570 likes | 825 Views
Taking on the Oceans of Security Monitoring. Peg Richards/Sonal Pandey Penn Medicine Lancaster General Health. Penn Medicine Lancaster General Hospital. 631-licensed bed LGH Laboratory is ISO Certified Ranked in US News and World Report Honor Roll Magnet Hospital
E N D
Taking on the Oceans of Security Monitoring Peg Richards/Sonal Pandey Penn Medicine Lancaster General Health
Penn Medicine Lancaster General Hospital • 631-licensed bed • LGH Laboratory is ISO Certified • Ranked in US News and World Report Honor Roll • Magnet Hospital • MLO “2019 Lab of the year”
Our Soft Versions • Soft utilized as LIS since 2008 • Versions of Soft - SoftLab/Mic 4.0.8.2 - SoftSec 1.0.1.44 - SoftBank 25.5.3.3 - SoftID 2.6.0.7 - SoftPath 4.4.1.2 - SoftDonor 4.5.3.3.18
Overview • Stages of a Cyber Attack • Why Monitor • Recent Breaches • Security Setups • Audits – Weekly, Monthly, Yearly • Tools for Monitoring
Stages of Cyber Attack • Step 1: Attacker gains access to the system • Phishing • Stolen Laptop • Network Server Breach • Step 2: Damage performed to system • Virus Installed • Stole info to sell on the Black Market (illegal underground market) • Ransomware Installed
Why Monitor? • Responsibility to our patients/customers • Compliance with Regulatory agencies, e.g. CAP, FDA, AABB, TJC • To reduce risks of incidents • To detect questionable incidents faster • To maintain credibility with patients/customers
Other reasons to Monitor • Black Market- a large appetite for health care data right now • Hacking is cheap, easy, deniable, and everybody is doing it • Hard to prosecute
Monitor- Internal Security Issues • Requests for audit trails on patient record from Privacy Team • Internal privacy breaches
Source of Breaches - General • Third Party Vendors • Network Server • Email-phishing • Stolen Laptop • Portable Device • Desktop Computer
Source of Breaches - Vendors • Third party data breaches increased 61% in 2018 in USA • Weak security link between vendor and organization used to access data
Breach Avoidance Methods – Vendors (LGH) • Apply Windows security/updates to vendor PC on network • Apply security software (e.g McAfee) on vendor PC and update software on a regular basis • Vendor access request: vendor has access to system for 72 hours
Breach Avoidance Methods - LGH • Security cameras • Email/Spam Filtering • Dual authentication • CyberArk privileged account • Use encrypted USB drives • Use secure and encrypted connections to external parties (e.g. VPN)
PHI Security: 2 Prong Approach • Part 1-Technology to protect data • Part 2-Create a workplace culture of PHI/HIPPA awareness which includes education, mandatory annual training, and reminders • Send sensitive emails to outside your organization encrypted
The Black Market for Health Data • Basic health insurance credentials alone $20 for each record • A combination of health, personal, and financial data on one person is worth $1000 on the black market • Compare to stolen credit cards $1
Ransomware • Hacker generally does not release the system to users until the ransom is paid • Ransom amount to be paid is a low number per US standards • Most health care institutes clear the ransomware rather than pay • Cass Regional Missouri diverted all emergencies for 1 week after attack in July 2018
Government Agency Breach Reporting • Healthcare systems in USA who have breaches of 500 or more persons must report breach to US Department of Health and Human Services so that the Office for Civil Rights can investigate • The worst recent breach was 2.65 million individuals affected • As of 4/15/19 a total of 443 breaches within a 24 month period were under investigation
Other Cyberattack Data • Fall 2018 Report: Victims of Cyberattack include 25% healthcare organizations, 20% financial institutes, and 14% for the media/communications/technology sector • Average cost of attack is $1 million or more • Ransomware totals 2017: • Healthcare 34% • Manufacturing 17% • Professional Services 15% • Others 27%
Security Setting Overview • Role based security • Domain authentication • Password failure threshold • Complex password use • Limit access to build roles • Limit access within Soft Security • Time out session after no activity - 15 minutes • User inactivation after 12 weeks of inactivity
Weekly Audits 1. Password failures 2. Changes in Soft Security 3. Audit active users with higher level access
Weekly Audits - Password Failures • Security Management or Reports Launcher can be used for a failed login report • Set an expected threshold of “X” amount of password failures in one day for a user
Weekly Audits - Changes in Soft Security • Audit that only users authorized to make changes in Security are actually making the changes
Weekly Audits – High level access users • Audit users with Security Management Access
Monthly Audits 1. PC’s not used 24/7 for after hours activity 2. Active roles, inactive roles, and role changes 3. Users setup in Security but never logged into the system
Monthly Audits - PCs Not Used 24/7 • Create a list of PC’s that used regular business hours • Use audit trail to look for activity on those PC’s outside regular business hours
Monthly Audits - Active Roles • Report active roles, inactive roles, and role changes to our Privacy Department every month
Monthly Audits – No user login • SoftSec setup to inactivate users who did not sign into system for 12 weeks • Above setup does not apply to users who NEVER logged into the system • Audit each month for users who never logged in • If user was setup and never logged in after 6 weeks inactivate user
Monthly Audits – No user login • Enter 6 week prior date in “Last Login date before”, find
Annual Audits 1. Manager Audits for Active Users By Role 2. Manager Role Audit 3. 3rd Party Security Audit
Annual Audits - Manager Audits for Users • Reviews users with temporary access to help another lab section • Reviews list for any users that are no longer with the organization
Annual Audits – Role checks with Lab Section Managers • Annually audit all options included within each role
Annual Audits - Third Party vendor Audits • Hospital hires security experts to review systems on a yearly basis • Multi-system Security check including Soft • Checks for robustness of our audits and setup • Makes suggestions for improvement
Tools Within Soft to Assist Monitoring • Tools Built In Soft Security • Tools Built in Soft Reports Launcher • Email Notification Setup in Settings and Definitions
Tools - Soft Security • Version Specific • Links to SoftReports and Audit Trail in Security • Advanced Reports like Role Time Out