The Journal of the Arkansas Medical Society, Vol 115, No. 9 Med Journal March 2019 Final 2 | Page 7

Other risks, some more preventable than oth- ers, fall under what Whatley earlier dubbed a “lack of preparedness.” These may be eliminated easier than some other threats, with help from qualified personnel. They include open or unsecured Wi-Fi, vulnerable network connections, unvetted employ- ees, and unguarded devices. “In your clinics, tech- nology is all around,” Whatley shared. “If there’s a laptop in a room that is accessible by patients or other people – can it be physically removed? Is it encrypted? Is the data encrypted in place?” As physicians or clinic managers, you should routinely discuss cybersecurity with a proven and trusted IT provider who can make sure you’re aware of where your data is and how it’s being protected. (For helpful tips related to choosing your IT provider, see our sidebar on page 200.) In addition, you and your IT department may need to take steps to secure your network and remote configurations through encryption. Encryption is defined (DHS newsletter) as “the conversion of electronic date into an unreadable or coded form that is unreadable without a decryption key.” In addition, are you utilizing anti-malware, proper setup of audit logs, and regular genera- tion of secure, tested, hack-free backups? Are you monitoring regularly to catch breaches sooner rather than later? Further defenses to investigate may include whitelisting, proper patch manage- ment (updates), a reduced attack surface (limiting what plugs into your network), segmenting, and authentication management (frequently changed, complex passwords). Another growing threat is ransomware, de- fined by The Ransomware and HIPAA Fact Sheet (DHS) as “a type of malware (malicious software) distinct from other malware; its defining character- istic is that it attempts to deny access to a user’s data, usually by encrypting the data with a key known only to the hacker who deployed the mal- ware, until a ransom is paid. After the user’s data is encrypted, the ransomware directs the user to pay the ransom to the hacker (usually in a cryp- tocurrency, such as Bitcoin) in order to receive a decryption key. However, hackers may deploy ran- somware that also destroys or exfiltrates data, or ransomware in conjunction with other malware that does so.” Coverage If and When A professional and proven IT services is obvi- ously important. However, when you’re attacked by cyber monsters, another tool that may assist you is proper insurance coverage. Through your medi- cal malpractice liability coverage, you may already have some coverage against security attacks; however, a devoted policy to this effect may offset the cost of recovery. “Although not all attacks can be prevented, a partnership with a cybersecurity insurance com- pany can facilitate your response and mitigate the damages,” wrote Decareaux (SVMIC.com). “Where SVMIC’s professional liability policies already in- clude supplemental cybersecurity coverage in the amount of $50,000, SVMIC partners with NAS In- surance Services to offer access to further cover- age at discounted premiums.” As to the worth of the added coverage, Dec- areaux described a group of six primary care phy- sicians in middle Tennessee who decided to pur- chase it. “The practice administrator realized that the potential risk of a cyber-attack or information technology system failure and the ensuing costs to recover data, possible lawsuits, and regulatory fines and penalties could add up to more than the basic limits provided by SVMIC,” she wrote. “The group had experienced minor losses … some in- volving errors by their own staff, and one protected health information violation was caused by an out- side vendor. “These experiences convinced the administra- tor how vulnerable the group was to potential loss … with the estimated cost of a cybersecurity loss at a minimum of $30 per record, and possibly more due to the potential for regulatory fines and penal- ties, it was relatively easy to see that the potential for loss is great, and by contrast, the premium is relatively affordable.” According to Decareaux, the Tennessee prac- tice also implemented mandatory staff training on PHI and HIPAA and put in place an extensive in- ternal and external IT security system that meets or exceeds Federal Meaningful Use PHI and IT standards. Security standards such as these can be a challenge to keep up with. Duncan, who specializes in HIPAA privacy, security, and breach notification compliance, reminds physicians that, in addition to malpractice coverage, SVMIC offers education and regulatory help on the subject right here in Arkan- sas. “Being the victim of a cybersecurity incident can trigger many negative outcomes for a medi- cal practice, with the worst being access to patient information and the ability to provide patient care,” she said. “It is imperative that practices take the steps necessary to protect their patient data and have policies and procedures in place to act if an incident occurs. Compliance with the HIPAA Secu- rity Rule is a major step in this process.” Are you doing all you can to protect patient data? Are you meeting HIPAA requirements? Are you listening to the warning Whatley offered mem- bers last year? “The more that can be put into securing information, the better,” he advised. For more information and professional assistance from experts in the fields of HIPAA and cybersecurity, call SVMIC at 870.540.9161. You can also always call AMS for more information. Author’s Note: The Journal reached out to the FBI for further tips to share. Due to the government shutdown that was in effect during the writing of this article, the Bureau was not able to share additional information. ADDITIONAL RESOURCES SVMIC SVMIC.com shares important bulletins and related articles as well as links to impor- tant tools like the Security Risk Assessment Tool (SRA Tool). HealthIT.gov Through its website, the Office of the National Coordinator for Health Informa- tion Technology offers numerous related resources. For example, ONC offers “Top 10 Tips for Cybersecurity in Health Care” at http://www.healthit.gov/providers-profes- sionals/cybersecurity-shared-responsibility. Search its Health IT Playbook (https:// www.healthit.gov/playbook) for more tools and topics of interest. The Identify Threat Resource Center A U.S. nonprofit support organization, the Identify Threat Resource Center exists to broaden public education about cybersecurity and to help in understanding and resolving cases of identity theft, data breach, cyber se- curity, scams/fraud, and privacy issues. https://www.idtheftcenter.org NUMBER 9 MARCH 2019 • 199