.st0{fill:#FFFFFF;}

Is it really that bad? – Ep 309 

 June 18, 2021

By  Donna Grindle

Is It Really That Bad?

They say ignorance is bliss. Ignorance can also leave you vulnerable to cyber attacks and patient safety issues. As we see news about cyber attacks coming from everywhere, you might ask “Is it really that bad?” Yes, yes it is. And it continues to get worse.

A 5 star review is all we ask from our listeners.
1x
Free HIPAA Training
Subscribe to the weekly email update from HMWH

I have read and agreed to your Privacy Policy

In this episode:

Is it really that bad? – Ep 309

Today’s Episode is brought to you by:

Kardon

and

HIPAA for MSPs with Security First IT

 Subscribe on Apple Podcast. Share us on Social Media. Rate us wherever you find the opportunity. 

The HIPAA Boot Camp

Virtual Edition Aug 17-19, 2021

Great idea! Share Help Me With HIPAA with one person this week!

Thanks to our donors. We appreciate your support!

If you would like to donate to the cause you can do that at HelpMeWithHIPAA.com

Like us and leave a review on our Facebook page: www.Facebook.com/HelpMeWithHIPAA

If you see a couple of numbers on the left side you can click that and go directly to that part of the audio. Get the best of both worlds from the show notes to the audio and back!


HIPAA Say What!?!

[03:58] The Health Care and Public Sector Coordinating Council (HSCC) sent a letter to the White House and copied the Senate and House leaders because they were concerned about cybersecurity and health care. The letter stresses the importance of combating cybersecurity issues in the healthcare industry as a matter of patient safety. They are requesting the government to devote cybersecurity funding to healthcare.

Health Sector Cybersecurity Letter to President Biden – 06-10-2021

The letter makes a point of saying:

Phase I of the Administration’s infrastructure plan calls for increasing “resilience in the most essential services, including the electric grid; food systems; urban infrastructure; community health and hospitals (emphasis added); and our roads, rail, and other transportation assets.” We urge that a future phase of the plan include a planning process with the health sector to focus policy and resources on specific programs that will facilitate a collaborative, public-private partnership to strengthen healthcare cybersecurity.

They also say:

We believe an analogous effort for the health sector would strengthen collaboration and resolve across the sector, especially following a year in which our sector and country fought the pandemic and multiple cybersecurity threats simultaneously. The Colonial Pipeline ransomware attack, the power outages resulting from the winter storms experienced in Texas earlier this year, and the impact the long-term lack of electricity had on hospitals, COVID-19 treatment and COVID-19 vaccination, are stark reminders of how interconnected the healthcare sector is with other critical sectors like power, water and communications, and how robust cybersecurity management is critical to the operational continuity and resiliency of our national critical functions.

So, basically they are saying that if you make everyone else better and leave us out, things are not going to go well. Because all of these critical infrastructures are connected.

[13:19] The healthcare sector is often overlooked. In an article from Healthcare Info Security, Groups Urge Biden, Congress to Bolster Health Sector Cyber, Greg Garcia, HSCC executive director, says that “…a strong understanding or intense interest in the dire cyber challenges facing the healthcare sector is also apparently lacking in some corners of Congress.”

The article includes quotes from the letter to the White House stating that the HSCC “was pleased to see the recently enacted American Rescue Plan direct $650 million to the Department of Homeland Security’s Cybersecurity Infrastructure and Security Agency for cybersecurity risk mitigation programs, none of the funding is directly targeted to help the healthcare sector.”

Another interesting quote from the article is one from the VP of CHIME (College of Healthcare Information Management Executives) which represents healthcare CISOs and CIOs, tells ISMG:

While we are awaiting HHS to promulgate rules, we are very pleased that it calls on HHS to give healthcare providers credit for following recognized security practices to fend off cyberattacks.Mari Savickis, vice president of public policy at CHIME

Recognized security practices is something that we are excited about and are working with our clients on.

Is it really that bad?

[25:24] Here’s another one in Donna’s backyard. This just came out this week, announced by the Department of Justice, that the CEO of a network security company is charged with a cyber attack on Gwinnett Medical Center.

Chief Operating Officer of network security company charged with cyberattack on Gwinnett Medical Center

Same story covered by DataBreaches.net: Chief Operating Officer of Network Security Company Charged with Cyberattack on Medical Center

So, this story does not revolve around ransomware or anyone stealing data from servers. Details are limited on this story so far, but basically the CEO of a Metro Atlanta network security company that serves the healthcare industry conducted a cyber attack, disrupting phone service, disrupting network printer service and obtaining information from a digitizing device. He’s charged with 17 counts of intentional damage to a protected computer and one count of obtaining information from a protected computer.

This is a great example of the reason you should include devices, beyond your computers and servers like printers, scanners, phone systems, and any other device connected to your network, in your risk analysis and document how you are securing these devices.

The main point is you can’t assume an attack is from external sources. It can be from people that you know, insiders.

[32:22] While I was reading the article about the Gwinnett Medical Center deal on DataBreaches.net, I saw this one: Middletown Man Sentenced To Six Months of Home Confinement For Damaging Former Employer’s Computer Network. Here, the guy, Levi Delgado was sentenced to six months of home confinement and over $13,000 in restitution. He pled guilty back in February to one count of causing damage to a protected computer.

Delgado was the IT administrator at a medical center and they had terminated his employment. Following termination, he was no longer authorized to access the computers. His credentials that had allowed him to access it were disabled. However:

Four days after his termination, Delgado connected a personal laptop to the medical center’s computer network through an administrator account that Delgado continued to use without authorization. Once Delgado gained unauthorized access to the computer network, he caused the deletion of the medical center’s employee user accounts, the disabling of its computer accounts, and the deletion of its file server. Delgado’s actions prevented the medical center’s employees from logging into their computers and accessing patient files necessary to conduct operations. As a result, the medical center’s ability to see and treat its patients was impaired.

Now, the article does say that no patient information was compromised or accessed. Meaning there was not an improper disclosure. He was attacking the system as a whole. Although confidentiality wasn’t impacted, availability was and potentially integrity. Because if he was deleting things do we know everything that he deleted? Were they able to put it back?. This access abuse, privilege abuse… and that is a huge problem. Even if it’s not your vendor, but you let somebody go internally. You need to worry about their access too.

We always say that people need to stop imagining these criminals like one guy in his basement in a hoodie. Here are three different articles that address that exact topic. When you put them all together, you start to see the real picture of what we are up against here.

The Ruthless Hackers Behind Ransomware Attacks on U.S. Hospitals: ‘They Do Not Care’

Inner Workings Of DarkSide Cybergang Reveal It’s Run Like Any Other Business

Hacker Known as Max Is a 55-Year-Old Woman, Prosecutors Say

[51:30] And, finally, if you didn’t think it could get any worse… just this morning as we were preparing to record this episode, we saw this article: Ransomware Gang Goes Nuclear, Hitting US Weapons Contractor. The article tells the story of a small company in New Mexico, Sol Oriens, who is a contractor for the Department of Energy National Nuclear Security Administration. This company is a consulting firm focusing on managing advanced technologies and concepts with strong potential for military and space applications. They were hit by the REvil, aka Sodinokibi, ransomware operation.

Sol Oriens did not take all necessary action to protect personal data of their employees and software developments for partner companies,” Revil says in a statement posted to its leak site, delivered with the operation’s trademark bluster. “We hereby keep a right to forward all of the relevant documentation and data to military agencies of our choice, including all personal data of employees.

Here’s David take on this… You know when you take something and put it in the trash bin that gets rolled out to the road. It’s trash, right? Then, somebody comes by and takes it, it’s not stealing at that point. It was trash and was going to be thrown out anyway. So, if you’re treating your data like it’s trash and somebody comes by and takes it, then, no harm, no foul, you should have protected it.

When we say is it really that bad, it’s REALLY bad. Attacks can come from internal staff or vendors you work with everyday, not always from external hackers and ransomware gangs. You should have termination processes for internal staff, vendors and especially IT folks. It’s more important than ever to broaden your outlook on where attacks could come from.

Remember to follow us and share us on your favorite social media site. Rate us on your podcasting apps, we need your help to keep spreading the word. As always, send in your questions and ideas!

HIPAA is not about compliance,

it’s about patient care.TM

Special thanks to our sponsors Security First IT and Kardon.

HelpMeWithHIPAA.com Is A
Collaborative Project

Created & Sponsored By: