ARTICLE
11 January 2019

HHS Issues Cybersecurity Guidance For Healthcare Organizations

B
BakerHostetler

Contributor

BakerHostetler logo
Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
Cyberattacks continue to rise across industries, and healthcare is no different. Eighty percent of U.S. physicians reported having experienced some form of cyberattack.
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

BakerHostetler will post a series of blogs to fully explore the recommendations and guidance Health and Human Services provides healthcare organizations in its report.

Cyberattacks continue to rise across industries, and healthcare is no different. Eighty percent of U.S. physicians reported having experienced some form of cyberattack. In 2017, cyberattacks cost small and midsize businesses an average of $2.2 million, with 60 percent of small businesses going out of business within six months of the attack. According to a study from IBM Security and the Ponemon Institute, the cost of a data breach for healthcare organizations rose from $380 per record in 2017 to $408 per record in 2018, the highest cost for data breaches across all industries. In 2016, U.S. healthcare systems lost $6.2 billion due to data breaches. No doubt this amount continued to rise in 2017 and 2018, with the growing number of cyberattacks.

Against this backdrop, on Dec. 30, 2018, the Department of Health & Human Services (HHS) issued guidance on cybersecurity for healthcare organizations. The report — the work product of a task force created by the Cybersecurity Act of 2015 and composed of healthcare and cybersecurity experts — evaluates current threats against healthcare and public health organizations, identifies common weaknesses within healthcare organizations, and suggests mitigation efforts.

HHS specifically states that the report is not "a de facto set of requirements that all organizations must implement." Rather, the report serves as guidance for organizations to customize cybersecurity practices based on the organization's size. This approach recognizes that an organization's size impacts many aspects of its operations, including its IT security capabilities, staffing, investment in IT security, number of affiliate entities and exchanges with other healthcare systems. The report cautions that identifying the size of an organization is not as simple as it may seem, and it provides a table to guide organizations in their evaluation.

The report is broken down into four sections:

  1. The Main Report, which addresses current cybersecurity threats facing healthcare organizations, with the goal of raising general awareness of the issue.
  2. Technical Volume 1, which guides small healthcare organizations on what to ask their IT security teams or vendors.
  3. Technical Volume 2, which is intended for IT security professionals within midsize and large healthcare organizations.
  4. Resources and Templates, which provides additional resources and references for healthcare organizations.

The report analogizes good cybersecurity practices with hand hygiene; just as healthcare professionals know the importance of handwashing to stop the spread of germs, healthcare organizations need to practice good "cyber hygiene" to stop the spread of cyberattacks. Hospitals need to make good cyber hygiene a culture within their organizations, just as they have done with good hand hygiene.

To begin the process, organizations must understand the differences between a "threat" and a "vulnerability." A threat is something that has the potential to cause harm. A vulnerability is a weakness that may be exploited by a threat, resulting in harm or loss.

BakerHostetler's blog series will address each of the five threats explored in the Main Report:

  1. E-mail phishing attacks.
  2. Ransomware attacks.
  3. Loss or theft of equipment or data.
  4. Insider, accidental or intentional data loss.
  5. Attacks against connected medical devices that may affect patient safety.

By identifying your organization's vulnerabilities, and the threats that may exploit them, you can take appropriate precautions to lessen the chances of exploitation and, ultimately, harm or loss to your patients and organization alike. The Technical Volumes detail 10 practices to mitigate these threats, which the blog series will also discuss.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More