Help stop ransomware attacks at your hospital
Hospital Safety Insider, November 19, 2020
Want to receive articles like this one in your inbox? Subscribe to Hospital Safety Insider!
By Credentialing Resource Center
Although ransomware is not a new phenomenon, a recent increase in reported attacks, along with several well-publicized cases, have raised the public's awareness of the threat it poses.
Ransomware can be incredibly damaging because it is designed to infect a system, find and encrypt the system's data, and lock out users until they pay a ransom—typically in an anonymous electronic currency like bitcoin—to regain access through a decryption key.
U.S. Department of Health and Human Services (HHS) guidance states that healthcare entities can better protect against ransomware by implementing security measures required by the HIPAA Security Rule.
According to the guidance, these measures include limiting access to electronic protected health information (PHI) to personnel and software that require it; and conducting risk analyses to identify threats and vulnerabilities to PHI.
A big takeaway from the HHS is the importance of taking appropriate actions beforehand to mitigate the potential of damage caused by ransomware. Unlike malware that simply transfers PHI without authorization, ransomware makes the PHI unavailable or destroys it altogether.
To better prevent ransomware, all staff should be appropriately trained on email and web security as most malware and ransomware comes from those sources says Justin Jett, director of compliance and auditing at Plixer International, a security analytics company based in Kennebunk, Maine.
Additionally, companies should invest in heightened email security solutions, like anti-spam firewalls, which will help prevent the most obvious attacks from getting to employees' inboxes.
HHS guidance suggests that since HIPAA requires the workforces of covered entities to receive security training on detecting and reporting malware, employees can assist with early detection of ransomware by spotting indicators of an attack. These warning signs could include unusually high activity in a computer's CPU as the ransomware encrypts and removes files, or an inability to access files that have been encrypted, deleted, or relocated.
Even if hospitals are vigilant, ransomware attacks may still occur. Again, the guidance suggests that HIPAA compliance may help hospitals recover from ransomware attacks due to HIPAA's mandate for frequent backups of data.
Doron S. Goldstein, partner and co-head of privacy, data, and cybersecurity practice at Katten Muchin Rosenman, LLP, in New York City, warns, however, that some variants of ransomware can lie dormant for a period of time in order to migrate across systems, including into data backups.
Many hospitals and companies keep hot backups as part of their disaster recovery plan. These backups can be automatically or manually switched on if a system goes down.
If ransomware has infiltrated a backup, the backup's data could also become compromised and encrypted by the ransomware as soon as it's activated.
"The important thing about dealing with the impact of ransomware is that it may require additional or different protections compared to what other malware requires to avoid or mitigate its ill effects," says Goldstein.
Want to receive articles like this one in your inbox? Subscribe to Hospital Safety Insider!
Related Products
Most Popular
- Articles
-
- Don't forget the three checks in medication administration
- Note similarities and differences between HCPCS, CPT® codes
- OB services: Coding inside and outside of the package
- The consequences of an incomplete medical record
- Complications from immobility by body system
- Q&A: Primary, principal, and secondary diagnoses
- Practice the six rights of medication administration
- Nursing responsibilities for managing pain
- Differentiate between types of wound debridement
- Skills of effective case managers
- E-mailed
-
- Correctly bill ancillary bedside procedures in addition to the room rate
- Q/A: Coding infusions to correct low potassium levels
- Q&A: Utilization Review Committee Membership
- Q&A: Bill blood administration the same way for inpatient and outpatient accounts
- Q&A: A second look at encephalopathy as integral to seizures/CVA
- OB services: Coding inside and outside of the package
- Know the medical gas cylinder storage requirements
- Intravenous therapy guidelines
- Coding, billing, and documentation tips for teaching physicians, interns, residents, and students
- Coding tip: Watch for different codes for SI joint injections
- Searched