Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings

Hospital Cyberattack Highlights Health Care Vulnerabilities

By The Associated Press | March 31, 2016

Share

A cyberattack that paralyzed the hospital chain MedStar this week is serving as a fresh reminder of vulnerabilities that exist in systems that protect sensitive patient information.

That attack came a month after a Los Angeles hospital paid hackers $17,000 to regain control of its computer system and more than a year after intruders broke into a database containing the records of nearly 80 million people maintained by the health insurer Anthem.

In Anthem’s case, only a single password stood between hackers with a stolen employee ID and a chance to plunder the Blue Cross-Blue Shield carrier’s database, according to a federal lawsuit filed by customers over the breach.

Cyber criminals also have staged high-profile attacks in recent years against the federal government, retail chains and the adultery website Ashley Madison, among many other targets. But security experts say health care companies make especially inviting targets for a number of reasons.

The information they protect is more valuable on the black market than a credit card number stored by a retailer. Health care cybersecurity also can lag behind measures taken in other sectors like banking.

This can stem in part from a business emphasis on tight budgets and convenience over security. Health care companies also have to deal with an additional headache: Multiple entry points into a system, with security quality varying among clinics, labs, hospitals that may have access.

Cybersecurity experts note that government guidelines for health care data protection also are light on details and standards. The federal law known as HIPPA tells health care companies when they can disclose a person’s records and to whom. It also requires them to protect the information.

But it doesn’t come with a lot of specific mandates for that protection, said Lee Kim, director of privacy and security for the nonprofit Healthcare Information and Management Systems Society.

Intruders cracked Anthem’s database sometime between the end of 2014 and the start of 2015 in a hack that is still under investigation. They gained access to Social Security numbers, birthdates and employment details for customers as far back as 2004, all key ingredients for stealing someone’s identity.

Anthem, the nation’s second-largest health insurer, has said that hackers staged a sophisticated attack that evaded multiple layers of security to reach its database. But a lawsuit filed last year by customers who say they were affected by the breach paints Anthem as a ripe target.

It says the insurer allowed wide employee access to its database and didn’t train employees how to handle “phishing” emails, which can bait a recipient into revealing a password.

Investigators have said they think hackers may have used a phishing scheme to compromise the credentials of several workers.

A partially redact complaint filed in the litigation also said the company failed to employ common defenses like encryption, which can scramble data and make it useless.

“Stealing this much data takes time, and there were numerous steps along the way when any company following standard IT security practices would have foiled the hackers,” the complaint states.

An Anthem spokeswoman said the details in the federal lawsuit were merely allegations, and the company could not comment on pending litigation.

“At Anthem, securing our member, provider and client data is a top priority,” spokeswoman Jill Becher said in an email.

Hackers cracked Anthem’s database by stealing the credentials of an employee whose job didn’t require access to the database, according to the complaint, which was based in part on a security assessment Anthem commissioned after the breach.

A failure to restrict access to sensitive information is one of the biggest security weaknesses hackers exploit, said Michael Zweiback, an attorney and former federal prosecutor. Allowing widespread access gives hackers many chances to try to trick a worker into divulging a password.

“This is something that happens in hospitals, it happens in Fortune 500 companies right now, every day,” he said.

Companies hesitate to restrict access because they want to make it easy for employees to move from network to network and do their jobs, Zweiback said.

“When security becomes the emphasis, employees start to complain because maybe they don’t get access as quickly,” he said.

The lawsuit also states that Anthem only required a single password for those who wanted to get into its database from a remote location. Experts say two-factor authentication is the more common practice. This basically involves an employee entering a user name and password and then a separate password or identification number that can change.

Only about 10 percent of health insurers use two-factor authentication and encryption to protect data, said Avivah Litan, a cybersecurity analyst for the information technology adviser Gartner. Litan works as a consultant in several sectors, including health care.

Anthem has said it normally encrypts data it exports, but that practice would not have helped because the hacker used high-level security credentials to get into its system.

Experts say encryption can be tuned so that even authorized users can view only one person’s account or a portion of a record at a time.

Litan and other consultants say health care companies have started showing more interest in cybersecurity, and top executives of these companies have begun to pay closer attention to it. But Litan hasn’t seen the actual investment from these companies yet.

“I’m sure Anthem has made some changes, but the other ones are waiting until they get budgets, and they won’t get budgets until they get breached,” she said. “That’s just the way it works.”

Anthem has said in regulatory filings that it quickly fixed a security vulnerability it discovered after its breach and has continued to improve security since then.

Ultimately, no security plan is perfect against a determined hacker, noted John Gunn, vice president for VASCO Data Security. But companies that drop several layers of security between an intruder and sensitive information can convince a hacker to try elsewhere.

“The more systems that companies put in place, the more attractive other targets are based on what a hacker has to invest and what they will get for it,” Gunn said. “Companies make this cost-reward decision, so do hackers.”


Filed Under: M2M (machine to machine)

 

Related Articles Read More >

Part 6: IDE and other software for connectivity and IoT design work
Part 4: Edge computing and gateways proliferate for industrial machinery
Part 3: Trends in Ethernet, PoE, IO-Link, HIPERFACE, and single-cable solutions
Machine Learning for Sensors

DESIGN GUIDE LIBRARY

“motion

Enews Sign Up

Motion Control Classroom

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Global supply needs drive increased manufacturing footprint development
  • How to Increase Rotational Capacity for a Retaining Ring
  • Cordis high resolution electronic proportional pressure controls
  • WAGO’s custom designed interface wiring system making industrial applications easier
  • 10 Reasons to Specify Valve Manifolds
  • Case study: How a 3D-printed tool saved thousands of hours and dollars

Design World Podcasts

May 17, 2022
Another view on additive and the aerospace industry
See More >
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • Advertising
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Engineering White Papers
  • LEAP AWARDS

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings