October 8, 2015 By Douglas Bonderud 4 min read

Health care technology is rapidly evolving, with wearables and smart devices finally making progress toward pushing out paper charts and faxed documents. Despite the backing of many clinics, hospitals and even government agencies, however, the electronic personal health information (ePHI) market isn’t without issue.

Cybercriminals now realize the value in these records, and as recent data breaches demonstrate, health agencies aren’t always up to the security challenge. The situation demands a second opinion: What should health care companies expect for cybersecurity now and in the future?

Chronic Issues With Health Care Technology?

When it comes to high-value data, ePHI tops the list. As noted by CSO Online, in fact, health care companies are three times more likely to experience data theft. Why? Because the kind of information collected by health agencies is not only personal but in large measure immutable. While criminals are happy to run across financial information such as credit card or bank account numbers, they know accounts are easily closed and credit agencies quickly alerted. Things like Social Security numbers, permanent addresses and dates of birth are much harder — if not impossible — to change, giving malicious actors the ability to cause more than just superficial harm.

What’s more, evolving health care technology has spawned a myriad of attack vectors. Consider the recent warning issued by Molina Healthcare when it was discovered that one of its former employees stole more than 54,000 pieces of PHI to exploit for over-the-counter products. Or the $750,000 settlement reached by the Department of Health and Human Services Office of Civil Rights with a health care firm whose employee had a corporate laptop and server backup stolen from a personal vehicle.

There’s more: According to Tech Times, a recent federal audit found cybersecurity measures at Healthcare.gov severely lacking. Issues ranged from the government’s MIDAS storage system not encrypting user sessions to not conducting automated vulnerability checks.

The bottom line? Patients and health care professionals have high expectations for cybersecurity both now and in a device-enabled future, but current methods simply aren’t up to the task. Instead, data breaches and accidental data loss are chronic, painful issues for both stakeholders and government legislators.

Managing Meds

If current methods aren’t effective, what’s the next course of treatment? A recent KPMG study found that part of the problem may stem from closed corporate pocketbooks: Just 53 percent of companies say they’re ready to defend against an attack thanks to consistent underspending on cybersecurity. Even worse, 25 percent of survey respondents said they either “don’t have or don’t know their capabilities” when it comes to cyberdefense. Simply put, more spending won’t go to waste; health agencies must be willing to budget for more than bare-bones security.

Healthcare IT News also had some suggestions. While some of the “most wired” health companies have already rolled out measures like high-performing intrusion detection systems and incident response drills, there’s still room for improvement. For example, the use of end-to-end data encryption along with comprehensive access management controls such as two-factor authentication could significantly reduce the chances of data loss or breach.

Current health security also gets a boost from broadly applying even simple tech policies such as updating machines when new patches or security fixes are released. Some companies don’t bother with automatic updates on the grounds that system performance slows down, while others worry about new versions compromising the functionality of older applications and software. The problem? Known vulnerabilities are often used by attackers to gain access.

According to The Register, in fact, tens of thousands of medical devices are “directly hackable” thanks to bugs that were reported to companies months ago. Regularly updating is an easy fix for apps designed by reputable third-parties since they have a vested interest in keeping their code clean.

Symptomatic Security

So what does the future hold for health care technology and cybersecurity? Wireless connectivity of mobile and wearable devices is now everywhere, and it includes everything from sensors and trackers to drug pumps and artificial hearts. But just like the auto industry before it, health care is struggling to understand the implications of always-on technology and its potential for exploitation. As noted by the Becker Hospital Review, there’s no silver bullet to cure health care IT threats; instead, companies need to develop an organic strategy that both supports their existing network and allows for expansion along multiple paths.

When it comes to devices connected to the Internet of Things, for example, companies must focus on common symptoms of compromise, which could help inform IT security as a whole. While device types may differ, attackers often focus on particular exploits or groups of exploits over a given time period to break through defenses. By creating a symptomatic model of detection and response, health care providers can focus on stopping what comes after common precursors rather than diagnosing the same problem time after time.

Managing future risk, meanwhile, speaks to a need for improved patient/caregiver dialogue. As intelligent applications and wearable devices become the norm, patients gain a more active role in their own treatment and therefore greater ownership of their own data. Without training in how to effectively manage that data, however, patients may become the weakest link, breaking the chain and leaving health care companies on the hook for cleaning up the mess. By taking a collaborative approach to data security and defense, it’s possible to form a united front against malicious actors rather than present what amounts to a broken immune system.

Health care security isn’t on life support, but a second opinion is worthwhile. By handling chronic issues, managing current pain points and addressing future symptoms, there’s hope for a full recovery.

More from Healthcare

Why safeguarding sensitive data is so crucial

4 min read - A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other.The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction recovery help and mental health treatment in Connecticut, Florida, Texas and other states.The breach, first reported by WIRED, involved PII, such as patient names and addresses,…

Ransomware on the rise: Healthcare industry attack trends 2024

4 min read - According to the IBM Cost of a Data Breach Report 2024, the global average cost of a data breach reached $4.88 million this year, a 10% increase over 2023.For the healthcare industry, the report offers both good and bad news. The good news is that average data breach costs fell by 10.6% this year. The bad news is that for the 14th year in a row, healthcare tops the list with the most expensive breach recoveries, coming in at $9.77…

Cybersecurity risks in healthcare are an ongoing crisis

4 min read - While healthcare providers have been implementing technical, administrative and physical safeguards related to patient information, they have not been as diligent in securing their medical devices. These devices are critical to patient care and can leave hospitals at risk for cyberattacks, causing major disruptions to patient care. In fact, 88 million individuals were affected by large breaches, compromising vast amounts of electronic protected health information (ePHI) last year according to the U.S. Department of Health & Human Services. This year,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today