Thursday, January 07 | Thought Leadership, Post-Acute Care, Human Services

Cybersecurity in Conversation: Experts Answer Must-Know Questions

By Netsmart

With over 45%1 of ransomware attacks targeting healthcare organizations, it is imperative that you take proactive measures to ensure you don’t become part of this statistic. 

 

To help bolster your organization’s cybersecurity strategy, Netsmart hosted the webinar Cybersecurity in Healthcare: Assess Threats and Reduce your Risk. 

 

In this interactive conversation, industry insiders Randy Pargman, Binary Defense senior director of threat hunting and counterintelligence; Sharon Hicks, MBA, MSW, OPEN MINDS senior associate; and Mike Murray, Netsmart director of Plexus Technologies, answered audience questions about the threat landscape and shared strategies for risk mitigation. 

 

Below, these experts unpack the most-asked audience questions. 

 

If I have multi factor authentication (MFA) and up-to-date antivirus, do those measures protect me from most cyberattacks?

 

Regardless of MFA protocols, logged in users are a vulnerability. MFA alone doesn’t solve for the risk of a credentialed user making an error that ushers a cyber attacker into your network. Once these intruders gain access, they can move laterally across your network if not identified quickly.   

 

Cyber attackers commonly ensure their email phishing attempts include a malware tweak that is undetected by antivirus, a threat known as a zero-day attack. Since antivirus only protects against known malware, cyber criminals targeting healthcare agencies can commonly bypass antivirus security.

 

Pargman points to the value of using a 24/7 Security Operations Center (SOC) where expert security analysts quickly catch and identify any risks or irregularities in user behavior. With continuous, 24/7 professional monitoring, an attack can be identified and contained before complete system penetration and an ensuing lockdown. 

 

With the majority of cyberattacks occurring on weekends or after traditional business hours, it is vital that your organization implement Managed Detection and Response (MDR) software for around-the-clock protection.

 

For small providers with equally small budgets, what do you recommend in terms of security strategies? 

 

For Murray, conducting an IT security risk assessment is important, as it provides visibility into current vulnerabilities. By conducting an analysis, organizations can then direct funds to protect the most vulnerable points. This helps leadership invest in strategies that will have the greatest impact on securing their data, rather than spending valuable budget on strategies that don’t mitigate your highest risks. 

 

Murray also heralds the value of education. “Education doesn’t cost a lot—educating teams about best practices for password and email security is truly invaluable.” By educating staff, organizations can shore up behavior-based vulnerabilities, adding a foundation of protection. 

 

If an organization outsources IT or their electronic health record (EHR) is hosted by a third-party cloud provider, what are the partner’s responsibilities if there is a breach? 

 

Hicks advocates for confirming your legal and business associate agreements (BAA) have liability written into the contracts before agreeing to a partnership. She added, “From a legal perspective, make sure that, regardless of what is going on, [your partner] is in the same boat with you.” 

 

Working with a cloud services provider experienced in hosting healthcare data is a must. This partnership provides an extra layer of security for your data if an attack occurs on an endpoint. While a breach across endpoints would devastate an organization and could interrupt the continuity of care, the impact of a HIPAA-related data breach would most likely be contained by your hosting provider’s security measures. 

 

With so many people working from home due to the pandemic, how can I ensure my remote workforce is accessing the network securely?

 

Organizations are encouraged to leverage a virtual private network (VPN) and other similar security solutions for remote users. Murray underlines the importance of frequent software updates to these solutions to ensure the latest security patches have been applied. He also urges organizations to do their research and bypass VPNs that don’t leverage multi-factor authentication (MFA). 

 

Murray again stresses the importance of visibility, particularly with a remote workforce. Home computers are a point of vulnerability. The best practice for remote users is to provide associates with company-issued devices. “Without this type of visibility and control, you’re going to be completely surprised when you find out your patient records were sold on the dark web, and you didn’t know you had a breach.”

 

With threats of cyberattack only increasing, it is vital for healthcare providers to build strategies to protect invaluable data. By starting with a foundation of education, providers can disseminate knowledge among staff, ensuring a collective approach is taken toward cyber security. 

 

To hear the entirety of this dynamic conversation, listen to the webinar here.

 

1 Beazley Breach Briefing, 2018

 

Meet the Author

netsmart-logo
Netsmart ·

From the CareThreads Blog

Justice-Involved Initiative: How Providers Can Help Bring Equitable Care

Monday, July 22 | Care Coordination,Human Services,Legislative/Policy

Californians who have spent time in jails, prisons or youth correctional facilities face a higher risk for both physical and mental illness. The number of incarcerated Californians with a mental health diagnosis rose by 63 percent in the last decade, and 66 percent of those currently incarcerated require substance use treatment. But even after their release, overdose is the leading cause of death for Californians who have been justice-involved––at a rate three times higher than other states.

More
Blog Client Satisfaction Blog Doctor using Netsmart Applications to help Patient

How and When to Analyze & Update Internal & External Medical Clinic Policies

Sunday, July 21 | Partnerships and Collaboration,Thought Leadership

Updating clinic policies and procedures ensures compliance and reduces risks. Learn how to review medical clinic policies and align with best practices.

More

Emergency Preparedness and Population Health: Understanding Your Data for Mobilization

Friday, July 19 | Care Coordination,Interoperability,Human Services

Rapid and effective crisis response—whether natural disasters, pandemics or other emergencies—can save lives. A modern data strategy, driven by actionable insights, is vital for ensuring sustainability, growth and the acceleration of mission-driven outcomes.

More