By Emily Margosian, content specialist
Target, Anthem, Equifax, and...your practice? As headlines continue to report on the next email leak, data breach, and ransomware attack, public awareness of cybercrime has never been higher. And while it may be tempting to assume hackers are primarily preoccupied with lofty targets such as financial institutions and major political parties, health care has emerged as the industry that is most commonly targeted by cybertheft.
The Office for Civil Rights reports that the number of data breaches occurring between 2016 and 2017 rose by 12.7%, with health care disproportionately bearing the brunt. A CynergisTek report found that in 2016 there was a dizzying 320% increase in health care providers who were victimized by hackers, and unsurprisingly, some of the most widely reported ransomware attacks of the past year have involved health care institutions. Atlanta-based Emory Healthcare had over 200,000 patient records compromised in January 2017, and in July 2017 Anthem reported the theft of 18,000 Medicare members’ personal data — the insurer’s second major data breach in two years, having already reached a $115 million settlement over a 2015 cyber-attack that compromised data of 78.8 million plan holders. Likewise, the “WannaCry” ransomware attack that paralyzed much of the world in May of 2017, compromised health records globally, impacting hospitals and health systems throughout the United States, United Kingdom, India, and China.
Why are cyber criminals so interested in medical records? Part of the answer has to do with the wealth of personal information that can be found within them, says Eric Deister, Chief Information Officer at Forefront Dermatology. “They don’t want to know that you have acne, they want to know your phone number, birth date, Social Security number, and insurance company. Providers have to be prepared, and having a response plan is almost the new reality. It’s a new world.”
Given this precarious new world, what should dermatologists know to keep their practices and their patients’ data secure? Dermatology World outlines the basics on:
-
Ransomware 101
-
How you can protect your practice
-
Avoiding HIPAA violations
Ransomware 101
Generally classified as any attack by a cybercriminal who withholds the data of a targeted individual or group until they receive payment, Robert Frazier, MD, of Norfolk, Virginia, can attest that ransomware is a sight that no physician wants to see. “I work at a dermatopathology laboratory, and recently ransomware corrupted our server,” he explains. “One day we came into work and could not access our laboratory information and billing software. Some of our employees had been given the option to work outside the lab, and the ransomware entered our network through one of our employees’ computers. Our passwords were also fairly simple and we never changed them.”
The situation went from bad to worse when it was discovered that daily server backups had not been completed as assumed. “Our information technology support company determined all we had to do was wipe the hard drive clean and restore the server from our daily backups,” says Dr. Frazier. “However, six months prior, we exchanged an old server with a new one, and unbeknownst to everyone involved, the daily backups were not properly set.”
Fortunately, in the end, only a handful of records were permanently lost. The hard drive was sent to a company specializing in data recovery, which was able to unlock the encryption codes — no ransom required. “Needless to say, it was a difficult and stressful week,” says Dr. Frazier. “We were not sure if we would be able to restore the encrypted data. Not having access to any of our pathology reports and billing information conceivably could have shut us down. We take information technology security very seriously now.”
The rise of ransomware over the past few years is due in part to the commoditization and ease of access to encryption software, says Brian Musci, director at AdRem Systems, an information technology services provider. “It used to be more ‘hey, we just want to mess with you by denying access to your information.’ Then it became a business,” he says. “I hate to say that, but there are literally sites set up where you can order a custom-made ransomware package. In the beginning they were just a bunch of text on the screen, but now these sites have become sophisticated enough to rival your best online retailers. Except instead of buying goods, you’re buying ransomware.”
For victims of ransomware who haven’t properly backed up their files, is there a case to be made for giving the hackers what they want? The experts are split. “The real risk is that even if you pay them — which the FBI suggests you don’t — are they really going to give you your information back?” asks Deister. However, others suggest there may be a case for biting the bullet, especially if the bounty is relatively low. “For some companies, sometimes ransomware demands aren’t even worth the time it takes to call IT to try to find out if there’s a backup,” says Moty Cristal, a professional negotiator at Nest Negotiation Strategies in Tel Aviv, Israel, in a May 2017 Guardian article. Even the recent WannaCry ransomware attack ultimately only generated a grand total $50,000 in Bitcoin — a seemingly paltry payout for such a massive international cyber-attack. (See sidebar for more on Bitcoin and cryptocurrency.)
“So I will say this: for all of our customers, given the way that we back up data and the way that our continuity plans work, I would not recommend paying a ransom because of the way that we do our systems,” says Musci. “However, if you have no back-ups, you really don’t have a choice. Not paying the ransom means no longer having any of your data, which likely means your practice is going to completely shut down. If you don’t have your data, you’re done. My best advice to a practice is to spend the money on a qualified IT company that’s doing the right things. It’s a cheap insurance policy at the end of the day.”
Regardless of whether or not they decide to pay a ransom, there are still three main follow-up actions physicians should take following a confirmed cyber-attack, according to David Goldberg, MD, JD, a dermatologist and lawyer from New York. “One, is you immediately have to change everybody’s password in the office. Two, you have to notify patients that there has been a hack and that you’ll do everything reasonable to make sure that no damage is done to them personally. And then three, you do have to notify the authorities,” he says.
The time frame in which physicians are required to report a data breach to the authorities depends on the number of patients impacted. “When there’s a true instance of a data breach or ransomware, then we have to look at the protocol that HHS puts out there,” says Musci. “In the event of a breach where you have 500 or more individuals affected, then you have 60 days to report the violation. If less than 500 people were impacted, then you have until the end of the year to submit formal notice that a breach occurred.”
