EHS Privacy and Information Security



Similar documents
Cybersecurity. Are you prepared?

CSUF Tech Day Security Awareness Overview Dale Coddington, Information Security Office

Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things

a new approach to IT security

Nuclear Security Requires Cyber Security

Healthcare Information Security Today

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Logging In: Auditing Cybersecurity in an Unsecure World

Data Breach and Senior Living Communities May 29, 2015

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum

The SMB Cyber Security Survival Guide

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

Cyber Security An Exercise in Predicting the Future

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

I ve been breached! Now what?

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK

Security Breach: 10 Industries Impacted

Small businesses: What you need to know about cyber security

Big Data, Big Risk, Big Rewards. Hussein Syed

10 best practice suggestions for common smartphone threats

Reducing Cyber Risk in Your Organization

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

How-To Guide: Cyber Security. Content Provided by

Mobile Devices Policy

Security Is Everyone s Concern:

National Cyber Security Month 2015: Daily Security Awareness Tips

Addressing Evolving Threats & Responses in a MITA 3.0 World Robert Myles, CISSP, CISM

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

SENDING HIPAA COMPLIANT S 101

Bring Your Own Device (BYOD) and Mobile Device Management.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

US Cyber Marathon. David Ambrose, Chief Security Officer and Chief Privacy Officer Bureau of the Fiscal Service U.S. Department of the Treasury

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Average annual cost of security incidents

Cyber Security. John Leek Chief Strategist

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

Tom Schauer TrustCC cell

Cybersecurity: Protecting Your Business. March 11, 2015

10 Smart Ideas for. Keeping Data Safe. From Hackers

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

BYOD Policy for [AGENCY]

State of South Carolina Policy Guidance and Training

5 things to consider when designing a security strategy for the Cloud William Crank, MEDHOST, Blake Sutherland, VP, Enterprise Business, Trend Micro

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

HIPAA Compliance: Efficient Tools to Follow the Rules

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Why Encryption is Essential to the Safety of Your Business


How To Protect Yourself From Cyber Threats

White Paper. Data Security. journeyapps.com

Cutting through the insurance jargon!

Transcription:

EHS Privacy and Information Security Resident Orientation 26 June 2015 Steve Winter CISSP, CNE, MCSE Senior Information Security Engineer Privacy and Information Security Office Erlanger Health System

Topics Privacy Threats to healthcare information security Internet access at EHS Secure file sharing USB drives BYOD Policies 2

Privacy Accessing patient information You may access the PHI of ONLY patients that you are involved in providing healthcare 3

Accessing patient information Privacy You may NOT access these types of PHI : Your own Family Friends Neighbors Co-workers Anyone else that you are not involved in providing treatment Automated monitoring Daily alerts for these types of events Your director will be contacted when this type of inappropriate activity occurs 4

Privacy Papers Census documents and anything containing PHI Keep track of them 5

Privacy Pictures and video CEO takes patient privacy very seriously Erlanger doctors have been disciplined recently for this type of inappropriate activity Social media, cloud storage, texts, emails Texting: BAD: This patient just needs to die! OK: Please check on patient in room 400 for cardiac issue Assume anything you send is publicly available 6

Threats to healthcare information security Poor information security hygiene Appropriate management of IT resources Software updates Shared responsibility EHS and users 7

Threats to healthcare information security Legislation 8

Threats to healthcare information security in 2015 Attacks from nation states Anthem -- 80 million patient records stolen Premera Blue Cross 11 million patient records CareFirst -- More than 1 million patient records stolen Several smaller healthcare organizations reportedly faced cybersecurity incidents According to the Experian Forecast, the threat level for healthcare organization is rising, and data breach costs could top $5.6 Billion in 2015 9

Threats to healthcare information security in 2015 For the healthcare industry, the personal information leaked in cyber attacks can cause a degree of damage other industries rarely see. Consumer data held by healthcare companies goes beyond credit card numbers and financial information, to sensitive details of people s prescriptions, medical histories, and illnesses. 10

Threats to healthcare information security Risk appetite -- the amount and type of risk that an organization is willing to take in order to meet their strategic objectives. Vendors Contractors New acquisitions New ventures New systems New users Management of legacy systems, procedures and people 11

Threats to healthcare information security Changes outside of healthcare Breaches at Target, Home Depot, Michaels, PF Changs and many others Flooded black market credit cards The new money maker: identity theft Perfect storm 12

Internet access at EHS Minimum necessary access Generic users Your EHS network account Personal devices Use ehsmainsecure Tech support: Call 423.778.8324 (TECH) or Email: servicedesk@antheliohealth.com 13

Secure file sharing Internal SharePoint sites Network drives EHS email accounts Webmail access: https://ehsmail.erlanger.org External To be addressed 14

USB drives Just say no Don t use or accept any FREE USB drives Do not use a USB drive you find. BadUSB undetectable malware If you have to use one, use an IronKey that is tamper-proof 15

BYOD Accessing EHS data on your personal device Minimum requirements: No jailbroken ios or rooted Android phones Password assigned to the device Encrypted Screen timeout Keep it updated with the latest operating system Search Google for instructions on how to secure your particular device 16

Policies http://ehsintranet EHS Policies & Procedures Most policies for privacy and information security are under Administration 17

EHS Privacy and Information Security Questions? Comments? Email: privacy@erlanger.org Phone: Office of Compliance x7703 18