SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Cyber Security
Luke Schneider
Medicine Bow Technologies
2016
Cyber Security Background
• Cyber security consequences impact national defense, businesses, public
markets, retailers, consumers, and individuals.
• Organized cyber crime has escalated in recent years and is replacing
terrorism as the largest threat to America.
• Cybercriminals are:
• Organized
• Financed
• Looking for high yield
• Adopting (Example: Ransomware)
More Cyber Security Background
• Why are we more at risk now?
• Our reliance on instantaneous data
• Rapidly growing data volumes
• More complex IT infrastructures
• Data integration between systems
• 3rd Party vendor relationships
Biggest Breaches in Recent Years…
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Which Industries are Most at Risk?
http://www.nedocs.com/blog/data-breach-statistics
Which Industries are Most at Risk?
http://www.nedocs.com/blog/data-breach-statistics
Why is Healthcare a Major Target?
• Healthcare market forces
• Healthcare records are a rich set of
data:
• Financial, medical, family, and
personal data
• Patient physical characteristics can
be misused to obtain passports,
visas or ID’s
• Basic identity and insurance
information has black market value
between $10 to $100 (whereas cc #’s
may fetch $0.50 to $1 comparatively)
Healthcare Data Breaches Are Costly
• 90% had a data breach in the past 2 years
• 40% had more than 5
• Average economic impact due to data
breaches is 2.1 million dollars / healthcare
organization and 1 million dollars / business
associate organizations over 2 years
• Criminal attacks are now the #1 cause of
data breaches
• 56% of healthcare organizations and 59% of
business associates don’t believe their
incident response process has adequate
funding and resources
www.hhs.gov/ocr
Healthcare Data Breaches Are Costly
• Data breaches in healthcare are the most
expensive to remediate
• In the U.S. healthcare industry, the average
cost was $398 per record
• Average cost across all industries: $154 per
record
http://www-03.ibm.com/security/data-breach/
2015 Trends in Healthcare
The Global State of Information Security® Survey 2016, October 2015
“While the healthcare industry has
traditionally lagged in the maturity of its
cybersecurity programs, some forward-
thinking organizations are beginning to
take steps to improve their security
posture.” The Global State of Information
Security® Survey 2016, October 2015
How do you find out if there is a breach?
• How victims learn of the crime:
• Hospital invoice
• Collection letter
• Insurance statement
• Errors in health record
• Credit report
• 65% of victims spent money to resolve:
• Average cost: $13,500
• Incorrect medical records could jeopardize safety
Fifth Annual Study on Medical Identity Theft, Sponsored by the Medical Identity Fraud Alliance,
Independently conducted by PonemonInstitute LLC, February 2015
Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, Sponsored by ID
Experts, Independently conducted by PonemonInstitute LLC, May 2015
Insider Threats- Employees
• “Insiders” refers to your workforce who are trusted with access to
your systems
• They make mistakes
• They violate policies (snooping, shortcuts)
• A few have criminal intentions
• Huge problem in healthcare!
Outside Threats-Third Parties
• Third parties were the #2 cause of breaches
• Hospitals need to manage third party risks
• Evaluate whether third parties have access to PHI
• Evaluate the level of risk
• For high-risk third parties evaluate the security program
• Before contracting
• Ongoing
• Contract terms to manage third party risks
http://www.idtheftcenter.org/ITRC-Surveys-Studies/2014databreaches.html
Where to begin?
•Get IT security in your budget
• You can’t afford to ignore it
Where to begin?
• Identify
• Protect
• Detect
• Respond
• Recover
Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology, February 12, 2014
Cyber Security: Where to Start?
• Identify:
• Be AWARE: Have analytics and monitoring to recognize and respond to threats
• If you install monitoring or scanning software, carve out the time to work the reports each
month.
• Know what you HAVE: Maintain inventory of authorized users, devices, software
• Often accounting inventory lists and IT inventory lists do not sync because of the fast moving
environment. Make time to reconcile on a quarterly basis.
• KNOW your data: Know what data you have, where it is, who has access
• Only collect what you need, keep as long as it is required and/or has a legit business need
• Perform scans on your network looking for sensitive number formats such as SSN, residing in
shared departmental drives
• Review user access routinely
Cyber Security: Where to Start?
• Protect:
• Properly deploy ANTIVIRUS/ANTIMALWARE: Use a comprehensive endpoint
security product and keep the definition file up to date to continuously monitor
and protect workstations, server, and mobile devices
• Use ENCRYPTION: If you have encryption layered on your data, sensitive emails,
and mobile devices criminals may get a user name, or password, perhaps a social
security number, but the full record is encrypted. ($1 of data vs. $50)
• Password protect Excel worksheets with sensitive data
• Buy encrypted thumb drives for your employees and use an inventory system to check them
out
• Encrypt your laptops
• Secure email with encryption
Cyber Security: Where to Start?
• Protect Continued:
• Have POLICIES in place:
• User access policies – how fast can employee be locked out of your network in case of
turnover?
• Password policies – complexity, renewals, and physical protection (no passwords under
keyboards)
• Personal laptops-Do not allow them on your network
• Computer time out policy
• Encryption policies
• Prohibit the use of generic user IDs and common passwords
• Use SECURE CONFIGURATIONS:
• Physical security of your network is important
• Guard your hospital’s network by changing the password often
• Add filters to your guest wireless network
Cyber Security: Where to Start?
• Protect-Education
• TRAIN Staff: Employees can be one of the biggest threats to security (accidentally and
intentionally), map training to skills required for each job, implement, and test
• Email is vulnerable
• Ransomware is coming in as malicious macros on attachments to email, emails with links
elsewhere and through server vulnerabilities.
• Downloading of ‘free’ software often has its price.
• Know what data is sensitive and what are the procedures are to protect it
Cyber Security: Where to Start?
• Detection
• Monitoring tools to help detect
• Network Monitoring
• Intrusion Prevention & Detection
• Firewall & Network Configuration
• File transfer monitoring
• Email Protection Tools
• URL (web link) filtering, e-mail quarantining, email encryption, anti-spam/phishing detection
• Workstations and Server Monitoring
• Anti-virus
• Anti-malware
• Web filtering
Cyber Security: Where to Start?
• Detection-Continued
• Monitoring tools to help detect
• Maintain PATCHES: Apply proactive upgrades/patching of hardware and software
• This is a difficult task in small rural hospitals
• Upgrade before END-OF-LIFE
• MS Server 2003 reached ‘end of life’ July 2015, not maintained for security by Microsoft
• Windows XP reached ‘end of life’ April 8, 2014.
• McAfee email protection tools will be ‘end of life’ December 31, 2016
• Microsoft Windows Vista will reach ‘end of life’ on April 11, 2017.
• User Access
• Password Management
• The tools only help detect….the tools don’t fix issues!
• Rural hospitals are budget constrained and short staffed in IT.
Cyber Security: Where to Start?
• Respond
• Have a PLAN: Know how to respond to incidents, have trained team in place
• Business continuity
• Disaster recovery
• Ransomware Attacks
• Have a communication plan in place today for a potential data breach
• You want this now so you don’t panic when it happens!
• Periodically validate through neutral 3rd party via penetration testing and red
team exercises
Cyber Security: Where to Start?
• Recover
• Be able to RECOVER: Have regular backups for disaster recovery and continuity
• Evaluate your risk and determine if offsite backups are needed
• Is there a need for full redundancy for your business?
• Continuous REVIEW: Security is an on-going process. Proactively identify and
repair vulnerabilities to mitigate to an acceptable risk level.
• Work the scanning and monitoring reports on a monthly basis
• Create a process for reviewing employee access on a routine basis
• Walk through the office looking for passwords under keyboards and sensitive data left on
desks
• Make sure software updates ran (did not fail)
Defense-in-Depth / Layers of Security
• The best practice in cyber
security is to use the Defense-in-
depth model. Meaning that our
data protection should be like an
onion
• This will allow all sources of
threats to be covered. (Some of
the security solutions can cover
more than one threat source and
can work in more than one layer
of the model)
http://www.nedocs.com/blog/data-breach-statistics
Wyoming Businesses are at Risk
“That won’t happen in Wyoming, we are small potatoes.”
Our response:
• Are you sure your employees all know not to click on something that could introduce
Malware into your network?
• Are you sure all your terminated employees can’t get into your network?
• Are you sure that all of your workstations and servers have the latest patches for software
on them?
• Are you sure you do not have legacy software anywhere in your organization?
• Are you sure your customer’s sensitive information is being encrypted?
• Are you sure an employee isn’t walking around with a thumb drive with his/her password
on it to your network?
Wyoming Case Studies
• A medium sized company in Wyoming did not have strong policies about
personal devices on their network. An employee brought his personal
laptop to work (because it worked better than the company owned workstation), accessed
the wireless network, and was unaware that a BitTorrent product was
running in the background on this machine.
BitTorrent is a peer to peer file transfer protocol for sharing data over the internet. It is often used to share music or pictures illegally or to
introduce malware. People may not know that they have BitTorrent installed.
This company was sent a letter from their internet service provider telling them they would be
removed from internet service because they had engaged in illegal practices via their network. They
had to engage an attorney to work with their ISP and pursue a time consuming formal IT audit to
determine where the illegal activity had come from.
Once the mystery was solved, to ensure it did not occur again, the company implemented a ‘no
personal devices policy,’ purchased the employee a better workstation, and added web filtering
capabilities to their firewall.
Wyoming Case Studies
• Proactive Approach
• A behavioral health school for girls decided to increase their IT security and ensure that they meet
HIPAA compliance standards. The school had approximately 13 workstations and 17 users.
• Address Software issues
• Office 365 for Business, Anti-Virus, Secure Emails, Email Archiving
• Address Hardware Issues
• Implemented secure, centralized file storage with re-direction from workstations of the My
Documents folders, including encrypted backups for the server.
• New firewall for network security
• Set Windows updates to occur on routine basis
• Secure wireless access points in a private wireless network
• Configured email notifications to IT to ensure backups work properly
Wyoming Case Studies
• Password Policies
Throughout Wyoming, most of the organizations I have spoken with have weak password policies
and little to no enforcement.
-8-12 digit passwords
-at least one number, one capital, and one character
-force changes every 3 month
I have seen risk assessors crack 95% of a Wyoming organizations’ employee network passwords in
minutes because these policies were not in place/enforced.
My guess is there are hackers even better than us!
Wyoming Case Studies
• What we have seen in Wyoming
• Lack of secure email – offices that use personal gmail, yahoo, or msn accounts for business
• Lack of firewall
• Lack of anti-virus
• Lack of encryption on thumb drives, laptops, and mobile devices
• Use of DropBox for file sharing of sensitive information
• Poor or unenforced password policies (use of generic ids and passwords, passwords under the
keyboards, workstations that aren’t secured by passwords)
• Allowing everyone administrative access on workstations
• Old workstations and servers with internet access
• Sensitive data on spreadsheets on a file share where everyone in the company has access
• Unsecured network jacks in public areas of buildings (anyone can plug into your network)
• Downloading of inappropriate software so that your network IP address is flagged.
Six Questions You Should Ask
• Does the organization have a security framework?
• What are the top risks the organization has related to cybersecurity?
• How are employees made aware of their role relating to
cybersecurity?
• Are external and internal threats considered when planning
cybersecurity activities?
• How is security governance managed within the organization?
• In the event of a serious breach, has management developed a robust
response protocol?
Cybersecurity: What the Board of Directors Needs to Ask, Copyright © 2015 by The Institute of Internal Auditors Research Foundation, (“IIARF”) strictly reserved.
No parts of this material may be reproduced in any form without the written permission of IIARF.
What Would You Do?
Knowing your own security practices, would you go to your
hospital and give out your personal information?
Questions?
Luke Schneider, MBA, CHCIO
Medicine Bow Technologies
www.medbowtech.com
Office: 1-866-455-1978
Cell: 307-460-1848
lschneider@medbowtech.com

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPTNitesh Dubey
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 

Was ist angesagt? (20)

Ransomeware
RansomewareRansomeware
Ransomeware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 

Andere mochten auch

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Fakrul Alam
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...SurfWatch Labs
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationSurfWatch Labs
 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksSurfWatch Labs
 
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...SurfWatch Labs
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebSurfWatch Labs
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017SurfWatch Labs
 
Create a Safer Learning Environment with Absolute Safe Schools
Create a Safer Learning Environment with Absolute Safe SchoolsCreate a Safer Learning Environment with Absolute Safe Schools
Create a Safer Learning Environment with Absolute Safe Schools Absolute
 
SANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems TodaySANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems TodaySurfWatch Labs
 
Treat Cyber Like a Disease
Treat Cyber Like a DiseaseTreat Cyber Like a Disease
Treat Cyber Like a DiseaseSurfWatch Labs
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationSurfWatch Labs
 

Andere mochten auch (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution Demo
 
25th Japan IT Week 2016
25th Japan IT Week 201625th Japan IT Week 2016
25th Japan IT Week 2016
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Create a Safer Learning Environment with Absolute Safe Schools
Create a Safer Learning Environment with Absolute Safe SchoolsCreate a Safer Learning Environment with Absolute Safe Schools
Create a Safer Learning Environment with Absolute Safe Schools
 
SANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems TodaySANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems Today
 
Treat Cyber Like a Disease
Treat Cyber Like a DiseaseTreat Cyber Like a Disease
Treat Cyber Like a Disease
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
 

Ähnlich wie Cyber Security and Healthcare

Web Security Overview
Web Security OverviewWeb Security Overview
Web Security OverviewNoah Jaehnert
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptxradhika457461
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...Health IT Conference – iHT2
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers Precisely
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 

Ähnlich wie Cyber Security and Healthcare (20)

Web Security Overview
Web Security OverviewWeb Security Overview
Web Security Overview
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptx
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Cyber Security and Healthcare

  • 2. Cyber Security Background • Cyber security consequences impact national defense, businesses, public markets, retailers, consumers, and individuals. • Organized cyber crime has escalated in recent years and is replacing terrorism as the largest threat to America. • Cybercriminals are: • Organized • Financed • Looking for high yield • Adopting (Example: Ransomware)
  • 3. More Cyber Security Background • Why are we more at risk now? • Our reliance on instantaneous data • Rapidly growing data volumes • More complex IT infrastructures • Data integration between systems • 3rd Party vendor relationships
  • 4. Biggest Breaches in Recent Years… http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 5. Which Industries are Most at Risk? http://www.nedocs.com/blog/data-breach-statistics
  • 6. Which Industries are Most at Risk? http://www.nedocs.com/blog/data-breach-statistics
  • 7. Why is Healthcare a Major Target? • Healthcare market forces • Healthcare records are a rich set of data: • Financial, medical, family, and personal data • Patient physical characteristics can be misused to obtain passports, visas or ID’s • Basic identity and insurance information has black market value between $10 to $100 (whereas cc #’s may fetch $0.50 to $1 comparatively)
  • 8. Healthcare Data Breaches Are Costly • 90% had a data breach in the past 2 years • 40% had more than 5 • Average economic impact due to data breaches is 2.1 million dollars / healthcare organization and 1 million dollars / business associate organizations over 2 years • Criminal attacks are now the #1 cause of data breaches • 56% of healthcare organizations and 59% of business associates don’t believe their incident response process has adequate funding and resources www.hhs.gov/ocr
  • 9. Healthcare Data Breaches Are Costly • Data breaches in healthcare are the most expensive to remediate • In the U.S. healthcare industry, the average cost was $398 per record • Average cost across all industries: $154 per record http://www-03.ibm.com/security/data-breach/
  • 10. 2015 Trends in Healthcare The Global State of Information Security® Survey 2016, October 2015 “While the healthcare industry has traditionally lagged in the maturity of its cybersecurity programs, some forward- thinking organizations are beginning to take steps to improve their security posture.” The Global State of Information Security® Survey 2016, October 2015
  • 11. How do you find out if there is a breach? • How victims learn of the crime: • Hospital invoice • Collection letter • Insurance statement • Errors in health record • Credit report • 65% of victims spent money to resolve: • Average cost: $13,500 • Incorrect medical records could jeopardize safety Fifth Annual Study on Medical Identity Theft, Sponsored by the Medical Identity Fraud Alliance, Independently conducted by PonemonInstitute LLC, February 2015 Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, Sponsored by ID Experts, Independently conducted by PonemonInstitute LLC, May 2015
  • 12. Insider Threats- Employees • “Insiders” refers to your workforce who are trusted with access to your systems • They make mistakes • They violate policies (snooping, shortcuts) • A few have criminal intentions • Huge problem in healthcare!
  • 13. Outside Threats-Third Parties • Third parties were the #2 cause of breaches • Hospitals need to manage third party risks • Evaluate whether third parties have access to PHI • Evaluate the level of risk • For high-risk third parties evaluate the security program • Before contracting • Ongoing • Contract terms to manage third party risks http://www.idtheftcenter.org/ITRC-Surveys-Studies/2014databreaches.html
  • 14. Where to begin? •Get IT security in your budget • You can’t afford to ignore it
  • 15. Where to begin? • Identify • Protect • Detect • Respond • Recover Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology, February 12, 2014
  • 16. Cyber Security: Where to Start? • Identify: • Be AWARE: Have analytics and monitoring to recognize and respond to threats • If you install monitoring or scanning software, carve out the time to work the reports each month. • Know what you HAVE: Maintain inventory of authorized users, devices, software • Often accounting inventory lists and IT inventory lists do not sync because of the fast moving environment. Make time to reconcile on a quarterly basis. • KNOW your data: Know what data you have, where it is, who has access • Only collect what you need, keep as long as it is required and/or has a legit business need • Perform scans on your network looking for sensitive number formats such as SSN, residing in shared departmental drives • Review user access routinely
  • 17. Cyber Security: Where to Start? • Protect: • Properly deploy ANTIVIRUS/ANTIMALWARE: Use a comprehensive endpoint security product and keep the definition file up to date to continuously monitor and protect workstations, server, and mobile devices • Use ENCRYPTION: If you have encryption layered on your data, sensitive emails, and mobile devices criminals may get a user name, or password, perhaps a social security number, but the full record is encrypted. ($1 of data vs. $50) • Password protect Excel worksheets with sensitive data • Buy encrypted thumb drives for your employees and use an inventory system to check them out • Encrypt your laptops • Secure email with encryption
  • 18. Cyber Security: Where to Start? • Protect Continued: • Have POLICIES in place: • User access policies – how fast can employee be locked out of your network in case of turnover? • Password policies – complexity, renewals, and physical protection (no passwords under keyboards) • Personal laptops-Do not allow them on your network • Computer time out policy • Encryption policies • Prohibit the use of generic user IDs and common passwords • Use SECURE CONFIGURATIONS: • Physical security of your network is important • Guard your hospital’s network by changing the password often • Add filters to your guest wireless network
  • 19. Cyber Security: Where to Start? • Protect-Education • TRAIN Staff: Employees can be one of the biggest threats to security (accidentally and intentionally), map training to skills required for each job, implement, and test • Email is vulnerable • Ransomware is coming in as malicious macros on attachments to email, emails with links elsewhere and through server vulnerabilities. • Downloading of ‘free’ software often has its price. • Know what data is sensitive and what are the procedures are to protect it
  • 20. Cyber Security: Where to Start? • Detection • Monitoring tools to help detect • Network Monitoring • Intrusion Prevention & Detection • Firewall & Network Configuration • File transfer monitoring • Email Protection Tools • URL (web link) filtering, e-mail quarantining, email encryption, anti-spam/phishing detection • Workstations and Server Monitoring • Anti-virus • Anti-malware • Web filtering
  • 21. Cyber Security: Where to Start? • Detection-Continued • Monitoring tools to help detect • Maintain PATCHES: Apply proactive upgrades/patching of hardware and software • This is a difficult task in small rural hospitals • Upgrade before END-OF-LIFE • MS Server 2003 reached ‘end of life’ July 2015, not maintained for security by Microsoft • Windows XP reached ‘end of life’ April 8, 2014. • McAfee email protection tools will be ‘end of life’ December 31, 2016 • Microsoft Windows Vista will reach ‘end of life’ on April 11, 2017. • User Access • Password Management • The tools only help detect….the tools don’t fix issues! • Rural hospitals are budget constrained and short staffed in IT.
  • 22. Cyber Security: Where to Start? • Respond • Have a PLAN: Know how to respond to incidents, have trained team in place • Business continuity • Disaster recovery • Ransomware Attacks • Have a communication plan in place today for a potential data breach • You want this now so you don’t panic when it happens! • Periodically validate through neutral 3rd party via penetration testing and red team exercises
  • 23. Cyber Security: Where to Start? • Recover • Be able to RECOVER: Have regular backups for disaster recovery and continuity • Evaluate your risk and determine if offsite backups are needed • Is there a need for full redundancy for your business? • Continuous REVIEW: Security is an on-going process. Proactively identify and repair vulnerabilities to mitigate to an acceptable risk level. • Work the scanning and monitoring reports on a monthly basis • Create a process for reviewing employee access on a routine basis • Walk through the office looking for passwords under keyboards and sensitive data left on desks • Make sure software updates ran (did not fail)
  • 24. Defense-in-Depth / Layers of Security • The best practice in cyber security is to use the Defense-in- depth model. Meaning that our data protection should be like an onion • This will allow all sources of threats to be covered. (Some of the security solutions can cover more than one threat source and can work in more than one layer of the model) http://www.nedocs.com/blog/data-breach-statistics
  • 25. Wyoming Businesses are at Risk “That won’t happen in Wyoming, we are small potatoes.” Our response: • Are you sure your employees all know not to click on something that could introduce Malware into your network? • Are you sure all your terminated employees can’t get into your network? • Are you sure that all of your workstations and servers have the latest patches for software on them? • Are you sure you do not have legacy software anywhere in your organization? • Are you sure your customer’s sensitive information is being encrypted? • Are you sure an employee isn’t walking around with a thumb drive with his/her password on it to your network?
  • 26. Wyoming Case Studies • A medium sized company in Wyoming did not have strong policies about personal devices on their network. An employee brought his personal laptop to work (because it worked better than the company owned workstation), accessed the wireless network, and was unaware that a BitTorrent product was running in the background on this machine. BitTorrent is a peer to peer file transfer protocol for sharing data over the internet. It is often used to share music or pictures illegally or to introduce malware. People may not know that they have BitTorrent installed. This company was sent a letter from their internet service provider telling them they would be removed from internet service because they had engaged in illegal practices via their network. They had to engage an attorney to work with their ISP and pursue a time consuming formal IT audit to determine where the illegal activity had come from. Once the mystery was solved, to ensure it did not occur again, the company implemented a ‘no personal devices policy,’ purchased the employee a better workstation, and added web filtering capabilities to their firewall.
  • 27. Wyoming Case Studies • Proactive Approach • A behavioral health school for girls decided to increase their IT security and ensure that they meet HIPAA compliance standards. The school had approximately 13 workstations and 17 users. • Address Software issues • Office 365 for Business, Anti-Virus, Secure Emails, Email Archiving • Address Hardware Issues • Implemented secure, centralized file storage with re-direction from workstations of the My Documents folders, including encrypted backups for the server. • New firewall for network security • Set Windows updates to occur on routine basis • Secure wireless access points in a private wireless network • Configured email notifications to IT to ensure backups work properly
  • 28. Wyoming Case Studies • Password Policies Throughout Wyoming, most of the organizations I have spoken with have weak password policies and little to no enforcement. -8-12 digit passwords -at least one number, one capital, and one character -force changes every 3 month I have seen risk assessors crack 95% of a Wyoming organizations’ employee network passwords in minutes because these policies were not in place/enforced. My guess is there are hackers even better than us!
  • 29. Wyoming Case Studies • What we have seen in Wyoming • Lack of secure email – offices that use personal gmail, yahoo, or msn accounts for business • Lack of firewall • Lack of anti-virus • Lack of encryption on thumb drives, laptops, and mobile devices • Use of DropBox for file sharing of sensitive information • Poor or unenforced password policies (use of generic ids and passwords, passwords under the keyboards, workstations that aren’t secured by passwords) • Allowing everyone administrative access on workstations • Old workstations and servers with internet access • Sensitive data on spreadsheets on a file share where everyone in the company has access • Unsecured network jacks in public areas of buildings (anyone can plug into your network) • Downloading of inappropriate software so that your network IP address is flagged.
  • 30. Six Questions You Should Ask • Does the organization have a security framework? • What are the top risks the organization has related to cybersecurity? • How are employees made aware of their role relating to cybersecurity? • Are external and internal threats considered when planning cybersecurity activities? • How is security governance managed within the organization? • In the event of a serious breach, has management developed a robust response protocol? Cybersecurity: What the Board of Directors Needs to Ask, Copyright © 2015 by The Institute of Internal Auditors Research Foundation, (“IIARF”) strictly reserved. No parts of this material may be reproduced in any form without the written permission of IIARF.
  • 31. What Would You Do? Knowing your own security practices, would you go to your hospital and give out your personal information?
  • 32. Questions? Luke Schneider, MBA, CHCIO Medicine Bow Technologies www.medbowtech.com Office: 1-866-455-1978 Cell: 307-460-1848 lschneider@medbowtech.com

Hinweis der Redaktion

  1. Driven by market forces, desire to improve health delivery, reduce costs, and comply with Gov. mandates providers are adopting electronic records Medical data sets tend to be more complete Can include: demographics, Gov. ID numbers, bank/credit card accounts, insurance plan credentials, disease/health statuses and physical descriptors