{"id":2907,"date":"2020-04-28T07:22:35","date_gmt":"2020-04-28T07:22:35","guid":{"rendered":"https:\/\/www.empowerelearning.com\/blog\/?p=2907"},"modified":"2020-04-28T07:23:30","modified_gmt":"2020-04-28T07:23:30","slug":"how-to-secure-your-medical-practice-against-cyber-threats-even-if-youre-working-from-home","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/how-to-secure-your-medical-practice-against-cyber-threats-even-if-youre-working-from-home\/","title":{"rendered":"How to secure your medical practice against cyber threats \u2013 even if you\u2019re working from home"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">How to care for COVID-19 patients is not the only question haunting physicians. Here are three cybersecurity issues that probably trouble them even more.<\/span><span style=\"font-weight: 400;\">\u00a0 <\/span><\/p>\n<ol>\n<li>How safe is my personal computer, if I have to work from home?<\/li>\n<li><span style=\"font-weight: 400;\">Can I use my mobile phone to access the office EHR?\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">What are the chances of my practice getting crushed by a ransomware attack?<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Phishing and ransomware attacks are threats as real as COVID-19 for every medical facility.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The FBI notification of April 1, confirms this threat. It reported more than <\/span><a href=\"https:\/\/www.ic3.gov\/media\/2020\/200401.aspx\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">1200 complaints<\/span><\/a><span style=\"font-weight: 400;\"> related to COVID-19. The reported incidents include, phishing attacks against first-responders and ransomware attacks on medical facilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Information security has always been the top healthcare priority. But now, with physicians working away from their secure office networks \u2013 this subject needs urgent attention. Based upon the AMA and AHA <\/span><a href=\"https:\/\/www.ama-assn.org\/press-center\/press-releases\/ama-aha-respond-rise-cyber-threats-exploiting-covid-19-pandemic\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">recommendations for physicians<\/span><\/a><span style=\"font-weight: 400;\">, this blog article addresses the following four cybersecurity issues.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Securing your computer\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Securing your mobile devices<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Protection of home network<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Working with medical devices<\/span><\/li>\n<\/ol>\n<h2><b>The two biggest cyber threats \u2013 Phishing and Ransomware<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Phishing and ransomware have been identified as the two biggest cyber threats to healthcare practices, and you as a healthcare worker should grow weary of the threat they pose. The year 2019 was particularly a dreaded year with several practices forced to stay shut for long periods due to Ransomware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Phishing attacks, especially spear phishing, are the first to look out for. A phishing attack is what mostly precedes ransomware attacks. They can even lead to malware attacks that attempt at stealing medical records from your computer and office networks. Be very careful when clicking links, opening attachments, and downloading files.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First thing that you need to tackle this challenge is to make your computer safe. Here are the essential steps that must take:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make sure that every member of your staff has a unique login name and password.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Have strong passwords\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Bar all users from using Administrative login. Create limited access accounts for everyone.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use only safe, and necessary software. Audit the software installed on your computer &#8211; Delete any unfamiliar software as soon as you find it.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keep your operating system, browser and software updated. These updates often address security issues. If this is not done on time, it can lead to theft or destruction of patient information. Check your computer and browser settings, if an update is pending then run it. If workable, activate automatic updates.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Buy and install an antivirus software. Run anti-virus software updates at least once a week.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If you use MS-office, then disable macros.\u00a0<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Here&#8217;s the AMA checklist for <\/span><a href=\"https:\/\/www.ama-assn.org\/system\/files\/2020-04\/computer-security-checklist.pdf\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">more tips<\/span><\/a><span style=\"font-weight: 400;\"> on securing your computer.\u00a0<\/span><\/p>\n<h2><b>Use Virtual private network (VPN)\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The next thing to consider is connecting your home devices to your office network. Unsecure connections can get intercepted by cyber criminals.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consider using a Virtual private network (VPN) for connecting with your office network. If you need to access patient records or diagnostic images stored in your EHR system, use the VPN. It\u2019s very much a virtual wire to your office computers. Because a VPN connection is encrypted, you won\u2019t have to worry about people snooping on your computer.\u00a0<\/span><\/p>\n<h2><b>Protecting your emails from phishing attacks\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Most malware and ransomware attackers sneak in through your email system. Your first line of defense is to activate email protections, such as advanced threat protection (ATP). ATP can detect malware based behaviors and warn you in advance.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another important protection is establishing multi-layer authentication in your processes. If you receive an email request for sharing data or changing payment information, call and get a verbal confirmation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other important suggestions include, enabling<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Multi-factor login authentication<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Lock-out feature for repeated incorrect login attempts<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\u2018External email\u2019 banners for outside emails<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Application whitelisting for apps that can run on your system<\/span><\/li>\n<\/ol>\n<h2><b>Have a back-up strategy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If your firm gets hit by a ransomware or malware attack, it\u2019s really difficult to get your computers back. Experience shows that paying ransom, too, doesn\u2019t work in most cases. The best protection against such attacks is to have a data back-up strategy and getting an insurance policy against cyber threats.<\/span><\/p>\n<h2><b>Consider using the 3-2-1 rule to create your backup\u00a0<\/b><\/h2>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Have 3 offline segmented backup copies of your data<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use 2 different storage media types<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Have 1 cloud based backup.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">And, ensure direct and cloud access to your backup data is highly restricted.\u00a0<\/span><\/p>\n<h2><b>Review your cybersecurity insurance\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Review your cybersecurity insurance, find out what\u2019s covered and what are the limitations of your policy.\u00a0<\/span><\/p>\n<h2><b>What if you get hit by a cyberattack?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Notify your financial institution immediately.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The probability of you getting your money back remains high in the first 72 hours. At the time, find a complaint with the local FBI field office and at the IC3 website \u2013 they would work with you and your institution to get your funds back.<\/span><\/p>\n<h2><b>How to get your data back?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Prepare a list of <\/span><b>Forensic firms<\/b><span style=\"font-weight: 400;\"> who could help you recover your data in the event of a ransomware or malware attack. Contact the FBI. They may be able to work with you and other agencies to help with decryption of your data (jargon) or in negotiating with the perpetrators.\u00a0<\/span><\/p>\n<h2><b>But sometimes I use my phone for work purposes!\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It\u2019s recommended that whether you use a personal computer, a laptop, tablet or a mobile phone, use a VPN to access your office network.\u00a0<\/span><\/p>\n<h2><b>Which VPN to use?\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Contact your EHR vendor to figure out which VPN would they recommend to be used with their software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, just using a VPN isn\u2019t enough. Again, ensuring strong safety measures are necessary to ensure that your network doesn\u2019t get hacked. Multi-factor authentication, strong password practices, timely security updates, remain the most important protections against intrusions.\u00a0<\/span><\/p>\n<h2><b>EHR and telemedicine Apps<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you select to work using your mobile devices, you may want to consider apps that allow you to manage your EHR from your device. There are apps available for providing telemedicine services and communicating with your patients.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019d also come across apps that support all three &#8211; managing EHR, telemedicine services and communicating with patients. But, before you start using an App, it\u2019s best to consult with your EHR vendor first. Find out\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If they endorse the app that you want to use<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If they have an in house Apps<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Recommended apps<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The compatibility of the app at you select with your devices<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Also, go through the App list on this page when choosing your telemedicine app \u2013 these apps are known to agree to get into business associate agreements with covered providers.\u00a0<\/span><\/p>\n<h2><b>Safeguarding your home network<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The biggest trouble which you might come across would be to safeguard your network connection. At hospitals and clinics, this work was being done by a professional IT consultant. Now, the entire onus for the protection of your network falls upon you.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Weaknesses in your home network can be exploited and impact patient information. The risks include devices such as your printer, mobile phone, tablets, computers sharing networks, and so on \u2013 If any of them gets compromised, your electronic health data can get compromised.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s the document from AMA to help <\/span><a href=\"https:\/\/www.ama-assn.org\/sites\/ama-assn.org\/files\/corp\/media-browser\/public\/government\/advocacy\/network-security.pdf\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">secure your home network<\/span><\/a><span style=\"font-weight: 400;\"> from cybersecurity threats.\u00a0<\/span><\/p>\n<h2><b>Precautions with Medical Devices<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Your medical devices too aren\u2019t safe from cyberattacks. Medical devices are often exploited by criminals to launch malware and ransomware attacks.\u00a0<\/span><\/p>\n<h2><b>Here are a few steps that you can take<\/b><\/h2>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Involve your information security team when acquiring new medical devices. They should also be involved with daily use and maintenance of devices with you.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Maintain an inventory of medical devices with you, classifying which devices network connected, network capable, and stand alone.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keep an inventory of the operating systems, firmware, and software applications contained in your devices. Ask the manufacturer to provide you with a \u2018software bill of material\u2019 for your devices.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Install updates and patches as soon as a vendor releases a new version.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Disconnect vulnerable medical devices from your network.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use proper access controls, password protection, and encryption for your devices.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Remove all unnecessary information stored on your medical devices.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Information security is considered as a top priority by all healthcare organizations. If you need any help with your Information security systems, or if you want to share your views with our readers, please leave a comment in the section below. Our readers would be happy to reply to your queries. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to care for COVID-19 patients is not the only question haunting physicians. Here are three cybersecurity issues that probably trouble them even more.\u00a0 How safe is my personal computer, if I have to work from home? Can I use my mobile phone to access the office EHR?\u00a0 What are the chances of my practice [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2908,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,138,140],"tags":[185,46,183],"class_list":["post-2907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education","category-elearning","category-empower","tag-cybersecurity","tag-empower","tag-password-protection"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=2907"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2907\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media\/2908"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=2907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=2907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=2907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}