Identify best practices and practical strategies ... Laptop,. 84 , 22%. Other Portable. Electronic Device. 59. 16%. Comp
Auditing Security: Lessons Learned From Healthcare Security Breaches Adam H. Greene, J.D., M.P.H. Davis Wright Tremaine LLP Washington, D.C.
Michael “Mac” McMillan CynergisTek, Inc. Austin, Texas
DISCLAIMER: The vi ews and opinions expressed i n this presentation are those of the author a nd do not necessarily represent official policy or position of HIMSS.
Conflict of Interest Disclosure Adam H. Greene, JD, MPH & Michael “Mac” McMillan
Have no real or apparent conflicts of interest to report.
© 2012 HIMSS
2
Learning Objectives • Discuss the most prevalent data security risks facing healthcare today • Identify lessons learned from 2010 security breaches • Identify best practices and practical strategies for privacy and security management 3
Threats to Healthcare Data • Healthcare entities have data of considerable value • Increased automation and sharing have increased and introduced new risks • Healthcare now has a place at Hacker conferences like DefCon and Black Hat • Patient Safety, not privacy, is the new driver in healthcare data security 4
Threats by Industry 2011
Symantec 2011 Annual Threat Report
5
Outlook for 2012
• Data breaches rose by 32% in 2011
• Widespread use of mobile devices adds risk
• Despite regulations to the contrary, unauthorized access to patient information is still not a priority • Negative productivity effects and financial consequences increase directly with an increase in number of incidents • Number of cases of medical identity theft increased as number of incidents increased Ponemon Institute 2011
6
Overview of Breach Reports • 380 large breaches reported between Sept. 2009 and Oct. 2011 • Over 30,000 plus small breaches reported in same period • Over 18 million individuals affected
7
Lesson 1: You should be less concerned with:
And more concerned with:
Cause of Breach (Count) Sept. 2009 to Dec. 2011 Unknown 6 2%
Other 1 0%
Improper Disposal, 20 , 5% Hacking/IT Incident 26 7%
Theft, 196 , 52%
Loss, 55 , 14% Unauthorized Access/Disclosure, 75 , 20% 9
Cause of Breach (Affected Individuals ) Sept. 2009 to Dec. 2011 Improper Disposal 149,398 1% Other 344,579 2%
Loss, 7,291,355 , 40%
Hacking/IT Incident 750,195 4% Unauthorized Access/Disclosure, 857,939 , 5%
Unknown, 1,911,160 , 11% Theft, 6,755,205 , 37%
10
Lesson 2: The highest number of breaches involve: a) Desktops b) Laptops c) Other portable devices d) Paper
11
Location of Breach (Count) Sept. 2009 to Dec. 2011 Backup Tapes 2 1% CDs Hard 2 Drives 0% 3 Electronic 1% Medical Record E-mail 7 7 2% 2% Other 21 6%
Paper, 100 , 26%
Laptop, 84 , 22% Network Server 39 10% Computer, 55 , 14%
Other Portable Electronic Device 59 16%
12
Location of Breach (Individuals Affected) Sept. 2009 to Dec. 2011 CDs,
E-mail, 9,318, 0% 7,172, 0% Backup Tapes, 12,562, 0% Paper, 601,993, 3% Other Portable Electronic Device, 962,505, 5 % Electronic Medical Record, 1,145,285, 6%
Hard Drives, 1,200,654, 7% Computer, 1,310,6 81, 7% Network Server, 1,525,025, 9%
Other, 9,523,110, 53%
Laptop, 1,761,526, 10% 13
Lesson 3: It isn’t me, it’s you …
• Many large breaches are caused by business associates, not covered entities
14
Involvement of Business Associates in Breaches (Count) Sept. 2009 to Dec. 2011
Business Associates, 83, 22% Covered Entities, 298, 78%
15
Involvement of Business Associates in Breaches (Affected Individuals) Sept. 2009 to Dec. 2011
Covered Entities, 6,843,35 2, 38%
Business Associates, 11,21 6,479, 62%
16
Lesson 4: The number of breach reports remains relatively steady
17
Number of Breach Reports Sept. 2009 to Sept. 2011 30
25
20
15
10
5
0 Sept 09
Oct 09
Nov 09
Dec Jan 10 Feb 09 10
Mar 10
Apr 10
May June July 10 10 10
Aug 10
Sept 10
Oct 10
Nov 10
Dec Jan 11 Feb 10 11
Mar 11
Apr 11
May June July 11 11 11
Aug 11
Sept 11
18
Lesson 5: Breaches have consequences
19
Boston Globe, www.boston.com
20
The Mercury News, www.mercurynews.com
21
HC Pro HIPAA Update, blogs.hcpro.com 22
“So began a nightmare that cost Mr. Tripathi’s small nonprofit health consultancy nearly $300,000 in legal, private investigation, credit monitoring and media consultancy fees. Not to mention 600 hours dealing with the fallout and the intangible cost of repairing the reputational damage that followed.” Nicole Perlroth, Digital Data on Patients Raises Risk of Breaches, N.Y. Times, Dec. 18, 2011 (relating to a stolen laptop containing unencrypted records of about 13,687 patients).
23
• 2010 Annual Study: U.S. Cost of a Data Breach (Ponemon Institute) – For the fifth year in a row, data breach costs continued to rise – The average organizational cost of a data breach increased to $7.2 million – Data breaches in 2010 cost their companies an average of $214 per compromised record
24
Five priorities For Improving Readiness • Conduct thorough risk assessment/use third party for objectivity/due diligence • Adopt industry recognized information security model for measurement • Resource and train IT security personnel/organization for success • Implement robust system and user activity monitoring • Implement appropriate vender security 25
Risk Analysis • Implement regular risk analysis of the IT environment • Assess against all reasonable threats/regulatory requirements • Use third party support to ensure objectivity and due diligence • Follow a doctrinal approach to risk analysis • Develop detailed remediation roadmap/project plan to guide decisions 26
Everyone Wants To Be Headliner! • Since 2009 we have had nearly 350+ major breaches, almost one a day in October 2011, an average of 18 major breaches a month, nearly 50K of all sizes in total, more than 18 Million individual records put at risk… – – – – –
60% 50% 45% 39% 35%
Encrypt encrypt encrypt encrypt encrypt
mobile devices back up tapes media desktops servers/databases HealthcareInfoSecurity.com 2011 27
Information Security Models • Privacy and security requirements in healthcare are complex and evolving • HIPAA/HITECH/Meaningful Use are not information security frameworks • Models such as NIST, ISO, HITRUST, COBIT etc. provide an IT security governance framework for multiple requirements • Ensures recognized framework to measure assurance against and demonstrate compliance • Reduces the risk of breach by reducing the chance of gaps 28
What Are We Waiting For? • HIPAA was passed in 2003, with an effective date of April 2005, roughly seven (7) years ago. Asked how respondents would grade their organization’s ability to comply with HIPAA/HITECH today? – Roughly 40% said their organization was doing a good job – 30% said they viewed their organization’s effort as adequate – 30% said their organization was failing or needed improvement HealthcareInfoSecurity.com 2011 29
Resource & Train • Resource means: budget, tools and people • Understand what is reasonable, inhouse versus external support • Overwhelming majority of breaches involve mistakes by people • Provide tailored training to all workforce members, periodic reminders for everyone 30
Resourcing Still lags • For three years straight (2008-2010) the HIMSS Analytics annual security survey reported that healthcare spending on security lagged behind industry averages • The average spend on security for regulated industries is generally accepted as greater than 6% of the IT budget • This survey unfortunately told a similar story for the fourth straight year: – Nearly 70% reported allocating 3% or less of the IT budget on security HealthcareInfoSecurity.com 2011
31
Monitoring Activity • Recognize different levels of criticality for monitoring: user, system, network, elevated privilege, etc. • Recognize scope of the problem and requirements to do effectively • Consider factors for decisions: staff capability, separation of duties, systems/data requirements, regulatory requirements • Move from being reactive to being proactive 32
What We REALLY Don’t Know! • Managing and tracking access to sensitive data is fundamental to every information security standard. The average healthcare entity has thousands of systems, applications and users…all creating millions of audit logs – More than 70% are still relying on manual audits and the audit functions within applications to accomplish this critical task – Those using audit tools report seeing a 90% drop in work effort, an exponential increase in awareness, and a equal decrease in events HealthcareInfoSecurity.com 201133
Vendor Security • Start with both legal and security review during selection processes • Incorporate appropriate level of security requirements in contracts • Request/conduct third party review of all venders having direct access/retaining ePHI • Detail your expectations for data security and privacy to vendors • Have well defined incident response plans and agreements with vendors 34
Don’t Assume! • A large % of breach activity has been attributed to Business Associates. When asked about Business Associates two glaring facts told the whole story. – 82% ranked respondents confidence in their Business Associates and their subcontractors security controls at a 3 or below on a scale of 1 – 5, 5 being most confident – Yet 77% relied on their Business Associate Agreement alone to compel appropriate performance with no due diligence HealthcareInfoSecurity.com 201135
For more information Adam H. Greene, JD, MPH
[email protected] 202.973.4213
Michael “Mac” McMillan
[email protected] 512.402.8555
36
Questions
37