HHS Settles Malicious Insider Cybersecurity Investigation for $4.75 Million | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

[ad_1]

On February 6, the U.S. Department of Health and Human Services (“HHS”), Office of Civil Rights (“OCR”), announced that it had settled a cybersecurity investigation with Montefiore Medical Center (“Montefiore”), a non-profit hospital system based in New York City, for $4.75 million.  As brief background, OCR is responsible for administering and enforcing the Health Insurance Portability and Accountability Act of 1996, as amended, and its implementing regulations (collectively, “HIPAA”).  Among other things, HIPAA requires that regulated entities take steps to protect the privacy and security of patients’ protected health information (“PHI”).

In 2015, Montefiore was alerted that there was evidence of theft of a specific patient’s medical information.  After an internal investigation, Montefiore discovered that one of their employees stole the electronic PHI (“ePHI”) of 12,517 patients and sold the information to an identity theft ring.  OCR’s subsequent investigation of Montefiore revealed multiple potential violations of HIPAA, such as failures by Montefiore “to analyze and identify potential risks and vulnerabilities to” PHI and “to implement policies and procedures that record and examine activity in information systems containing or using” PHI.  According to OCR, the lack of safeguards caused Montefiore to be unable to prevent the cyberattack or “even detect” that the cyberattack had happened until years later.   

In addition to paying $4.75 million to OCR, Montefiore must implement a corrective action plan to secure and protect PHI.  Under the action plan, Montefiore will have to:

  • Conduct an accurate and thorough assessment of the potential security risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI;
  • Develop a written risk management plan to address and mitigate security risks and vulnerabilities identified;
  • Develop a plan to implement hardware, software, and/or other procedural mechanisms that record and examine activity in all information systems that contain or use ePHI;
  • Review and revise, if necessary, written policies and procedures to comply with HIPAA; and
  • Provide training to its workforce on HIPAA policies and procedures.

OCR will monitor Montefiore “for two years to ensure compliance with the law.”  OCR Director Melanie Fontes Rainer noted that this “investigation and settlement with Montefiore are an example of how the health care sector can be severely targeted by cyber criminals and thieves—even within their own walls . . . and it’s incumbent that our health care system follow the law to protect patient records.”

While announcing the settlement, OCR also reminded HIPAA-regulated entities of their obligations to mitigate and prevent cyber threats.  OCR provided general recommendations for HIPAA-regulated entities, including:

  • Reviewing all vendor and contractor relationships to ensure all required business associate agreements are in place and address breach/security incident reporting obligations.
  • Integrating risk analysis and risk management into business processes, and ensuring that such processes are conducted regularly, especially when new technologies and business operations are planned.
  • Implementing regular review of information system activity.
  • Utilizing multi-factor authentication to ensure only authorized users are accessing PHI.
  • Encrypting PHI to guard against unauthorized access.
  • Incorporating lessons learned from previous incidents into the overall security management process.
  • Providing training specific to organization and job responsibilities and on regular basis and reinforcing workforce members’ critical role in protecting privacy and security.

[ad_2]

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW