Cyber Security & HIPAA Compliance
Framework of Cyber Security
Identify
- Asset Management
- Business Environment
- Governance
- Risk Assessment
- Risk Management Strategy
Protect
- Access Control
- Awareness & Training
- Data Security
- Processes and Procedures
- Maintenance
- Protective Technology
Detect
- Anomalies and events
- Security Continuous Monitoring
- Detection Processes
Respond
- Response Planning
- Communications
- Analysis
- Mitigation
- Improvements
Recover
- Recovery Planning
- Improvements
- Communications
5 Current Threats
1.Email Phishing Attacks
2.Ransomware Attacks
3.Loss or Theft of Equipment Or data
4.Internal, Accidental, or Intentional Data Loss.
5.Attacks Against Connected Medical Devices That May affect Patient Safety
10 HHS Recommended Practices
- Email Protection
- Endpoint Protection
- Access Management
- Data Protection and Loss Prevention
- Asset Management
- Network Management
- Vulnerability management
- Incident Response
- Medical Device Security
- Cyber Security Policies
Our Cybersecurity Solutions
Email Protection
Email System Configuration
- Controls to enhance Security
- Avoid “free” or “consumer” email systems
- Install spam/antivirus software solutions
- Deploy Multifactor authentication to access your email system
- Configure email to tag messages as “EXTERNAL”
- Implement Email Encryption
- Provision every employee with a unique email user account
Education and Phishing Simulations
- Increase staff understanding and awareness to protect your organization
- Implement education and awareness activities to assist your employees in protecting your organization
- Look for suspicious From: addresses
- Be cautious with “too good to be true” messages
- Configure email to tag messages as “EXTERNAL”
- Check embedded links
Endpoint Protection
What are your endpoints?
Desktops, laptops, mobile devices, other connected hardware devices
Basic Endpoint Protection Controls
- Remove administrative accounts
- Keep your endpoints patched
- Implement antivirus software
- Turn on encryption
- Enable firewalls
- Enable Multifactor authentication for remote access
Access Management
- Establish a unique account for each user
- Limit use of shared or generic accounts
- Tailor access to needs of user
- Terminate user access as soon as user leaves organization
- Provide role-based access
- Configure systems with automatic log off
- Implement Multi Factor Authentication
Data Protection and Loss Prevention
- Understand where the data resides
- Reinforce consequences of lost or compromised data
- Policies should address user interactions with sensitive data
- Data Classification Structure
- Highly Sensitive – SSN’s, Credit Card, Mental Health Information, Substance Abuse, Sexually Transmitted Infection
- Sensitive – All other PHI
- Internal – Organizational policies, contracts, business plans, internal business communications
- Public – Data sanitized and approved for distribution to public
Encrypt all PHI sent via email or text
Asset Management
- Inventory
- Complete an accurate inventory of IT assets
- Perform a complete inventory audit and tag
all assets with unique identification numbers
- Procurement
- Standard operating procedures to include
update to inventory records
- Standard operating procedures to include
- Decommissioning
- Secure destruction process
- Record of destruction
Network Management
- Network Segmentation
- Restrict access, least amount of
- permissions to perform duties
- Physical Security and Guest Access
- Keep data and network closet locked
- Disable network ports that are not in use
- Intrusion Prevention
- Up to date firewall licenses and firmware
Vulnerability Management
- Conduct Vulnerability Scanning to proactively identify flaws
- Conduct routine patching of security flaws
- Remediate identified vulnerabilities
Incident Response
- Establish and Implement an incident response plan
- Who does staff contact in case of an incident
- Plan should describe steps to follow in the event of a malware download
- Establish a method to receive notifications about cyber threats
Medical Device Security
- Cybersecurity for Medical Devices follows the practices that we discussed in:
- Endpoint Protections
- Identity and Access Management
- Asset Management
- Network Management
- Vulnerability Management
- Security Operations and Incident Response
Cyber Security Policies
- Roles and Responsibilities- Who is responsible for implementing security policies?
- Education and Awareness- How will you train your user?
- Acceptable Use/Email Use- What is permitted and what is not permitted?
- Data Classification- What is PHI? What cannot be disclosed?
- Personal Devices- Give employee expectations on use of personal devices at work
- Laptop, Portable Devices, and Remote Use- Policy on mobile device security
- Incident Reporting and Checklist- What is an incident, who do I report this to?
10 HHS Recommended Practices
- Email Protection
- Endpoint Protection
- Access Management
- Data Protection and Loss Prevention
- Asset Management
- Network Management
- Vulnerability management
- Incident Response
- Medical Device Security
- Cyber Security Policies
How Dentistry MSP Can Help
- Practice Domain- M365 Business Premium
- Antivirus & Patch Management
- Electronic & Physical Access Control
- Risk Intelligence
- Electronic Inventory
- Online Monitoring / Intrusion Prevention
- Vulnerability Scanning & Real Time Alerts
- Security Risk Assessment Assistance
- Online Monitoring of BYOD Devices
- Cyber Policies & Security / HIPAA Training