Industry News

Congress Holds Hearing on HHS Cybersecurity Role.

The Subcommittee on Oversight and Investigations of the United States Congress Committee on Energy and Commerce recently held a hearing reviewing the Department of Health and Human Services’ (HHS) role in cybersecurity.  Chaired by Congressman Tim Murphy, the hearing focused on the review of two HHS reports required by the Cybersecurity Act of 2015: the “HHS Cyber Threat Preparedness Report” and the “The Health Care Industry Cybersecurity Task Force Report”.  The reports detail HHS’ internal cybersecurity processes and provide industry recommendations for federal government and industry efforts to improve cybersecurity in the health care sector.  The hearing and reports also addressed the creation of the Health Cybersecurity and Communications Integration Center (HCCIC) and the Health Care Industry Cybersecurity Task Force.

The Health Care Industry Cybersecurity Task Force report identified six imperatives:

  1. Defining and streamlining governance and expectations for health care industry cybersecurity;
  2. Increasing the security of medical devices and health IT;
  3. Creating the workforce capacity necessary to prioritize cybersecurity awareness and capabilities;
  4. Increasing readiness via cybersecurity awareness and education;
  5. Identifying methods to secure R&D efforts and intellectual property from attacks; and
  6. Improving information sharing programs to manage threats and weaknesses.

The HHS cybersecurity hearing occurred amidst the backdrop of the global “WannaCry” ransomware cyberattack, which was used as a case study to explain the reports’ findings.  As with other cyberattacks, ransomware spreads through a phishing attack method.  Such attacks involve tricking email recipients into installing malicious software that encrypts their system, causing the user to lose access to their documents.  The user is then prompted to pay a ransom in order to have their system restored.  Accordingly, healthcare providers have concerns about their business and the risk of Protected Health Information (PHI) breaches.

As highlighted during the recent Congressional hearing and in the reports, one of the major challenges is maintaining security across unique platforms and devices while providing appropriate and timely patient care.  Striking the right balance between securing important data and protecting patient privacy needs requires continuous evaluation and adjustment.  Although the health care and public health sector has improved its ability to manage cybersecurity events, the challenges continue.  Health care organizations should therefore continually review their efforts to protect themselves against data breaches, malware, and ransomware.

Expert tips and reminders for safeguarding cyber security include the following:

  1. Do not assign cyber security responsibilities to someone at a low level in the organization;
  2. Ensure that software products are up to date with the most recent patches at all times;
  3. Establish an aggressive patching schedule for all software;
  4. Implement policies/procedures for precautions against malware;
  5. Train employees to avoid clicking on email links/attachments or responding to “phishing” inquiries;
  6. Regularly test users to make sure they are on guard;
  7. Configure email servers to block zip or other files that are likely to be malicious;
  8. Restrict permissions to areas of the network on a database access need;
  9. Grant system access using a need to know standard;
  10. Limit employee access to files on a single server to help avoid the spread of potential infections;
  11. Focus and prioritize security efforts on patient records;
  12. Conduct a risk analysis to identify ePHI vulnerabilities and ways to mitigate them;
  13. Maintain frequent data backups to permit restoration of lost data in case of an attack;
  14. Regularly take full snapshots of your data and store them offline;
  15. Monitor email carefully and do not open email attachments from unknown parties;
  16. Conduct regular systems tests to flag vulnerabilities before a hacker can gain access;
  17. Develop a business continuity plan to prevent down time;
  18. Maintain a disaster recovery and emergency operation plan;
  19. Prevent spread of infection by disconnecting infected systems from a network, disabling Wi-Fi, and removing USB sticks or connected external hard drives; and
  20. Establish real-time data backups to permit continuation of daily operations.

Congressional HHS Cybersecurity hearing materials are available at: