Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
1
2
5
6
7
9
10
12
13
14
17
18
19
20
22
23
25
26
29
1
2
3
4
5
2014 OSEHRA Open Source Summit: Global Collaboration in Health IT
2014-09-03 - 2014-09-05    
8:00 am - 5:00 pm
OSEHRA is an alliance of corporations, agencies, and individuals dedicated to advancing the state of the art in open source electronic health record (EHR) systems [...]
Connected Health Summit
2014-09-04    
All Day
The inaugural Connected Health Summit: Engaging Consumers is the only event focused exclusively on the consumer-focused perspective of the fast-growing digital health/connected health market. The [...]
Health Impact MidWest
2014-09-08    
All Day
The HealthIMPACT Forum is where health system C-Suite Executives meet.  Designed by and for health system leaders like you, it provides an unmatched faculty of [...]
Simulation Summit 2014
2014-09-11    
All Day
Hilton Toronto Downtown | September 11 - 12, 2014 Meeting Location Hilton Toronto Downtown 145 Richmond Street West Toronto, Ontario, M5H 2L2, CANADA Tel: 416-869-3456 [...]
Webinar : EHR: Demand Results!
2014-09-11    
2:00 pm - 2:45 pm
09/11/14 | 2:00 - 2:45 PM ET If you are using an EHR, you deserve the best solution for your money. You need to demand [...]
Healthcare Electronic Point of Service: Automating Your Front Office
2014-09-11    
3:00 pm - 4:00 pm
09/11/14 | 3:00 - 4:00 PM ET Start capitalizing on customer convenience trends today! Today’s healthcare reimbursement models put a greater financial risk on healthcare [...]
e-Patient Connections 2014
2014-09-15    
All Day
e-Patient Connections 2014 Follow Us! @ePatCon2014 Join in the Conversation at #ePatCon The Internet, social media platforms and mobile health applications are enabling patients to take an [...]
Free Webinar - Don’t Be Denied: Avoiding Billing and Coding Errors
2014-09-16    
1:00 pm - 2:00 pm
Tuesday, September 16, 2014 1:00 PM Eastern / 10:00 AM Pacific   Stopping the denial on an individual claim is just the first step. Smart [...]
Health 2.0 Fall Conference 2014
2014-09-21    
12:00 am
We’re back in Santa Clara on September 21-24, 2014 and once again bringing together the best and brightest speakers, newest product demos, and top networking opportunities for [...]
Healthcare Analytics Summit 14
2014-09-24    
All Day
Transforming Healthcare Through Analytics Join top executives and professionals from around the U.S. for a memorable educational summit on the incredibly pressing topic of Healthcare [...]
AHIMA 2014 Convention
2014-09-27    
All Day
As the most extensive exposition in the industry, the AHIMA Convention and Exhibit attracts decision makers and influencers in HIM and HIT. Last year in [...]
2014 Annual Clinical Coding Meeting
2014-09-27    
12:00 am
Event Type: Meeting HIM Domain: Coding Classification and Reimbursement Continuing Education Units Available: 10 Location: San Diego, CA Venue: San Diego Convention Center Faculty: TBD [...]
AHIP National Conferences on Medicare & Medicaid
2014-09-28    
All Day
Balancing your organization’s short- and long-term needs as you navigate the changes in the Medicare and Medicaid programs can be challenging. AHIP’s National Conferences on Medicare [...]
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Events on 2014-09-04
Connected Health Summit
4 Sep 14
San Diego
Events on 2014-09-08
Health Impact MidWest
8 Sep 14
Chicago
Events on 2014-09-15
e-Patient Connections 2014
15 Sep 14
New York
Events on 2014-09-21
Health 2.0 Fall Conference 2014
21 Sep 14
Santa Clara
Events on 2014-09-24
Healthcare Analytics Summit 14
24 Sep 14
Salt Lake City
Events on 2014-09-27
AHIMA 2014 Convention
27 Sep 14
San Diego
Events on 2014-09-28
Events on 2014-09-30
Events on 2014-10-02
Articles

IoT Devices Top a Long List of 2017 Security Threats

IoT Devices

It’s worth remembering that 2016 was dubbed the “year of data security” after 90 percent of healthcare providers suffered data breaches in the previous two years. In particular, the Anthem breach of late 2014/early 2015 got everyone’s attention for the sheer magnitude (around 80 million records) of the hack.

Looking back, we can say 2016 lived up to its name as the number of records accessed was significantly lower than the year prior. But IT security is a game of whack-a-mole, so if fewer patient records were lost, malevolent forces simply found other ways to make the lives of healthcare CIOs very difficult.

Ransomware, for example, became the dominant security issue of 2016 and made everyone aware that hackers can always just hold your files hostage if they can’t steal them.

So, does 2017 look like more of the same or will hackers conjure up something new? Sitting here in January, the expectation is that the same security issues will endure, but they will also be accompanied by more challenging and complex concerns.

The Internet of Things (IoT): The difficulty of IoT security is represented by the numbers: There are tens of thousands, if not hundreds of thousands, of IoT devices connected to healthcare networks and the security on all of them is not iron clad.

“Internet-of-Things devices lack some of the most basic cybersecurity protocols,” writes Jessica Davis in Healthcare IT News. “As a result, these devices can be weaponized en masse – and in as little as three minutes.”

The hacking potential of IoT devices was made clear last October when domain name services provider DYN was breached via webcams and digital recorders, knocking Twitter, PayPal, Spotify and other internet behemoths offline for hours.

In a recent survey of healthcare executives conducted by Healthcare IT News, 52 percent said security was the highest IT priority for this year, with 58 percent elevating IoT devices to the top of the list of security concerns.

Ransomware: Hackers require access, and unsecured IoT devices give them that access. Once inside, they can continue the breakout year that ransomware had in 2016. In 2017, however, there may simply be more players in the game because the internet is an ever-evolving amusement park of wonders and horrors.

“There is already a ransomware as a service [RaaS] model, which provides automatically generated ransomware executables for anyone who wants to get rich by infecting potential victims,” Ondrj Vlcek, CTO for security firm Avast, explained to ComputerWeekly.com. “The bottom line is that creating or buying your own ransomware has never been easier.”

A panel of security experts speaking with Health Data Management said they expect extortion attacks to increase and become more sophisticated. The solution? According to David Finn, health information technology officer for Symantec, hospitals and health systems must have robust backup systems so they don’t have to pay for extorted patient data.

Data-integrity Attacks: You may have heard of the Stuxnet worm the U.S. government used in 2010 to infiltrate and sabotage Iran’s nuclear program by engineering minor changes in targeted devices. That’s an example of a data-integrity attack. The not-so-good-news is that the technology has filtered down to black-hat hackers who can access hospital and health system networks through … wait for it … IoT devices.

“IoT is a massive attack surface that allows people to touch systems that for previous decades haven’t been available to be interacted with,” Daniel Miessler, director of client advisory services for security firm IOActive, told CNBC. “This is increasing exponentially.”

Instead of taking data or holding data hostage, hackers can manipulate data in subtle and often unnoticed ways so, for instance, payments don’t go where they’re supposed to. That’s one example of the potential data-integrity attacks offer to hackers.

Cloud Infrastructure: There is no shortage of articles touting the benefits of moving to the cloud, even if insufficient attention is paid to the attendant security risks.

As CynergisTek CEO Mac McMillan told Health Data Management, the cloud is “the proverbial double-edged sword. It’s an absolute necessity for advancement, but security continues to lag further behind, which ultimately risks the advancement.”

Extensive due diligence on your cloud services provider is essential, as is a contract that establishes responsibility, reaction and culpability in the event of a breach.

Artificial Intelligence: It would be difficult to imagine that most hospitals and health systems will have the resources to maximize the value of artificial intelligence and machine learning. Unfortunately, that won’t keep hackers from using AI and machine learning as a tool on their side of the security battle.

“From a hacker’s point of view, AI will power malware, and use data from the target to send phishing emails that replicate human mannerisms and content,” said Capgemini UK cyber security chief Andy Powell. “… these AI-powered attacks will resonate with the target better than ever before, meaning they’ll be more likely to fall victim.”

People: As always, there is no more enduring risk to your facility and organizational security than the people who work there. Thorough preparation of your staff is the best defense against the most common forms of hacking and data theft.

But, as Kasey Panetta of Gartner describes in a recent paper on 2017 security trends, it is only one component in an “adaptive security architecture.”

“The evolution of the intelligent digital mesh and digital technology platforms and application architectures means that security has to become fluid and adaptive. Security in the IoT environment is particularly challenging. Security teams need to work with application, solution and enterprise architects to consider security early in the design of applications or IoT solutions. Multilayered security and use of user and entity behavior analytics will become a requirement for virtually every enterprise.”

Does this sound like more technical sophistication and cost than your small or medium size healthcare organization can handle? That’s bound to be a common complaint. While all hospitals could potentially fall victim to the security breaches described here, not all hospitals can properly defend against them.

This common vulnerability calls for extensive sharing of knowledge and affordable strategies that guard against loss or manipulation of data. An ongoing Health and Human Services initiative and grant program endeavors to gather and disseminate the most current information on cyber threats, but it may take a few years for that effort to yield actionable information.

It may also call for smaller facilities partnering with those that are larger and more resource rich. We’re seeing relationships between large and small organizations develop in other areas of healthcare IT such as EHR implementation. Getting to the point where healthcare is not such an attractive hacker target may require the same with regard to security.

D’Arcy Gue is Director of Industry Relations for Medsphere Systems Corporation.