Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
2
3
5
6
7
8
11
12
13
14
15
16
17
18
19
20
21
22
24
25
26
27
28
30
1
2
3
4
5
The 10th Annual Traumatic Brain Injury Conference
2020-06-01 - 2020-06-02    
All Day
Arrowhead Publishers is pleased to announce its 10th Annual Traumatic Brain Injury Conference will be coming back to Washington, DC on June 1-2, 2020. This conference brings [...]
5th World Congress On Public Health, Epidemiology & Nutrition
2020-06-01 - 2020-06-02    
All Day
We invite all the participants across the world to attend the “5th World Congress on Public Health, Epidemiology & Nutrition” during June 01-02, 2020; Sydney, [...]
Global Conference On Clinical Anesthesiology And Surgery
2020-06-04 - 2020-06-05    
All Day
Miami is an International city at Florida's southeastern tip. Its Cuban influence is reflected in the cafes and cigar shops that line Calle Ocho in [...]
5th International Conferences On Clinical And Counseling Psychology
2020-06-09 - 2020-06-10    
All Day
Conferenceseries LLC Ltd and its subsidiaries including iMedPub Ltd and Conference Series Organise 3000+ Conferences across USA, Europe & Asia with support from 1000 more scientific societies and Publishes 700+ Open [...]
50th International Conference On Nursing And Healthcare
2020-06-10 - 2020-06-11    
All Day
Conference short name: Nursing Conferences 2020 Full name : 50th International conference on Nursing and Healthcare Date : June 10-11, 2020 Place : Frankfurt, Germany [...]
Connected Claims USA Virtual
The insurance industry is built to help people when they are in need, and only the claims organization makes that possible. Now, the world faces [...]
Federles Master Tutorial On Abdominal Imaging
2020-06-29 - 2020-07-01    
All Day
The course is designed to provide the tools for participants to enhance abdominal imaging interpretation skills utilizing the latest imaging technologies. Time: 1:00 pm - [...]
IASTEM - 864th International Conference On Medical, Biological And Pharmaceutical Sciences ICMBPS
2020-07-01 - 2020-07-02    
All Day
IASTEM - 864th International Conference on Medical, Biological and Pharmaceutical Sciences ICMBPS will be held on 3rd - 4th July, 2020 at Hamburg, Germany . [...]
International Conference On Medical & Health Science
2020-07-02 - 2020-07-03    
All Day
ICMHS is being organized by Researchfora. The aim of the conference is to provide the platform for Students, Doctors, Researchers and Academicians to share the [...]
Mental Health, Addiction, And Legal Aspects Of End-Of-Life Care CME Cruise
2020-07-03 - 2020-07-10    
All Day
Mental Health, Addiction Medicine, and Legal Aspects of End-of-Life Care CME Cruise Conference. 7-Night Cruise to Alaska from Seattle, Washington on Celebrity Cruises Celebrity Solstice. [...]
ISER- 843rd International Conference On Science, Health And Medicine ICSHM
2020-07-03 - 2020-07-04    
All Day
ISER- 843rd International Conference on Science, Health and Medicine (ICSHM) is a prestigious event organized with a motivation to provide an excellent international platform for the academicians, [...]
04 Jul
2020-07-04    
12:00 am
ICRAMMHS is to bring together innovative academics and industrial experts in the field of Medical, Medicine and Health Sciences to a common forum. All the [...]
Events on 2020-06-04
Events on 2020-06-10
Events on 2020-06-23
Connected Claims USA Virtual
23 Jun 20
London
Events on 2020-06-29
Events on 2020-07-02
Articles

Can EHR’s Survive Cyber Attacks With An Antidote of Machine-Learning, Ambience and Behavioral Analytics?

By Santosh Varughese, president, Cognetyx, delivering ‘Ambient Cognitive Cyber Surveillance’ to protect information assets against cyber security threats, data breaches and privacy violations.

 

Since cybersecurity healthcare threats on hospital EHR systems have become a topic of nightly newscasts, no longer is anyone shocked by their scope and veracity. What is shocking is the financial damage the attacks are predicted to cause as they reverberate throughout the economy.

In the 30 days of June 2016, more than 11 million patient EHRs were breached, making it the year’s worst incident according to a study by DataBreaches.net and Prontenus. For comparison, May had less than 700,000 and 2016’s former breach leader (March) topped out at just over 2.5 million.

While traditional security filters like firewalls and reputation lists are good practice, they are no longer enough.  Hackers increasingly bypasses perimeter security, enabling cyber thieves to pose as authorized users with access to hospital networks for unlimited periods of time. The problem is not only high-tech, but also low-tech, requiring that providers across the continuum simply become smarter about data protection and privacy issues. Medical facilities are finding they must teach doctors and nurses not to click on suspicious links.

However, organizational threats manifest themselves through changing and complex signals that are difficult to detect with traditional signature-based and rule-based monitoring solutions. These threats include external attacks that evade perimeter defenses and internal attacks by malicious insiders or negligent employees.

Along with insufficient threat detection, traditional tools can contribute to “alert fatigue” by excessively warning about activities that may not be indicative of a real security incident. This requires skilled security analysts to identify and investigate these alerts when there is already a shortage of these skilled professionals.  Hospital CISOs and CIOs already operate under tight budgets without needing to hire additional cybersecurity guards.

Healthcare security pros need to pick up where those traditional security tools end and realize that it’s the data that is ultimately at risk. The safeguarding of the EHR data is as important, if not more imperative, than just protecting the network or the perimeter.

Some cybersecurity sleuths deploy a variety of traps, including identifying an offensive file with a threat intelligence platform using signature-based detection and blacklists that scans a computer for known offenders. This identifies whether those types of files exist in the system which are driven by human decisions.

However, millions of patient and other medical data files need to be uploaded to cloud-based threat-intelligent platforms, scanning a computer for all of them would slow the machine down to a crawl or make it inoperable. But the threats develop so fast that those techniques don’t keep up with the bad guys and also; why wait until you are hacked?

The Mix of Forensics and Machine Learning

Instead of signature and reputation-based detection methods, smart healthcare CSOs and CISOs are moving from post-incident to pre-incident threat intelligence.  They are looking at artificial intelligence innovations that use machine learning algorithms to drive superior forensics results.

In the past, humans had to look at large sets of data to try to distinguish the good characteristics from the bad ones. With machine learning, the computer is trained to find those differences, but much faster with multidimensional signatures that detect problems and examine patterns to identify anomalies that trigger a mitigation response.

The Good, the Bad and the Ugly

Machine learning generally works in two ways: supervised and unsupervised.  With supervised learning, humans tell the machines which behaviors are good and bad (ugly), and the machines figure out the commonalities to develop multidimensional signatures. With unsupervised learning, the machines develop the algorithms without having the data labeled, so they analyze the clusters to figure out what’s normal and what’s an anomaly.

The obvious approach is to implement an unsupervised, machine learning protective shield that delivers a defense layer to fortify IT security across EHR platforms and other hospital IT systems.  A self-learning system with the flexibility of being able to cast a rapidly scalable safety net across an organization’s information ecosystem, distributed or centralized, local or global, cloud or on-premise. Whether data resides in a large health system or small chain of clinics, rogue users are identified instantly.

By applying machine learning techniques across a diverse set of data sources, systems become increasingly intelligent by absorbing more and more relevant data. These systems can then help optimize the efficiency of hospital security personnel, enabling organizations to more effectively identify threats.  With multiple machine learning modules to scrutinize security data, organizations can identify and connect otherwise unnoticeable, subtle security signals.

Healthcare security analysts of all experience levels can also be empowered with machine learning through pre-analyzed context for investigations, making it easier for them to discover threats.  This enables hospital CISOs to proactively combat sophisticated EHR attacks by accelerating detection efforts, reducing the time for investigation and response.

The Digital Eye Sees All

Once a machine learning system is in place, organizations need to identify solutions that employ behavioral analytics which will baseline normal behaviors and identify irregularities. While the technology is advanced, the concept is simple.

“EHR interoperability continues to be a big problem for hospitals and the entire healthcare industry,” says Dr. Donald Voltz, an EMR Industry Advisor. “However, the theft of patient data is worse. EHR systems and EHR-compatible health care systems produce and manage a lot of data. This makes the industry a sitting duck for cybercriminals. With a cloud-based security net of machine-learning, ambient technology and behavioral analysis that can cover all of the EHR platforms, interoperable or not, a great high tech security blanket is achieved.”

Ambient Cognitive Cyber Surveillance technology is an “all seeing eye” that can digitally finger print user access behavior; identify rogue users virtually instantly using an innovative process.  This type of “all seeing eye” surveillance and defense shield is cognitive, adaptive, evolving and concurrently monitors all user activity across a hospital’s information ecosystem.

This type of cybersecurity shield learns, understands, recognizes and remembers normal user habits, patterns and behavior as they use applications in their day-to-day work. Through a baseline, such a platform is able to predict and detect anomalous user activity in real-time, thereby mitigating risk rapidly.

This creates a virtual, formidable defense layer powered by cognitive surveillance that is simple to deploy, easy to use, operates automatically in the background, and vastly improves an organization’s defense against cyber security threats, data breaches and privacy violations. Hospital and other healthcare facilities can easily deploy this type of advanced, self-learning protective shield. Healthcare organizations can rapidly scale across EHR systems, distributed or centralized, cloud or on-premise.

If your healthcare facility deploys this type of comprehensive cybersecurity system, the gloomy doomsday scenario offered up by many cybersecurity ventures will no longer be a concern.