DATA BREACHES IN HEALTHCARE BY CHUCK EASTTOM

Slides:



Advertisements
Similar presentations
Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
DATA BREACHES IN HEALTHCARE BY CHUCK EASTTOM
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Mr C Johnston ICT Teacher
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Welcome. Mission To provide our customers with solutions that deliver immediate results by fully understanding their requirements and applying the power.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Computer Security Fundamentals
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Web Application Testing with AppScan Terry Labach.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Defining Security Issues
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Business Continuity from an Insurance Perspective Presented by Jim Carter Manager, Risk & Insurance.
What does “secure” mean? Protecting Valuables
AUDITORÍA THE APPCO. VOLUME 8: CRITICAL ASSET FOR PEOPLE.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Information Security What is Information Security?
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Scott Charney Cybercrime and Risk Management PwC.
Chap1: Is there a Security Problem in Computing?.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Computer Security By Duncan Hall.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Importance of Physical Security Common Security Mistakes 1.Security Awareness 2.Incident Response 3.Poor Password Management 4.Bad administrative.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Computer Security Sample security policy Dr Alexei Vernitski.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014.
CompTIA Security+ Certification Exam SY
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Information Security and Privacy in HRIS
Data and database administration
Common Methods Used to Commit Computer Crimes
Forensics Week 11.
COMPTIA CAS-003 Dumps VCE
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CIS 502 Education for Service-- tutorialrank.com
How to Mitigate the Consequences What are the Countermeasures?
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
6. Application Software Security
Presentation transcript:

DATA BREACHES IN HEALTHCARE BY CHUCK EASTTOM

ABOUT THE SPEAKER 18 books (#19 in progress) 29 industry certifications 2 Masters degrees 6 Computer patents Over 20 years experience, over 15 years teaching/training Worked on EMR/EHR and medical billing software Frequent consultant/expert witness

WHAT IS THE SITUATION? Verizon's 2015 Data breach report lists 234 Healthcare incidents 95 with confirmed data loss Top four areas for the health care industry (from worst) are: Miscellaneous errors Privilege misuse Lost and Stolen Assets Web Applications

OUR TOPIC TODAY The flaws that affect Healthcare IT. We will discuss the flaw, the causes of the flaw, and remediation of the flaw. In some cases I will use real world case studies I have encountered that illustrate serious flaws in healthcare security. With the exception of well publicized cases, names of organizations involved and any hint as to their identities have been removed due to confidentiality issues.

REAL WORLD CASE STUDY Small medical billing company that outsources their IT. Their IT support company is very much entry level. Their billing personnel work from home. Both billing personnel and their IT support personnel use Remote Desktop to interact with the servers. They do not use a VPN Remote Desktop is very convenient, and highly insecure. Also no layered defense. Once you login via Remote Desktop to one server, you can immediately access all servers.

WHAT DOES THIS MEAN Secure connectivity is critical Proper use of VPN’s, remote access, and authentication is key. Vetting of remote users equipment.

REAL WORLD CASE STUDY EMR producer Very good programming team. Security was only addressed in the most superficial manner: Using HTTPS (good!) Using user authentication (good!) Administration did not include enforcement of password policies (bad!) Did not filter user input (bad!) Did not store passwords as a hash (very bad!) Passwords too short (very bad!!) Did not separate user functionality (bad!)

WHAT DOES THIS MEAN Secure programming is needed. Security in design, development, and testing. My own experience is that all too often medical software lags in security.

REAL WORLD CASE STUDY Healthcare portal The IT Team Reasonably competent programmers Relied heavily on outsourced teams Insistence on using latest programming design fad, even if not appropriate. No discussion of security in design or development meetings No discussion of security as part of testing Thought simply using SSL/TLS was enough What did this cause Poor authentication and authentication errors Vulnerability to common web attacks Unstable platform

WHAT DOES THIS MEAN Secure programming is needed. Security in design, development, and testing. My own experience is that all too often medical software lags in security. All of which requires a knowledge of security

ANTHEM STORY “SAN FRANCISCO - As many as 80 million customers of the nation's second-largest health insurance company, Anthem Inc., have had their account information stolen, the company said in a statement. The hackers gained access to Anthem's computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses, addresses and employment information, including income data” Feb 2015 USA Today Wall Street Journal reported that the attack appeared to be advanced, using customized tools rather that generic utilities downloaded from the web. Some experts claim China behind the attack. An admin discovered the breach when he noticed data queries running with his ID that he did not initiate.

WHAT DOES THIS MEAN TO HEALTHCARE COMPANIES? “Premera Blue Cross failed to adequately protect its customers' personal information and notify them of a recent data breach in a timely manner” according to the latest class-action lawsuit filed Thursday against the insurer in federal court in Seattle

WHAT DOES THIS MEAN Obviously flawed auditing Poor access controls No standard security measures such as least priveleges

HEALTHCARE.GOV CIO magazine did an analysis and found Improper implementation of development methodology Inadequate testing No threat modeling One site submitted username and password in plain text

WHAT IS THE ISSUE? According to Information Week More than 41% of healthcare organizations do not use endpoint encryption, even though approximately one-third of employees work remotely at least once a week, according to Forrester Research. Sixty-eight percent of the industry's breaches since 2010 have occurred because files or devices were stolen, the Bitglass 2014 Healthcare Breach Report determined. Hacker attacks increased 600% in the first 10 months of 2014 versus the prior year, Websense Security Labs' Carl Leonard told TechNewsWorld.

COMMON HEALTHCARE IT PROBLEMS No emphasis on secure programming No emphasis on security testing as opposed to functionality testing Poor implementation of security operations Employees poorly trained in security Security not a priority in software design Poor understanding of and implementation of cryptography as well as other security measures Poor authentication and auditing

THE SOLUTION First and foremost training Emphasis on security throughout design and development Solid software engineering not buzzwords and fads Secure programming General security measures Security audits and penetration tests