Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
3
4
5
7
8
10
11
12
15
16
17
18
19
21
24
25
26
27
30
31
1
2
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Adva Med 2014 The MedTech Conference
2014-10-06    
All Day
Adva Med 2014 The MedTech Conference October 6-8, 2014 McCormick Place Chicago, IL For more information, visit, advamed2014.com For Registration details, click here  
Public Health Measures Meaningful Use
2014-10-09    
12:00 pm - 12:45 pm
Public Health Measures Meaningful Use: Reporting on Public Health Measures Join Meaningful Use expert Jim Tate for a three part series of webinars addressing MU [...]
2014 Hospital & Healthcare I.T. Conference
2014-10-13    
All Day
Join us at our 2014 Hospital & Healthcare I.T. Conference and experience the following: Up to 125 Hospital & Healthcare I.T. executives from America’s most prestigious [...]
Connected Health Care 2014
Key Trends That will be Discussed at the Conference! Connected Healthcare 2014 is set to explore the crucial topics that are revolutionizing the connected health industry: [...]
HealthTech Conference
2014-10-14    
All Day
HealthTech Capital is a group of private investors dedicated to funding and mentoring new "HealthTech" start ups at the intersection of healthcare with the computer [...]
Health Informatics & Technology Conference (HITC-2014)
2014-10-20    
All Day
Information technology has ability to improve the quality, productivity and safety of health care mangement. However, relatively very few health care providers have adopted IT. [...]
HIMSS Amsterdam 2014
2014-10-20    
12:00 am
About HIMSS Amsterdam 2014 This year, the second annual HIMSS Amsterdam event will be taking place on 6-7 November 2014 at the Hotel Okura. The [...]
Patient Portal Functionality and EMR Integration Demonstration
2014-10-22    
2:00 pm - 3:30 pm
This purpose of this webcast is to present a demonstration to show how the Patient Portal integrates with EMR, as well as discuss how this [...]
Connected Health Symposium 2014
Symposium 2014 - Connected Health in Practice: Engaging Patients and Providers Outside of Traditional Care Settings Collaborating with industry visionaries, clinical experts, patient advocates and [...]
CHIME College of Healthcare Information Management Executives
2014-10-28 - 2014-10-31    
All Day
The Premier Event for Healthcare CIOs Hotel Accomodations JW Marriott San Antonio Hill Country 23808 Resort Parkway San Antonio, Texas 78761 Telephone: 210-276-2500 Guest Fax: [...]
The Myth of the Paperless EMR
2014-10-29    
2:00 pm - 3:00 pm
Is Paper Eluding Your Current Technologies; The Myth of the Paperless EMR Please join Intellect Resources as we present Is Paper Eluding Your Current Technologies; The Myth [...]
Events on 2014-09-30
Events on 2014-10-02
Events on 2014-10-06
Events on 2014-10-09
Events on 2014-10-13
Events on 2014-10-14
Connected Health Care 2014
14 Oct 14
San Diego
HealthTech Conference
14 Oct 14
San Mateo
Events on 2014-10-20
HIMSS Amsterdam 2014
20 Oct 14
Amsterdam
Events on 2014-10-23
Events on 2014-10-28
Events on 2014-10-29
Latest News

Smart buildings present a unique healthcare cybersecurity threat

businessman touching Cloud with Padlock icon on network connection, digital background. Cloud computing and network security concept (businessman touching Cloud with Padlock icon on network connection, digital background. Cloud computing and network s

The virtual and physical realms are becoming increasingly enmeshed through the world of the Internet of Things. The rate of Internet connections is outpacing companies’ abilities to secure them.

As a result, a large driver of cybercrime is the least-protected networks and systems found in the healthcare information technology world – building automation, or smart building technology.

For example, hackers stole 40 million credit card numbers from Target by getting into the retailer’s internet-connected HVAC systems. And in another example, hackers got access to a North American database by way of a web-connected fish tank.

These scenarios shed light on the ways that operational tech, such as signage, elevators, AV conferencing, HVAC, etc., can pose serious security risks for healthcare organizations.

Uniquely valuable data

“Information available in healthcare provider organizations – patient health information (PHI), payment card information (PCI), intellectual property (IP) and more – is uniquely valuable to hackers in comparison to other industries, which is why we’ve seen such a dramatic focus on cybersecurity in healthcare to date,” said Matthew Ehrlich, executive director, TEKsystems Global Services, digital technology builders whose specialties include cybersecurity.

“The problem we see, however, is that most of the efforts to protect healthcare providers fall under the IT policy umbrella,” he continued. “By limiting cyber threats to just IT policy, organizations are missing key vulnerabilities and risk exposure for their company. Building systems are not traditionally in scope for IT, yet they have a vast ecosystem of technology that must be assessed and governed.”

These technology systems, referred to as operational technology, are primitive and generally poorly governed, making them ripe targets for the infiltration of the main network of a hospital, he added.

There are many different building systems in healthcare that present cybersecurity vulnerabilities. Traditional commercial buildings have vulnerabilities rooted in operational technology in places such as HVACs, fire alarm systems, digital signage, elevators, water or electric meters, lighting, and many more. All of those vulnerabilities apply to healthcare organizations, as well.

Nontraditional technologies

“However, healthcare providers also have such unique real estate types, ranging from small ambulatory facilities to complex 1,000-plus bed hospitals ,to laboratories, to parking garages, to pharmacies and more,” Ehrlich explained. “Each of these types bring in a whole host of nontraditional-technology enablement and separate vendor ecosystems.”

Take for example the laboratory: Beyond ordering systems, one has secure rooms/doors, temperature-controlled rooms, blood banks, special lighting etc. This concept lays the foundation for the Internet of Medical Things (IoMT), which is an emerging area that healthcare organizations need to be aware of.

So what are the steps healthcare CIOs and CISOs can take to analyze, design, evaluate and implement smart building solution plans to protect themselves from hackers getting to more important things like the main network or the electronic health records system?

“First and foremost, healthcare providers should be taking a collaborative approach to solving this problem – IT cannot own this alone,” Ehrlich said. “Similarly, the risk organization cannot own this either. A coordinated effort between risk, real estate, finance, operations, IT and clinical needs to exist to ensure implementation of end-to-end policy.”

An initial assessment is the first step, and educating and understanding risk exposure can generate tremendous ROI, Ehrlich noted. After any vulnerabilities are remediated and policies are built, healthcare providers need a way to monitor and manage ongoing operations as the technology and vendor landscape is changing constantly, he said.

An extreme lack of awareness

“Most healthcare leaders are aware of the benefits an organization can achieve from a ‘smart building,’” he said. “But there is an extreme lack of awareness in healthcare today on the rising risk that exists in the current building infrastructure with very simple things like elevators or HVACs, let alone more innovative topics like ‘smart rooms.’ We fear that due to the lack of education and urgency, this problem will likely get worse before it gets better.”

With advanced analytics generated from developments/implementations of consolidated EHR, ERP and CRM over the last decade, the amount of data is hard to imagine. With that, the access to that data is increasing, and through one key area: building-system vulnerabilities, Ehrlich said.

“Building vulnerabilities will become a leading entry point or cause of breaches and incidents across the healthcare ecosystem,” he concluded.