Healthcare government and industry leaders affirm national standards, federal agencies are involved, and technology is playing a leading role in the fight against healthcare cyberattacks. Here’s a quick rundown of some of these trends based on what we’ve been reporting and reading over the past few weeks.
‘Meaningful Protection’ Could Drive Healthcare Cybersecurity Transformation
write in forbesEd Gaudet, CEO and founder of Censinet and member of the Health Sector Coordinating Council, proposes and describes what he calls “meaningful protection” standards for healthcare cybersecurity. 2010s. The goal is to reduce patient safety risks and improve operational resilience through a “velvet hammer” approach.
“It is time for the United States to implement incentive-based programs to drive meaningful adoption of processes and technologies that protect patients and healthcare infrastructure,” wrote Gaudet.
While there is some debate about the details of the meaningful use program implemented as part of the HITECH Act to ensure the effective use of federal incentive dollars, Gaudet said the $27 billion program He says it is difficult to argue against the impact it has had on the transition of healthcare from paper to EHRs.
“To truly transform cybersecurity in healthcare, the U.S. government must consider modeling its cybersecurity investment program after meaningful use – through a combination of incentives and penalties over time. It is the “meaningful protection” of patient safety, data and care delivery operations that is achieved. ‘ wrote Gaudet.
He developed a three-tiered program designed to help healthcare organizations demonstrate the use of accredited practices, processes, and technology in ways that can be measured to protect patient safety, data, and care delivery practices. It offers.
Gaudet also suggests that such a program would “accelerate ‘cyber herd immunity’,” which the Health Care and Public Health Sector Coordinating Council’s Cybersecurity Working Group has identified as cyber preparedness. That’s what we’re looking for when we advertise as shared responsibility.
“The first step to resolution is recognizing that you have a problem. We recognize that we have this problem. I’m seeing it, and I’m heartened by it,” Garcia, executive director of the group, told attendees at the recent HIMSS 2022 Healthcare Cybersecurity Forum. .
James Noga, former CIO of Boston-based Mass General Brigham, agrees. “The adoption of Meaningful Protection will move the needle in a positive direction in protecting healthcare organizations and patients from cybersecurity attacks.” Healthcare IT News“The next step is to reach out to members of Congress.”
The FTC can report: Cross-border ransomware complaints
As part of a year-end congressional omnibus package, Energy and Commerce Chairman Frank Pallone Jr. (D-NJ, D) and Consumer Protection and Commerce Subcommittee Chairman Jan Schakowski (D-Illinois) announced that consumer announced protection. The Federal Trade Commission asked to report “cross-border complaints received in connection with ransomware or other cyber-related attacks perpetrated by certain foreign individuals, businesses, and governments.”
According to the announcement, the FTC should focus specifically on attacks carried out by Russia, China, North Korea, Iran, and individuals and companies associated with these nations.
In June, the House Energy and Commerce Subcommittee forwarded reports of attacks from countries selected to monitor and monitor adversary web attacks and ransomware across the committee. but, next government It has reportedly struggled due to a lack of support from Senate leadership.
The Ransomware Act allows federal commissions to block spam, spyware, and fraud by cross-border enforcers so they can share evidence with foreign law enforcement agencies and assist with investigations at their request. Requires the FTC to report action enforcement data to Congress.
According to the report, committee members debated the priority of the state and the right of individuals rather than government agencies to sue offenders. has advocated “long-term commitment from many players” to do so.
Many medical organizations, such as the American Hospital Association, are calling for increased federal assistance to victims of national-level cyber terrorism, including real-time insights.
State Counsel John Rigi, AHA Cybersecurity and Risk, formerly with the Federal Bureau of Investigation, said: Healthcare IT News In a recent conversation about government attacks on healthcare cyberattacks.
Automation strategies could improve security for connected medical devices
While the industry is waiting for the government to act on patch laws and a proposed software bill of materials, Greg Murphy, adviser and former CEO of Ordr, which recently partnered with Sodexo on managed cybersecurity services, said hospitals could We provide 6 steps you can take right away. Improve the security of medical devices.
write in SC magazineMurphy proposes automation to maintain an up-to-date device inventory, identify risks, and maintain complete visibility to monitor device communications.
“The multitude of connected devices in use in hospitals today must be continuously monitored and protected to combat threats and keep patients safe,” he wrote.
“Averting a Code Dark event that forces doctors, nurses and frontline hospital staff to work under attack is a big task.”
Risk analysis “still remains a very manual and labor-intensive process,” said Kathy Hughes, CISO of Northwell Health, during a panel discussion on third-party cybersecurity at the recent HIMSS Healthcare Cybersecurity Forum. rice field.
Murphy suggests automating device discovery and classification to enable real-time, accurate device data and inventory.
First, “we identify devices with outdated operating systems and devices that are at risk, such as misconfigurations or rogue or vulnerable software,” he said.
Hospital IT teams also need to track communications from countries with known cyberattack postures. Identify and monitor devices with risky privileged protocols. Segment devices running older operating systems that cannot be patched. Baseline all connected device communications by enabling only the permitted communications required for device operation.
“Any time ransomware hijacks a device, it communicates with Internet-based command-and-control sites and can move laterally throughout an organization,” Murphy said.
“If we detect deviations from baseline communications, it is an indication of compromise.”
Andrea Fox is senior editor for Healthcare IT News.
Email: [email protected]
Healthcare IT News is a HIMSS publication.