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased

More information

HIPAA Compliance Review Analysis and Summary of Results

HIPAA Compliance Review Analysis and Summary of Results HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk

More information

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology A comprehensive approach

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

AUTOMATED PENETRATION TESTING PRODUCTS

AUTOMATED PENETRATION TESTING PRODUCTS AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate

More information

Information Security and Risk Management

Information Security and Risk Management Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management

More information

Website Security: How to Avoid a Website Breach. Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions

Website Security: How to Avoid a Website Breach. Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions Website Security: How to Avoid a Website Breach Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions www.caretech.com > 877.700.8324 An enterprise s website is now

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002 ForeScout CounterACT and Compliance An independent assessment on how network access control maps to leading compliance mandates and helps automate GRC operations June 2012 Overview Information security

More information

Payment Card Industry Data Security Standards

Payment Card Industry Data Security Standards Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This

More information

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services / BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment

More information

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING WHITE PAPER SMART THINKING. DELIVERED. SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING WWW.SERVERCHOICE.COM INTRODUCTION Penetration testing, or pen tests, can be a confusing subject for many

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

Preparing for the HIPAA Security Rule

Preparing for the HIPAA Security Rule A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions

More information

V ISA SECURITY ALERT 13 November 2015

V ISA SECURITY ALERT 13 November 2015 V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance

More information

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Guidance on Risk Analysis Requirements under the HIPAA Security Rule Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.

More information