Defending Against Common Cyber-Attacks
Throughout 2020 and 2021, hackers have targeted the health care industry seeking unauthorized access to valuable electronic protected health information (ePHI). The number of breaches of unsecured ePHI reported to the U.S Department of Health and Human Service’s Office for Civil Rights (OCR) affecting 500 or more individuals due to hacking or IT incidents increased 45% from 2019 to 2020.
Although some attacks may be sophisticated and exploit previously unknown vulnerabilities (i.e., zero-day attack), most cyber-attacks could be prevented or substantially mitigated if HIPAA covered entities and business associates (“regulated entities”) implemented HIPAA Security Rule requirements to address the most common types of attacks, such as phishing emails,
Phishing
One of the most common attack vectors is phishing. Phishing is a type of cyber-attack used to trick individuals into divulging sensitive information via electronic communication, such as email, by impersonating a trustworthy source.
The Security Rule requires regulated entities to implement a security awareness and training program for all workforce members.
Regulated entities should follow up on security training with periodic security reminders. The Security Rule includes an addressable
In addition to education, regulated entities can mitigate the risk of phishing attacks by implementing anti-phishing technologies. Anti-phishing technologies can take several approaches. One approach examines and verifies that received emails do not originate from known malicious sites. If an email is suspected of being a threat, it can be blocked and appropriate personnel notified. Other approaches can involve scanning web links or attachments included in emails for potential threats and removing them if a threat is detected. Newer techniques can leverage machine learning or behavioral analysis to detect potential threats and block them as appropriate. Many available technology solutions use a combination of these approaches.
Regulated entities are required to ensure the integrity of ePHI by implementing “policies and procedures to protect ePHI from improper alteration or destruction.”
Combining an engaged, educated workforce with technical solutions gives regulated entities the best opportunity to reduce or prevent phishing attacks.
Exploiting Known Vulnerabilities
Hackers can penetrate a regulated entity’s network and gain access to ePHI by exploiting known vulnerabilities. A known vulnerability is a vulnerability whose existence is publicly known. The National Institute of Standards and Technology (NIST) maintains the National Vulnerability Database (NVD),
Although older applications or devices may no longer be supported with patches for new vulnerabilities, regulated entities should still take appropriate action if a newly discovered vulnerability affects an older application or device. Regulated entities should upgrade or replace obsolete, unsupported applications and devices (legacy systems). However, if an obsolete, unsupported system cannot be upgraded or replaced, additional safeguards should be implemented or existing safeguards enhanced to mitigate known vulnerabilities until upgrade or replacement can occur (e.g., increase access restrictions, remove or restrict network access, disable unnecessary features or services).
Regulated entities are required to implement a security management process to prevent, detect, contain, and correct security violations.
Regulated entities can identify technical vulnerabilities to include in their risk analysis in a number of ways including:
- subscribing to Cybersecurity and Infrastructure Security Agency (CISA) alerts
https://us-cert.cisa.gov/ncas/alerts, links to an external website. and bulletins;https://us-cert.cisa.gov/ncas/bulletins, links to an external website. - subscribing to alerts from the HHS Health Sector Cybersecurity Coordination Center (HC3);
https://www.hhs.gov/about/agencies/asa/ocio/hc3/contact/index.html. - participating in an information sharing and analysis center (ISAC) or information sharing and analysis organization (ISAO);
- implementing a vulnerability management program that includes using a vulnerability scanner to detect vulnerabilities such as obsolete software and missing patches; and
- periodically conducting penetration tests to identify weaknesses that could be exploited by an attacker.
Regulated entities should not rely on only one of the above techniques, but rather should consider a combination of approaches to properly identify technical vulnerabilities within their enterprise. Once identified, assessed, and prioritized, appropriate measures need to be implemented to mitigate these vulnerabilities (e.g., apply patches, harden systems, retire equipment).
Weak Cybersecurity Practices
A regulated entity that has weak cybersecurity practices makes itself an attractive soft target. Weak authentication requirements are frequent targets of successful cyber-attacks (over 80% of breaches due to hacking involved compromised or brute-forced credentials).
Regulated entities are required to verify that persons or entities seeking access to ePHI are who they claim to be by implementing authentication processes.
Implementing access controls that restrict access to ePHI to only those requiring such access is also a requirement of the HIPAA Security Rule.
Regulated entities should periodically examine the strength and effectiveness of their cybersecurity practices and increase or add security controls to reduce risk as appropriate. Regulated entities are required to periodically review and modify implemented security measures to ensure such measures continue to protect ePHI.
Conclusion
Although malicious attacks targeting the health care sector continue to increase, many of these attacks can be prevented or mitigated by fully implementing the Security Rule’s requirements. Unfortunately, many regulated entities continue to underappreciate the risks and vulnerabilities of their actions or inaction (e.g., increased risk of remote access, unpatched or unsupported systems, not fully engaging workforce in cyber defense). The standards and implementation specifications of the HIPAA Security Rule provide a baseline for protecting ePHI. This document cites only a small sample of Security Rule requirements that can assist organizations in combatting cyber-attacks. The Security Rule in its entirety provides a foundation for helping regulated entities ensure the confidentiality, integrity, and availability of their ePHI. Further, HHS is collaborating with its industry partners, through the HHS 405(d) Aligning Health Care Industry Security Approaches Program, to provide the HPH sector with useful and impactful resources, products, and tools that help raise awareness and provide vetted cybersecurity practices, to combat cybersecurity threats common.
Resources
- OCR Director Lisa J. Pino’s February 22, 2022 Blog Post, Improving the Cybersecurity Posture of Healthcare in 2022: https://www.hhs.gov/blog/2022/02/28/improving-cybersecurity-posture-healthcare-2022.html
- 2020 Annual Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance: https://www.hhs.gov/sites/default/files/compliance-report-to-congress-2020.pdf, opens in a new tab [PDF, 592 KB]
- 2020 Annual Report to Congress on Breaches of Unsecured Protected Health Information: https://www.hhs.gov/sites/default/files/breach-report-to-congress-2020.pdf, opens in a new tab [PDF, 556 KB]
- OCR Phishing Cybersecurity Newsletter: https://www.hhs.gov/sites/default/files/cybersecurity-newsletter-february-2018.pdf, opens in a new tab [PDF, 117 KB]
- Cybersecurity and Infrastructure Security Agency’s Ransomware resources for the Healthcare and Public Health Sector: https://www.cisa.gov/stopransomware/healthcare-and-public-health-sector, links to an external website
- NIST Phish Scale Rating System: https://www.nist.gov/news-events/news/2020/09/phish-scale-nist-developed-method-helps-it-staff-see-why-users-click, links to an external website
- NIST National Vulnerability Database: https://nvd.nist.gov, links to an external website
- OCR Cyber Security Incident Checklist: https://www.hhs.gov/sites/default/files/cyber-attack-checklist-06-2017.pdf, opens in a new tab [PDF, 76 KB]
- NIST Security Configuration Checklists: https://csrc.nist.gov/Projects/National-Checklist-Program, links to an external website
- SRA Tool: https://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment-tool
- ONC 7 Step Approach for Implementing a Security Management Process: https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide-chapter-6.pdf, opens in a new tab
- ONC/OCR Guide to Privacy & Security of Electronic Health Information: https://www.healthit.gov/topic/health-it-resources/guide-privacy-security-electronic-health-information
* This document is not a final agency action, does not legally bind persons or entities outside the Federal government, and may be rescinded or modified in the Department’s discretion.