Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum



Similar documents
An Independent Member of Baker Tilly International

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

HIPAA Requirements and Mobile Apps

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Healthcare Information Security Today

Cyber Security An Exercise in Predicting the Future

Guideline on Safe BYOD Management

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Big Data, Big Risk, Big Rewards. Hussein Syed

Cyber Security Metrics Dashboards & Analytics

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

INFORMATION SECURITY FOR YOUR AGENCY

Overview of the HIPAA Security Rule

Internet threats: steps to security for your small business

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Data Protection Act Bring your own device (BYOD)

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

10 Quick Tips to Mobile Security

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

EHS Privacy and Information Security

The CIO s Guide to HIPAA Compliant Text Messaging

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

Network Security & Privacy Landscape

I ve been breached! Now what?

What s New with HIPAA? Policy and Enforcement Update

Managing Mobile Device Security

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Security Best Practices for Mobile Devices

HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals

State of Security Survey GLOBAL FINDINGS

State of South Carolina Policy Guidance and Training

Secure Your Mobile Workplace

plantemoran.com What School Personnel Administrators Need to know

BYOD: End-to-End Security

Cyber Self Assessment

White Paper. Data Security. The Top Threat Facing Enterprises Today

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

Encryption Made Simple for Lawyers

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Why Encryption is Essential to the Safety of Your Business

How To Protect Yourself From Cyber Threats

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

FDA Releases Final Cybersecurity Guidance for Medical Devices

F G F O A A N N U A L C O N F E R E N C E

Conducting a Risk Assessment for Mobile Devices

Use of tablet devices in NHS environments: Good Practice Guideline

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Datto Compliance 101 1

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Hands on, field experiences with BYOD. BYOD Seminar

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

Data Breach Response Planning: Laying the Right Foundation

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

What Data? I m A Trucking Company!

HIPAA and HITECH Compliance for Cloud Applications

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

NATIONAL CYBER SECURITY AWARENESS MONTH

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Transcription:

Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum 8th Annual NJ/DV Conference: IT - The Politics of Healthcare October 29, 2015 Atlantic City, NJ William Buddy Gillespie, HCISPP Steven J. Fox, Esq.

Agenda The Mobile Physician Good Old Days Information Technology HIMSS Survey Laws & Regulations Tools & Best Practices CyberSecurity

Today s Mobile Physician Mobility + Connectivity Risk + Consumerization & BYOD 3

The Good Old Days Games Personal Data Apps Hospital Issued 4

The Good Old Days Hospital Data Personal Data 5

IT Department NO! Games Personal Data Apps 6

Employees Are Anarchists! 7

Consumerization of IT Convenience Connectivity Productivity Image Marketing Cost? 8

Consumerization of IT BYOD Hospital Issued Consumer Devices 9

2015 HIMSS Mobile Technology Survey 10

Summary of Results 90% of respondents use mobile devices to engage patients 73% have app-enabled patient portals 62% use telehealth services 57% engage in text communications 11

Summary of Results 49% use remote patient monitoring 14% report all or most mobile generated data is integrated into an EHR 52% report some data integrated into an EHR 38% make SMS texting available to providers & clinical staff 12

Laws and Regulations HIPAA PHI Covered Entities Business Associates Privacy & Security State Laws 13

HIPAA - Encryption Addressable Requirement 14

Unencrypted Email = A Postcard Bruce Schneier (1995, 2000 +) Larry Rogers (2001) ( written in pencil ) Google Official Blog (June 3, 2014) New York Times (July 16, 2014) 15

Google End-to-End Encryption 16

Reasonable Expectation of Privacy? Postcard Electronic Communications Privacy Act J!NX.com 17

Security Concerns - Threats Disgruntled / dishonest insiders Hackers Hactivists Criminals Malware Law enforcement Government surveillance State-sponsored espionage 18

Mobile Threats Lost, misplaced or stolen No user authentication Weak user authentication Intercepted wireless Malware Malicious attachments Malicious or compromised websites Phishing Shortened URLs QR Codes 19

20

Lost & Stolen Phone Statistics Cellphone robberies on downward trend, but in 2014, 10% of U.S. smartphone users had phones stolen (Lookout) 3.1 million Americans victims in 2013; additional 1.4 million estimated lost (Consumer Reports) 44% of stolen phones were left in public place 70% of victims never recover their phones 21

Lost & Stolen Phone Statistics In 2013, 60% of robberies in San Francisco involved a mobile phone Only 29% of users back up their data to a computer or online 36% of owners use a 4-digit password 11% use password longer than 4 digits 34% use no password or pin 22

Lost & Stolen Devices: Considering the high frequency of lost assets, encryption is as close to a no brainer solution as it gets for this incident pattern. Sure, the asset is still missing, but at least it will save a lot of worry, embarrassment, and potential lawsuits by simply being able to say the information within it was protected. 23

Learning from the Past? Jan. 2015: Wash.-based Premera Blue Cross, 11 million records (initial attack in May 2015) Feb. 2015: Anthem, Inc., 78.8 million records May 2015: CareFirst BlueCross BlueShield, 1.1 million records June 2015: Office of Personnel Management, 10 million records 24

Mobile Security Secure Setup Secure Use Control (MDM) (EMM) 25

Program / Policy 26

Mobile Device Management (EMM) Require security settings Can wipe business data Personal w/ a business sandbox Disable device features Restrict apps permitted in business area 27

Consensus Minimum Safeguards 28

Secure Setup 1. Review and follow the security instructions of the phone manufacturer and carrier. 2. Maintain physical control of the phone. 3. Set a strong password, passphrase, or PIN. 4. Set locking/wiping after a set number of failed log-on attempts. 5. Set automatic logoff after a defined time. 6. Encrypt confidential data on the phone and any storage card. 29

Secure Setup 7. Provide for protection of data in transit. 8. Disable interfaces that are not being used. (Bluetooth, Wi-Fi, etc.) 9. Enable remote location of a lost device and remote locking and wiping. (May require 3 rd party software or service.) 10. Consider use of 3 rd party security apps (antivirus, encryption, remote locating and wiping, etc.). 11. Backup important data. 12. Don t jailbreak or root a smartphone. 30

Passwords / PINS = First line of defense - Should be complex - Most common passwords: - password - 123456 - qwerty (InTechnology.com) 31

32

Secure Use 1. Limit confidential data on the phone to what is necessary. 2. Be careful in selecting and installing applications. Pay attention to permissions. 3. Configure web accounts to use secure connections. 4. Be careful in using unknown and public wireless clouds. (Or avoid using them.) 5. Don t follow suspicious links in e-mails and text messages. Be careful with attachments. 33

Turn WiFi off when not in use Turn Bluetooth off when not in use 34

Wireless Networks Wired Equivalent Privacy (WEP) weak! Wi-Fi Protected Access (WPA) - cracked Wi-Fi Protected Access, second generation (WPA2) Sniffer programs War driving Pineapple Evil twin Picture: Wikipedia.org 35

Air cards - MiFi Connects to a private data network of the wireless service provider 36

Proceed With Caution! E-mail 37

More Secure Business Enterprise 38

Encryption - Who has the key? Internet End User Cloud Service Provider 39

Gartner: [Dropbox for Business] a viable offering for organizations...worrying less about IT control and data protection 40

Installing Apps Wireless Carriers Others 41

Permissions 42

Terms of Use 43

Encrypted Portable Media CMS Secure Vault SanDisk Ironkey (Imation) Imation Bitlocker to Go Seagate Go Flex 44

CyberSecurity -The Problem EMR

CyberSecurity -The Problem Not only do medical EHR systems themselves pose security risks, but the movement towards making patient data available wherever they may access medical services, implemented through participation in health information exchanges (HIEs), exacerbates the level of risk by posing additional threat vulnerabilities. HIEs face funding challenges due to the fact that they lack clear-cut and profitable business models, and yet federal grants and deadlines maintain a level of time pressure for implementing these systems that do not allow for thorough considerations of security.. Doug Pollack, strategy officer at ID Experts, responsible for strategy and innovation including prevention analysis and response services. As a veteran in the technology industry, he has over 25 years of experience in computer systems, software, and security concerns focusing on creating successful new products in new emerging markets.

CyberSecurity Internet Usage In 1995, 16 million users (0.4%) In 2010, 1.6 billion users (23.5%)

Cyber-Attack - Trends Increasing sophistication Decreasing costs Increasing attack frequency Difficulties in patching systems Increasing network connections, dependencies, and trust relationships

CyberSecurity Top Concerns Mobile Devices - BYOD Medical Devices/Robotic Surgery HIPAA & BAAs Cloud Hosting Internal & External Breaches Data Leakage Limits of Technology & Inadequate Security Systems Funding Patient s Lack of Confidence Third Parties-Vendors Remote Connections

Cyber Security - CIA Confidentiality (privacy) Integrity (quality, accuracy, relevance) Availability (accessibility)

CyberSecurity ONC Guidelines New privacy and security guidelines--aimed at protecting the vast amount of healthcare information are now in place. HIEs are networks intended to help states manage the electronic exchange of health information among health care providers and hospitals within their states and across state lines. Privacy and security policies are required as a condition of accepting part of the $550 million federal grant money funding the development of state-based HIEs. The guidelines, issued by the Office of the National Coordinator for Health IT (ONC), provide a common set of "rules of the road" designed to build confidence in the system on both the provider and patient level.. ONC

Cyber Security ONC Guidelines Under the new guidelines, state HIE grantees are required to develop privacy and security policies to address each of the fair information practice principles as outlined by ONC. The principles include individual access to information; the right to correct errors; openness and transparency; collection, use and disclosure limitations; security safeguards; data quality and integrity; individual choice; and accountability.

Cyber Security Privacy & Security Policies All of the information is password protected and encrypted at its source using state of the art tools to protect the transmission and security of the data. Access to the network is monitored and restricted to only those qualified medical professionals who have demonstrated a need to know the requested information.

Cyber Security Security Architecture The secure exchange of electronic health information is important to the development of electronic health records (EHRs) and to the improvement of the U.S. healthcare system. While the U.S. healthcare system is widely recognized as one of the most clinically advanced in the world, costs continue to rise, and often preventable medical errors occur. Health information technology (HIT), especially the development of electronic health records for use in both inpatient and ambulatory care settings, has the potential for providing reliable access to health information and thereby improving the healthcare system. However, the prospect of storing, moving, and sharing health information in electronic formats raises new challenges on how to ensure that the data is adequately protected.

Cyber Security NIST Security Architecture NIST published "Security Architecture Design Process for Health Information Exchanges (HIEs) (NISTIR 7497)" in September 2010, to provide a systematic approach to designing a technical security architecture for the exchange of health information that leverages common government and commercial practices and that demonstrates how these practices can be applied to the development of HIEs. The publication assists organizations in ensuring that data protection is adequately addressed throughout the system development life cycle, and that these data protection mechanisms are applied when the organization develops technologies that enable the exchange of health information.

Cyber Security Security Architecture The operating model outlined in the NIST publication will help organizations that are implementing HIEs to: Understand major regulations and business drivers. Identify cross-organizational enabling services. Define supporting business processes (for each service). Develop notional architectures (as a blueprint to support services, processes, and the selection of technical solutions). Select technical solutions.

CyberSecurity Medical Devices/Robotic Surgery Summary of Problem and Scope: Many medical devices contain configurable embedded computer systems that can be vulnerable to cybersecurity breaches. In addition, as medical devices are increasingly interconnected, via the Internet, hospital networks, other medical device, and smartphones, there is an increased risk of cybersecurity breaches, which could affect how a medical device operates

Cyber Security Medical Devices/Robotic Surgery General Principles Manufacturers should develop a set of security controls to assure medical device cyber security to maintain information confidentiality, integrity, and availability.

CyberSecurity Medical Devices - FDA On June 13, 2013, in response to increased reports of computer viruses and other cyber security breaches concerning medical devices and hospital networks, the Food and Drug Administration (FDA) issued a safety communication on cyber security for medical devices and hospital networks and a new draft guidance document, "Content of Premarket Submissions for Management of Cybersecurity in Medical Devices."

CyberSecurity ICS-CERT What is ICS-CERT? The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) provides a control system security focus in collaboration with US-CERT to: Conduct vulnerability and malware analysis Provide onsite support for incident response and forensic analysis Provide situational awareness in the form of actionable intelligence Coordinate the responsible disclosure of vulnerabilities/mitigations Share and coordinate vulnerability information and threat analysis through information products and alerts.

CyberSecurity Best Practices Best Practices for Technology Environment Configuration Management Software Maintenance Operating Maintenance Mobile Device Management (BYOD) Security Culture Backup and DR Checklists and ITSM for all Elements

CyberSecurity Best Practices Passwords & Strong Authentication Anti-Virus Software Firewall(s) Controlled Access to PHI Controlled Physical Access Limit Network Access Plan for the Unexpected

CyberSecurity The Next Frontier Accountable Care Organizations (ACOs) Portals HIEs & Direct-HISPs Cloud Hosting Meaningful Use HIPAA Omnibus Bill

CyberSecurity Reference Sites HHS Office for Civil Rights website (http://www.hhs.gov/ocr/privacy/hipaa /understanding/) NIST 800 Series Special Publications (http://csrc.nist.gov/publications/pubs SPs.html)

CyberSecurity Reference Sites CYBER SECURITY Guide The protection of data and systems in networks that connect to the Internet 10 Best Practices http://nyehealth.org/wp- content/uploads/2012/07/onc_cyber- Security-Guide-V-1.0.pdf

QUESTIONS? William Buddy Gillespie, HCISPP @budgill, #budgill, budgill@aol.com Steven J. Fox sjfox@postschell.com Acknowledgment: These slides are based on a presentation by Steve Fox & David G. Ries to the ABA Health Law section on March 6, 2015 and a presentation by William J. Gillespie to the Carnegie Mellon University CERT Symposium on June 26, 2013. 69