BreachExchange mailing list archives
Want to beat auditors and adversaries? Think like an attacker
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Fri, 21 Nov 2014 18:48:50 -0700
http://www.govhealthit.com/news/want-beat-auditors-and-adversaries-think-attacker Security is always a top concern, but the stakes are particularly high in the healthcare industry. The Department of Health and Human Services Office for Civil Rights (OCR) is conducting a tough new round of “desk” audits to measure HIPAA compliance, and their enforcement action against Concentra Health Services earlier this year is proof they’re not messing around. Their investigation of Concentra discovered that assessments conducted by the company had identified risks (specifically a lack of encryption on laptops) that they failed to address prior to a laptop being stolen from one of its facilities. Concentra was also found to have insufficient security management processes in place to protect personal health information. They were fined $1.7 million. And if the OCR doesn’t catch you slacking on the security front, hackers still might. Community Health Systems, which operates 206 hospitals across the United States, recently revealed that hackers broke into its computers and stole data on 4.5 million patients. This includes names, Social Security numbers, physical addresses, birthdays and telephone numbers. In addition to dealing with fines, Community Health will feel the impact of this breach in its patient numbers. Would you go back to a hospital that put you at risk of identify fraud? I didn’t think so. Unless you’re ready to accept millions of dollars in fines or a massive data breach as regular costs of doing business, it’s time to get serious about risk assessments and risk management. They’re the keys to surviving and thriving in this new environment. Your organization has probably made substantial investments in security technology. In addition to network firewalls and endpoint protection products, you’ve likely deployed data encryption technology, intrusion detection and prevention systems, vulnerability scanners and log management software, to name a few solutions. Those tools are important, but are the IT security dollars you are spending today significantly reducing your exposure to risk? Will your current security controls convince auditors that your IT environment and EHR system have been adequately secured from inadvertent data loss or deliberate cyber intrusions? Simply running periodic vulnerability scans, monitoring security events, and tuning device configuration is not enough. In fact, the result is a mountain of data, requiring time and valuable resources to process. And in most cases, your teams are already strapped for time. You need a way to narrow your focus on the most vulnerable points of your network and applications. You can (and should) take your security program a step further with attack intelligence. This requires looking at your organization through the eyes of an attacker. Understanding how real adversaries will behave in your environment is critical to understanding which vulnerabilities pose the greatest threat to your organization, so you can plan your defense strategy accordingly. Think of it this way: if a vulnerability somewhere within your organization could lead an attacker only as far as week’s lunch menu, is it a priority? Is it an area where you should be focusing your limited resources? Of course not. But if a vulnerability could lead an attacker all the way to the medical record application servers or the backend databases that hold ePHI, it must be addressed immediately. Attack intelligence enables to you cut through the noise, and focus on protecting the crown jewels. If you can predict where the hackers will strike and build your defenses accordingly, you will find the major security gaps before the “bad guys” (or the “good guys” looking out for patients’ right to privacy) beat you to it. This strategy will help your program meet crucial industry regulations, make your security team more efficient, and most importantly, protect patients. So take a hard look at your security program through the eyes of an attacker. Do you like what you see?
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Want to beat auditors and adversaries? Think like an attacker Audrey McNeil (Dec 01)