Protecting Patient Data From Hacker Ransom Demands

BakerHostetler
Contact

Forty bitcoins later (approximately $17,000), Hollywood Presbyterian Hospital can now access its electronic medical health records and return to treating its patients as scheduled. But as hackers develop new tools to access information, an increasing number of providers will be targeted and ransom demands will escalate, putting hospitals and patients at risk. Focusing on technical cybersecurity protection, workforce training, and comprehensive risk analysis and management will enable covered entities and business associates to better withstand attacks and reduce vulnerabilities.

On February 2, 2016, three days prior to the attack on Hollywood Presbyterian Hospital, the Office for Civil Rights (OCR) released an email on ransomware and preventing ransomware infection as part of its cybersecurity awareness initiative. Ransomware is a type of malware that can infect systems, encrypt files, or otherwise block users from their data until the institution or person pays a ransom to regain access. As with any malware, the avenue of attack can be email, open remote connection ports, and more. Hollywood Presbyterian Hospital is working with the Federal Bureau of Investigation to identify the route of the attack.

Mitigating Risks

Covered entities and business associates must remain vigilant against cybersecurity attacks to avoid becoming the next victim of a ransomware attack. At a minimum, covered entities and business associates should focus on the following three areas:

  • Technical cybersecurity protection
  • Workforce training
  • Comprehensive risk analysis and management

OCR continues to enable covered entities and business associates to achieve HIPAA compliance with guidance on different HIPAA components. Most recently, OCR released its crosswalk between the HIPAA Security Rule and the National Institute of Science and Technology (NIST) Cybersecurity Framework. The crosswalk can be used to identify any gaps in cybersecurity between NIST’s framework and HIPAA requirements, as well as help bolster existing cybersecurity with the NIST standards.

In addition to technical protections, workforce training is the second line of defense against malware such as ransomware. The HIPAA Security Rule requires security awareness and training for workforce members of covered entities. 45 C.F.R. 164.308 (a)(5). Regular bulletins with short examples of malware attacks or guidance on assessing and responding to malware incidents, along with training focused on recognizing malware and emphasizing best practices in email and Internet security, will help protect healthcare providers against successful malware attacks.

Finally, the importance of risk analyses and management plans cannot be overstated. A proper risk analysis will identify any gaps in device security and server security, making sure that the covered entity or business associate is not wide open to malware propagated by hackers.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© BakerHostetler | Attorney Advertising

Written by:

BakerHostetler
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

BakerHostetler on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide