Businessolver
Businessolver Blog

HIPAA Cybersecurity: Time to Strengthen your Defenses

Get the Businessolver Blog in your inbox
Compliance Dashboard profile photo
By Compliance Dashboard
 on April 1, 2022
Share:

The Office of Civil Rights (OCR) released its Q1 2022 Cybersecurity Newsletter March 17. Letโ€™s review OCRโ€™s guidance for HIPAA-Covered Entities (CEs) who house and transmit protected health information (PHI).

Note: CEโ€™s arenโ€™t only hospitals and insurers; health plans (Plans) are CEs under HIPAA. Employers who sponsor such Plans typically “perform” actions required by the HIPPA. Plans’ brokers and advisers may also be CEs under HIPAA, as well as being Business Associates (BAs) of the Plan.ย  Therefore, they too must follow HIPAAโ€™s Security Rule regulations to protect the Planโ€™s electronic PHI (ePHI).

Backgroundโ€ฆ

The U.S. Department of Defense (DOD) published its new software modernization strategy February 1, 2022. Russia invaded the Ukraine February 24, 2022. Searching โ€œRussian cyber-attacksโ€ this afternoon generated 45.5 million results. Given rising fear of cyber attacks, this quarterโ€™s OCR newsletter brings urgent energy to review of information systems of CEs who often take HIPAA security compliance less seriously (and often poorly applied) than necessary.

  • Per OCR’s newsletter: โ€œUnfortunately, many regulated entities continue to underappreciate the risks and vulnerabilities of their actions or inaction (g.,increased risk of remote access, unpatched or unsupported systems, not fully engaging workforce in cyber defense). Cyber-attacks are especially critical in the health care sector as attacks on ePHI can disrupt the provision of health care services to patients.โ€

The Problemโ€ฆ

HIPAA compliance isnโ€™t glamourous, and it can be complicated. Due to such lackluster complexity, compliance management is often overlooked or at the bottom of the list when purse strings tighten. Too bad; itโ€™s a required preventive scheme. ย HIPAA compliance is more sturdy work boot than sassy heel.

When the DOD feels their โ€œadaptability increasingly relies on software and the ability to securely and rapidly deliver resilient software capabilityโ€ then perhaps itโ€™s worth the extra time and investment for a CE to evaluate the effectiveness of their HIPAA compliance. Because HIPAA requires CEs to comply (and because everyoneโ€™s ePHI is flowing within the encrypted-universeโ€™s river), itโ€™s time to protect and strengthen those work boots for the long haul.

The Solutionโ€ฆ โ€œActive Preventionโ€

I dubbed the term, โ€œactive preventionโ€ to illustrate that a CEs HIPAAโ€™s Security Rule compliance must not collect dust on the shelf. It requires a perspective shift in conducting business. Letโ€™s illustrate with metaphors: instead of HIPAA compliance being Sisyphus, endlessly trudging up a hill only to retreat daily and start again, think about compliance as brushing your teeth. Dental cleaning is a daily โ€œactive preventionโ€; cybersecurity should also be a regular assessment of the health of systems (monthly, even annually is better than most).

  • Per OCRโ€™s newsletter: โ€œโ€ฆ[M]ost cyber-attacks could be prevented or substantially mitigated if HIPAA covered entities and business associates (โ€œregulated entitiesโ€ or โ€œCEsโ€) implemented HIPAA Security Rule requirements to address the most common types of attacks, such as phishing emails, exploitation of known vulnerabilities, and weak authentication protocols.โ€

Gingivitis and cavities may never occur if dental hygiene is attended. Similarly, โ€œphishingโ€ of e-mails and ePHI breaches are less likely to occur with diligent care given to systems supporting PHI within an organization. Letโ€™s not forget that vulnerabilities do exist. โ€œActive preventionโ€ identifies these if we critically assess systems and ask questions about behaviors.

To bookend this comparison, letโ€™s chat fluoride. Fluoride? Yes, fluoride, a โ€œsafeguard.โ€ Sugar is a common vulnerability to the maintenance of dental health. We may not consider the volume of our daily sugar intake. Consuming web content is a common vulnerability to maintenance of a strong IT system. Employees using company hardware are consuming content in the form of spam e-mail, streaming content, marketing pop-ups, and website cookies. These โ€œsweetsโ€ are common vulnerabilities that if not mitigated using encryption software (a cybersecurity safeguard, i.e., the fluoride), may lead to a breach of ePHI.

OCRโ€™s Guidanceโ€ฆ

Whatโ€™s a CE to do? Actively prepare and prevent in accordance with HIPAA Rules. That seems a bit broad, I know. And no joke, HIPAA is vast, and the Security Rule is complex to implement. For this post, letโ€™s narrow our focus to cybersecurity respecting three threats OCR recommends watching for, the underlying HIPAA regulation to support guarding against this threat, and solutions to mitigate each risk.

Threat 1: Phishing

  • Per OCRโ€™s newsletter: โ€œPhishing is a [common] type of cyber-attack used to trick individuals into divulging sensitive information via electronic communication, such as email, by impersonating a trustworthy source. A recent report noted that 42% of ransomware attacks in Q2 2021 involved phishing. Regulated entities should follow up on security training with periodic security reminders.โ€

Underlying HIPAA Regulations:

  • Security Rule: Transmission Security[1], a technical safeguard
  • Privacy Rule: Training the Workforce[2], an administrative safeguard

Solution 1:

  • CEs are required to both train & document their workforce training regarding security awareness in all business systems, including software and e-mail usage. Train staff on what to look for in suspicious e-mails. The Security Officer and IT team are responsible for regular testing of software systems and evaluating their effectiveness. Applied, this may be โ€œtestingโ€ the system with simulated phishing emails to workforce members and assessing their responses.

Threat 2: Exploiting Known Vulnerabilities

  • Per OCRโ€™s newsletter: โ€œHackers can penetrate [the] network and gain access to ePHI by exploiting known vulnerabilities.ย  A known vulnerability is a vulnerability whose existence is publicly known. Exploitable vulnerabilities can exist in many parts of a regulated entityโ€™s information technology infrastructure (g., server, desktop, and mobile device operating systems; application, database, and web software; router, firewall, and other device firmware).โ€

Underlying HIPAA Regulations:

  • Security Rule: Access & Audit Control; Integrity; and Transmission Security[3], each a technical standard
  • Privacy Rule: Security Management Process[4], an administrative safeguard including a required risk analysis

Solution 2:

CONDUCT a Risk Analysis (RA) and do so regularly. The RA is what I call the โ€œholy grailโ€ of a strong security program. A CE worth its salt should not avoid conducting a RA or think that a โ€œone and doneโ€ approach will suffice. Known vulnerabilities will be exposed with regular analysis of systems. Itโ€™s hard to fix a problem if you donโ€™t know where one exists, and even harder to prepare for it if you donโ€™t what youโ€™re dealing with from the beginning.

The RA is a living process and must be documented and maintained regularly (I recommend at least annually, not to mention anytime a CE undergoes major business operations changes or installs new systems or software). In fact, the Security Rule states:

Keep up to date on cybersecurity news; hackers are savvy and so too should be CEs responsible for protecting their PHI. The OCR recommends the following to mitigate known vulnerabilities:

  • Apply vendor patches or upgrading to a newer version.
  • Upgrade or replace obsolete, unsupported applications and devices (legacy systems).
  • Implement a security management process to prevent, detect, contain, and correct security violations, including conducting a risk analysis to assess potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI and implementing security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.

Threat 3: Weak Cybersecurity Practices

The final (and I would argue, the simplest) recommendation from OCR in the newsletter is to implement strong internal cybersecurity practices. Think of it as checking off the โ€œlow hanging fruitโ€ boxes of implementing a security management program.

  • Per OCRโ€™s newsletter: โ€œโ€ฆ [Weak] cybersecurity practices makeโ€ฆan attractive soft target.ย  Weak authentication requirements are frequent targets of successful cyber-attacks (over 80% of breaches due to hacking involved compromised or brute-forced credentials). Weak password rules and single factor authentication are among [weak practices].

Underlying HIPAA Regulation:

  • Security Rule: Person or Entity Authentication[5], a technical standard

Solution 3:

  • Per OCRโ€™s newsletter: โ€œโ€ฆ[regulated entities] are required to verify that persons or entities seeking access to ePHI are who they claim to be by implementing authentication processes. A regulated entityโ€™s risk analysis should guide its implementation of appropriate authentication solutions to reduce the risk of unauthorized access to ePHI.

Thereโ€™s that RA again! Conducting a RA is not only essential to identify vulnerabilities, but necessary to establish strong cybersecurity practices. Once the RA is complete, the process of shaping an effective security program begins. Then, at the one-year mark (or when operations dictate or the security team determines), a new RA should be conducted to evaluate the effectiveness of security practices.

Donโ€™t take it from me, listen to the OCR on actions for regulated entities:

  • โ€œPeriodically examine the strength and effectiveness of…cybersecurity practices and increase or add security controls to reduce risk as appropriate.โ€
  • โ€œPeriodically review and modify implemented security measures to ensure such measures continue to protect ePHI.โ€
  • โ€œConduct periodic technical and non-technical evaluations of implemented security safeguards in response to environmental or operational changes affecting the security of ePHI to ensure continued protection of ePHI and compliance with the Security Rule (e.g., the implementation of new technology, identification of new threats to ePHI, and organizational changes such as a merger or acquisition.โ€

Itโ€™s simple folks, and OCR said it well, โ€œstandards and implementation specifications of the HIPAA Security Rule provide a baseline for protecting ePHI.โ€ย ย 

[1] 45 CFR ยง164.312(e)(1)

[2] 45 CFR ยง164.530(b)(1)

[3] 45 CFR ยง164.312

[4] 45 CFR ยง164.308(a)(1)

[5] 45 CFR ยง164.312(d)