information system security hipaa security awareness training

37
INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Upload: easter-brown

Post on 22-Dec-2015

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

INFORMATION SYSTEM SECURITY

HIPAA Security Awareness Training

Page 2: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

What’s In It For You?

You will learn how to protect- Yourself from identity theft Your personal electronic devices Yourself from disciplinary actions at work Yourself from monetary fines and civil or criminal

charges Our business from fines and civil or criminal charges Health information protected by HIPAA (PHI) Sensitive business information (including PII) Our business network and systems

Page 3: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

What are PII and PHI?

Personally Identifiable Information (PII) Protected by the Privacy Act Social security numbers Dates and places of birth Mother’s maiden name Biometric records

Protected Health Information (PHI) Protected by HIPAA Individually identifiable health information Subset of health information, including demographics Physical health, mental health or genetic information Provision of healthcare to individual Payment for such healthcare

Page 4: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Civil Monetary Penalties (CMP) for Violations

Secretary of HHS has discretion of determining the penalty within the range, but is prohibited from imposing civil penalties if correction is made within required timeframe and cause is not willful neglect

**Max amount a State Attorney General can impose for any category of violation

Category Min Penalty Max Penalty

*Did not know (and could not know with due diligence)

**$100 per violation. Annual max $25,000 for repeat violations

$50,000 per violation. Annual max of $1.5 M

*Due to reasonable cause and not willful neglect

$1000 per violation. Annual max $100,000 for repeat violations

$50,000 per violation. Annual max of $1.5 M

Willful neglect, but corrected within required timeframe

$10,000 per violation. Annual max of $250,000 for repeat violations

$50,000 per violation. Annual max of $1.5 M

Due to willful neglect and not corrected

$50,000 per; Annual max $1.5 M

$50,000 per; Annual max$1.5 M

Page 5: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Criminal Penalties

Covered entities and specified individuals, who knowingly obtain or disclose PHI in violation of HIPAA face up to $50,000 fine, and up to 1 year in prison.

Offenses committed under false pretenses allow penalties to be increased to a $100,000 fine with up to 5 years in prison.

Offenses committed with the intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain or malicious harm permit fines of $250,000 and up to 10 years in prison.

Page 6: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Sensitive Information

Also requires protectionFinancial informationHuman resource recordsInformation provided by business partners,

associates, or employeesInformation about physical security systemsNetwork or information systems diagrams or

details

Page 7: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Information System Security

Objective of Information Security is to ensure CIA Confidentiality – protecting sensitive information from

unauthorized access or disclosure

Integrity – ensuring the reliability and accuracy of information and information systems by protecting them from unauthorized modification or destruction

Availability – protecting the information systems and resources to ensure they are available when needed

Page 8: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

How do we achieve IS Security?

Risk Management Define Risk Assess Risk Mitigate Risk

Risk Assessments Identify Threats Identify Vulnerability Identify Cost (harm caused, may not be monetary) Determine Likelihood of occurrence

Risk Mitigation

Page 9: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Threats

Threats A threat is the

potential to cause harm to an IS or information such as Unauthorized

disclosure of sensitive information

Unauthorized modifications to or destruction of an asset

Denial of access to resources

Threat Agents (Sources) External

Hackers Cyber Criminals Natural disasters Power failures Malicious software

Internal Accidental employee act Intentional employee act Disgruntled employees Business associates

Page 10: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Vulnerabilities

A vulnerability is any weakness that can be exploited by a Threat Agent and result in a breach of security Poorly trained workforce Poorly communicated, or implemented, policies or procedures Poorly configured systems or controls Outdated policies and procedures Lack of backup power source Geographic location

Page 11: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Risks

Risk is the likelihood that a threat will exploit a vulnerability.

Risk management is the process of identifying threats and vulnerabilities and implementing controls to mitigate the risk, or reduce the risk to an acceptable level. Fire is a threat. Lack of a fire suppression is a

vulnerability that would result in a high likelihood, or high risk, of damage to resources and structures.

Installation of a fire suppression system would an example of risk management.

Page 12: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Security Controls

No information system or network is completely secure from all risks

Controls, or safeguards, are implemented to reduce risks

Cost benefit analysis requiredHIPAA requires 3 categories of controls

Administrative Physical Technical

Page 13: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Policies Procedures

Acceptable Use PolicySanction PolicyPersonnel Hiring PolicyPersonnel Termination

PolicyTraining PolicyContingency PlanRisk Management PlanBreach Notification

Policy

Account Request Procedures

Employee In/Out Processing

Breach Response Procedures

Background checks for potential employees

Administrative Controls

Page 14: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Administrative Controls

Personnel provided copies of general administrative policies and procedures during in process Employees will sign acknowledging receipt and

understanding Be sure you ask for clarification if needed

Supervisors will provide employees with job specific policies and procedures

Supervisors will initiate employee account requests to ensure users receive the necessary access to resources, but only what is required for their job (least privilege)

Page 15: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Policies Procedures

Facility Security Plan Key Control Policy Crime Prevention Plan Access Control Policy CCTV Policy

Emergency Management Plan

Hazardous Material Plan

Workstation security and use procedures

Storage procedures for sensitive data, medications, devices

Environmental Control Procedures

Emergency Response Procedures

Physical Controls

Page 16: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Physical Security Tips

Know and follow organization policy Entry procedures – no piggybacking Work area security

Monitor placement or screen filters Protection of patient records Restricted areas

Emergency response measuresChallenge unknown or unauthorized persons

Patients in unauthorized areas Delivery and maintenance workers

Verify identity Verify that maintenance call was placed, etc.

Report suspicious activity

Page 17: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Policies Procedures

User Access Policy Least privilege

Configuration Management Policy Hardware Software

Password PolicyUser Training PolicyLog Management

Policy

Firewall Configuration Procedures

Log backup procedures

Data backup procedures

Incident Response Procedures

Technical Controls

Page 18: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

CHOOSE CAREFULLY

AND

CHANGE REGULARLY

PASSWORDS

Page 19: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Strong Passwords

At least 10 characters – more if required by policy

Mix of upper case letters, lower case letters, numbers, special characters

Passphrase – use uncommon phrase Horse*taxiZenith!rain (4 unrelated words - add special

characters if memory permits) Wg2c3*aw@Fmc! (based on phrase We go to church 3

times a week at First Methodist Church!)NO personal information

No family names, birth dates, pet names Easy to remember, but hard to guess

Page 20: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Password Protection

Don’t write down your password Use different passwords for each accountChange your password at least every 3 months

– more often if required by policyDon’t change password by using a pattern

such as adding 01, then 02, etc. Change it any time it may have been

compromised News stories about passwords being stolen for

applications you use such as Gmail or Facebook Virus, or malware, found on your computer

Page 21: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Password Protection

Security questions for password resets What is your mother’s maiden name? Where were you born? What is your favorite color? What is your favorite vacation destination? What was your first pet’s name?

Pick good questions or use incorrect answers (make sure you can remember them) Many answers to those questions can be found on

Facebook or other social media sites

Page 22: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

HACKING HUMANS

Social Engineering

Page 23: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Phishing

• Phishing uses suspicious Emails or Pop-ups thato Tell you to access a website, or attachment, that appears realo Ask you to validate or update personal or account informationo State dire consequences for failure to comply

• Spear phishing o Targets particular individuals, groups of people or

organizationso Claim to be from your bank, credit card company, IT

department, anti-virus software, friend, etc.

• Whaling o Spear phishing that targets high-level personnelo Uses relevant issues or topics

Page 24: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Tips about Phishing

• Never click links, or open attachments, in unsolicited email or pop-ups.

• Forward spear phishing or whaling emails to security or compliance officer and then delete the email

• Security officers can ensure potential targets are warned

• If concerned issue is valid, verify byo Phone call using a known good number, not one

providedo Type the site’s verified web address in the browser

Page 25: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Tips for Safe Email Use

View email in plain text Scan any attachments before openingDelete emails

From senders you do not recognize From known senders if the subject or attachment is

suspiciousLook for digital signatures, especially if email

has an attachmentNever send PHI or Privacy Act information

(PII) unencrypted

Page 26: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

DO Do NOT

Use wise privacy settings

Use strong passwordsTurn off GPS tracking

on portable devicesValidate friend

requests via phone or email before accepting

Beware of games and quizzes

Check-in at locationsPost PII or PHIAccept friends

requests from people you do not know IN REAL LIFE

Post travel plans until AFTER the event

Post pictures with geotags (location info)

Tips for Online Social Networking

Page 27: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Social Networking and Work

Be very careful posting any photos taken at work!BEFORE posting

Check background for sensitive information PHI or PII, Check walls, bulletin boards, doors, monitors, name tags, etc.

Check for patients or visitors or “photo bombers” Ensure no security measures, or vulnerabilities, are

exposed (type of alarm system or locks)

Never discuss sensitive information about the workplace or patients

Consider your posts carefully – once it has been posted it exists even after you delete it

Page 28: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

DO NOT DO

Participate in surveysGive out any personal

information Give out any

information about network, hardware or software

Do not follow instructions from unknown contacts

Verify identity of contacts

Document unusual contact attempts

Report unusual contacts to security officer

Resist the urge to be “helpful” in unusual situations

Protection Against Social Engineering

Page 29: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Hoaxes, Spam, Etc.

Slow down networks and email servicesCan be part of Distributed Denial of Service (DDoS) Usually violate acceptable usage policiesCause unnecessary confusion or fearCan advocate installation of malware or

unauthorized softwareResources for checking validity

www.dhs.gov/internet-hoaxes Snopes.com www.hoaxbusters.org www.hoax-slayer.com

Page 30: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Practice Situational Awareness

Shoulder surfing or eavesdropping Ensure no one without the need-to-know is within view of

monitors, mobile device screens or within hearing distance (even on the other end of the phone) of your voice

Keep monitors further than six feet from patients, visitors, etc. or use screen filters

Conversations about work Never in public places Never when individuals without a need-to-know are present

Avoid distractions Distractions cause careless actions and poor security

awareness Avoid multitasking – don’t talk on the phone while assisting

another individual in person

Page 31: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

SECURE THE DEVICES AND

THE DATA THEY CONTAIN

Mobile Computing

Page 32: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Mobile Device Security Tips

Lock the screen on mobile devices when not in use

Follow security policies concerning use of PHI, PII

Encrypt all PHI, PII and other sensitive dataUse password protectionMaintain physical or visual control of mobile

devicesImmediately report lost or stolen devices

Remotely wipe mobile device if possible Contact law enforcement if stolen Contact security officer if business owned device or if

device contains PHI or sensitive business information

Page 33: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Removable Media Security Tips

Do not use if not authorized by policyIncludes thumb drives/flash drives, external or

removable hard drives, DVDs and CDsDo not use personally owned, non-organization

provided, removable media Label all media; identify if it contains PHI, PII or

sensitive informationFollow policy for storage, retention, reuse and

disposalNever insert media of unknown source or

content

Page 34: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Use of Business Electronics

Don’t install unauthorized or personally owned software

Don’t make configuration changes without authorization

Avoid risky websites – often sources of malware Never view or download pornography Never visit gambling sites Avoid social networking sites unless authorized for use Avoid checking personal email accounts unless

authorized

Page 35: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Travel Tips

Be aware of who is around and what is visible on your device

Use extreme caution when connecting to hotspots

Be extra vigilant about maintaining physical, or at least visual, control of your devices at all times

Be aware of who is around when on the phone Never discuss your destination or hotel reservations

when strangers could overhear Never discuss sensitive information in public places

Page 36: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

PROTECT YOURSELF

Home Computer Security

Page 37: INFORMATION SYSTEM SECURITY HIPAA Security Awareness Training

Best Practices for Home Computers

Require passwords for access – choose strong ones Assign different accounts to each user Require confirmation before installing mobile code Avoid Peer-to-Peer (P2P) applications (Bittorrent, Morpheus, etc.)

Compromises network security Source of malware Illegal source of copyrighted content or programs

Intrusion Protection Turn on firewall provided with OS Install anti-virus software Purchase a COTS Internet Security Suite

Many include Intrusion Protection Software, anti-virus, anti-malware and firewall in one

Keep current on all updates Anti-virus Security patches Browser updates