Page 15 - Modern Healthcare (January 2020)
P. 15
emerging variants of the software arise
constantly.
Too many threats
“We’re chasing new stuff all the time,”
A 2019 HIMSS survey asked
3.13 Too many emerging
respondents to rate how certain
said Sri Bharadwaj, chief information
and new threats
issues affected their ability to
security officer at UC Irvine Health in
3.12 Lack of personnel with
remediate and mitigate security
Orange, Calif., and co-director of the
appropriate cybersecurity
incidents.
4
leadership in healthcare privacy and
knowledge and expertise
security risk management certificate
2.89 Lack of financial
program at the University of Texas at
resources
Austin’s McCombs School of Business.
on threats, mitigation and
Keeping track of those evolving threats
3
know-how with external parties
can be overwhelming, with healthcare
2.83 Too many application
leaders ranking the emergence of too
vulnerabilities
2.42 Network infrastructure
many new threats as the most chal-
too complex to secure
2.80 Too many endpoints
lenging barrier to mitigating security
(e.g., user devices,
2
incidents, according to a survey the 2.43 Lack of information-sharing 5 5 = Extreme challenge
connected network)
2.37 Lack of
Healthcare Information and Manage- organization will
ment Systems Society released last year. 2.63 Lack of security
“We’re no longer in the era where a sin- 2.33 Too many users awareness training
gle person can humanly read everything for timely and effective
that’s happening,” said Lee Kim, director provisioning and 1
of privacy and security at HIMSS. She de-provisioning of
accounts
noted hospitals will often use security in-
formation management systems, which Source: Healthcare Information
and Management Systems Society 0 = No challenge at all
collect data, to help manage and identify
trends from that influx of information.
One of the latest ransomware variants “CISOs need to be plugged into not about cyberthreats, even if it sounds
to target healthcare is Zeppelin, first spot- just one source, but many sources,” old-fashioned, Kim said, adding that’s
ted in November by Cylance researchers. Hewitt said. He suggested the Health In- how she first learned about a new phish-
Rather than being designed to reach a formation Sharing and Analysis Center, ing technique in which hackers break
wide breadth of possible victims, Zeppe- the Department of Homeland Security’s into real business email addresses and
lin has seemingly “carefully chosen tech U.S. Computer Emergency Readiness insert themselves into existing email
and healthcare companies in Europe Team and InfraGard—a partnership be- conversations.
and the U.S.,” the researchers wrote. tween the FBI and the private sector—as But hospital leaders shouldn’t get
Zeppelin is largely distributed through examples. bogged down by trying to implement
spear-phishing, according to Lemos. UC Irvine Health belongs to multiple fixes to emerging cyberthreats piece-by-
Spear-phishing is a tactic in which cyber- information-sharing groups and works piece. While new variants of ransomware
criminals send malware via email while with outside companies that help to are a concern, getting basic security prac-
posing as a trusted entity, such as the re- manage network security, Bharadwaj tices in place is a necessary first step.
cipient’s employer. said. While that’s proved helpful, he ac- “Every time that healthcare comes up
Lemos declined to share examples knowledged that might not be feasible with a point defense against something,
of the types of healthcare organizations for smaller organizations. these ransomwares get modified and ap-
being targeted by Zeppelin, as Cylance “Not everybody has the dollars to pear as a different variant,” Hewitt said.
only discloses information on industry subscribe to all of the possibilities,” he Rather than focusing on a specific strain
verticals. said. The plurality of healthcare organi- of ransomware, it can be more helpful
While Zeppelin is just one recent ex- zations—25%—dedicated just 3% to 6% for CISOs to think about how to “protect
ample of ransomware in the industry, of their IT budgets to cybersecurity last overall against malware,” he said.
it’s indicative of hackers’ appetite for the year, according to the HIMSS survey. Standard practices for preventing
healthcare sector, noted Clyde Hewitt, malware infections include educating
executive adviser at cybersecurity con- One low-cost way to stay updated staff about how to avoid being tricked
sulting firm CynergisTek. on cybersecurity threats is to develop by a hacker; segmenting sensitive sys-
To stay up-to-date on emerging a “good network of CISOs that you can tems—like those storing patient data—
threats, many hospital chief information connect with” to share information, from the broader internet-connected
security officers, or CISOs, will rely on Bharadwaj said. “It’s good to get that in- network to limit malware’s ability to
alerts from federal agencies, cybersecu- formation on a daily or weekly basis, so spread; and conducting risk assess-
rity companies and information-sharing you know what to do.” ments annually, if not more frequently.
groups, which help to distribute timely Sharing information peer-to-peer is “If you don’t have the basics in place,
information about relevant cyberthreats. “still a very powerful” way of learning you’re a very soft target,” Kim said. l
January 27, 2020 | Modern Healthcare 13

