Wednesday, March 30, 2016

Healthcare

The problem with healthcare and info sec is the primary objectives of healthcare. Fortunately for all of us the directive of the healthcare industry is patient care. Prima facie, this is common sense. The hospital or other facility in fulfilling its mission has to share data (patient records, prescriptions presently being taken, treatment plans, etc.) among multiple parties. This provides an opportunity for breaches as the endpoints for attack increase exponentially. Instead of one person or group having access, there are many others who require this.
The increase in the number of persons with access provides many more targets for social engineers. This increase in vulnerable endpoints allows for work to be focused on exploiting and breaching the healthcare provider. A not so gentle reminder of this issue are the hospital breaches and encrypted files/servers, especially the recent example in Hollywood with the ransomware payment of $17k, and the infamous OPM breach.
To mitigate this, there is a simple formula. The issue has been and will continue to be difficult for the user to implement. The most direct integration strategy involves training. The standard training regimen is completely applicable. With the data flow and number of endpoints, coupled with the liability to the entity in the event of a breach, additional training is reasonable. The staff members (nurses, nursing assistants, physicians, physician assistants, and others) need to know what to be aware of. The training would need to focus on the spear phishing, methods social engineers use to gain the rapport of others, so the staff members are aware of what modes of attack may be used.

With this being done, the opportunity for a successful breach would be lowered. 

No comments:

Post a Comment