BreachExchange mailing list archives

With continuing breaches, mHealth should learn from past thefts


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 27 Jul 2015 17:59:18 -0600

http://searchhealthit.techtarget.com/news/4500250556/With-continuing-breaches-mHealth-should-learn-from-past-thefts

With breaches in healthcare not slowing down anytime soon -- consider the
recent UCLA health system data breach -- experts at the recent mHealth +
Telehealth World Congress discussed security breaches, what healthcare
organization can learn from those breaches and the value of stolen
protected health information (PHI).

"There's amazing concern that with mobile apps and mobile devices [and]
Internet of Things that there's less of a focus on quality control and
information security development," said Edward Grogan, vice president and
CIO at Calvert Health System Inc., based in Prince Frederick, Md.

Kristi Kung, senior associate at law firm Pillsbury Winthrop Shaw Pittman
LLP in Washington, D.C., agreed that with more mobile health apps, more
mobile devices and more devices being connected to the Internet, there's a
greater threat of attack. "Just because you have a secure device does not
mean that privacy's always maintained. Any time you're connected to the
Internet, you're always susceptible to attackers," she said.

She added that, "the worst is not behind us" and that "the healthcare
environment isn't as prepared."

Grogan and Kung shared ideas on how healthcare organizations can better
prepare for mobile health (mHealth) security.

Learn from others -- especially those outside of healthcare

Grogan advised attendees at mHealth + Telehealth World to apply lessons
from the Target and Heartland Payment Systems Inc. breaches.

In Target's breach, network credentials were stolen in an email malware
attack on a third-party vendor that had a supplier portal to the retailer,
Grogan said.

"Some of the lessons learned from that breach [are] to consider the weakest
link and evaluate third-party vendor security," Grogan said. Other lessons
to glean from the Target breach include making sure hospitals incorporate
multifactor authentication, where a person must provide two or more
credentials to get access to the information, and use network segmentation,
where computer networks are split into separate networks.

Grogan said that had Target segmented the supplier network from the
consumer network, most likely the breach would not have happened.

He added that containerization would also have helped in this case, in
which virtual instances are allowed to share a single host operating
system. Organizations can achieve greater security by isolating containers
from each other.

In Heartland's case, the payment systems company suffered a data breach in
2008, during which attackers made off with digital information for 100
million credit and debit cards. Heartland also had another data breach in
May 2015. In this case of the 2008 breach, preventive actions that could
have been taken -- and healthcare organizations should consider -- include
appointing senior leadership with security as their sole focus, security
data sharing, end-to-end encryption, tokenization and chip technology,
Grogan said.

At the end of Grogan and Kung's presentation, an attendee asked whether
there was a popular use for stolen PHI, and whether it was possible to
trace it back to who stole the PHI and who subsequently bought it.

"Healthcare records are so much better than a stolen Social Security
number, because a healthcare record has all that information already.
You've got Social Security number, you've got financial information and
then you have all the medical information about that person, too," Kung
said. "You're not just talking about traditional identity theft."

Not to mention that healthcare records can fetch a sizeable amount of money
on the black market. While stolen credit card information usually goes for
$1 to $2, Kung said, medical records can go for $20 to $50, ranging from
pieces of a patient's medical documentation to an entire record.

Chances are slim of finding out who bought stolen PHI. "As for tracking it
back, I think that's very difficult to do at this point," Kung said.

Grogan and Kung also fielded a question about what the uses are for knowing
someone has a broken leg, for example.

To that, Grogan's only reply was that it's simply a loss of privacy on the
part of the patient.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: