eugenesergeev - Fotolia
The Health and Human Services Department's Office of Civil Rights ruled that ransomware attacks are HIPAA breaches and released a new guidance about how healthcare organizations should handle ransomware attacks under the HIPAA regulations. What's included in this guidance? How should organizations respond to healthcare ransomware to maintain compliance?
Ransomware poses an increasingly dangerous threat to enterprise security. In the first half of 2016, organizations experienced 4,000 ransomware attacks per day, a 300% increase from 2015. These attacks often target healthcare organizations responsible for electronic protected health information (ePHI), prompting the Department of Health and Human Services to release a guidance on the topic.
The guidance starts by describing the threat of healthcare ransomware: attackers encrypt the data belonging to an organization using a secret encryption key and then use that secret key as leverage to demand ransom from the organization. Unless the organization pays the ransom, it is unable to gain access to its own information. In the case of healthcare records, this can have disastrous consequences for patient safety.
Covered entities and their business associates that comply with HIPAA may find themselves well-situated to prevent healthcare ransomware infections, as well as other malware attacks. These organizations already follow practical security measures, including conducting risk assessments, putting strong security procedures in place, training staff and limiting access to ePHI on a need-to-know basis.
When a HIPAA-compliant organization suffers a ransomware infection, it is often better prepared to recover than other entities. For example, HIPAA requires that healthcare providers have a solid disaster recovery plan that includes backing up important health records. If an organization falls victim to a healthcare ransomware infection, these backups can provide an authoritative source of the original data without paying the ransom.
Ask the Expert:
Got a vexing problem for Mike Chapple or any of our other experts? Ask your enterprise-specific questions today. (All questions are anonymous.)
Check out this handbook on how to prevent ransomware or recover from a ransomware attack
Learn how to prevent and respond to healthcare ransomware infections
Find out how the pros battle ransomware in healthcare
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Mike Chapple
Examine the important differences between stateful and stateless firewalls, and learn when each type of firewall should be used in an enterprise ... Continue Reading
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between ... Continue Reading