protect your practice against cyber threats may 12th, …€¦ · hipaa hitech’s main function...

44
PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12 th , 2020

Upload: others

Post on 29-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

PROTECT YOUR

PRACTICE AGAINST

CYBER THREATS

May 12th, 2020

Page 2: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Let’s introduce

ourselves

Tyler Lewan

Account Executive

Josh Prager

Lead Engineer

Page 3: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Thank You

Page 4: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Today’s plan

Education Prevention ResponseDetection Recover

Page 5: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Education

Page 6: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Why is healthcare such a target?

Stolen medical records worth $$$• MA psychiatrist created false diagnoses to submit

false claims, not a patient

• MO thief used stolen info to get real ID, obtain prescription

• OH dental office employee used PHI to obtain prescription

• PA man’s identity used at 5 hospitals for $100K treatment

• CO man received bill for $44k for surgery that he had not undergone

Trustwave report, 2018

Page 7: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Cybersecurity Challenges

Already spent $$ on firewall, anti-virus, and Backup!Expensive

Believe your IT team has you coveredBlind Trust

Don’t believe it will happen to you - it’s just the big guys that get targetedToo Small

Met HIPAA regulations, isn’t that enough?Inconvenient

Page 8: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

What can you

do to protect

your

house against a

break in?

Page 9: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Detection

Alarm

Motion Sensor

Doorbell Camera

Neighborhood

Watch

Response

Dog

Insurance

Police

Baseball Bat

NIST Cybersecurity Framework

Recover

Restoration Services

Red Cross

Insurance

Legal

Prevention

Doors

Windows

Locks

Education

Yard Signs

Page 10: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Guess the Year• Phones first included navigation

• Newest Galaxy phone could scroll the internet!

• 80% of Netflix subscribers received DVDs through the mail

• Windows 7 introduced

• Donald Trump created his Twitter account

• HIPAA HITECH Enacted

HIPAA HITECH’s main function was for data privacy, not data security

2009

Page 11: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Don’t wait for legislation

Didn’t know what today would

look like 10 years ago

Can’t predict what

legislation we will need to protect

us in the future

Page 12: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Telemedicine

Page 13: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Prevention

Page 14: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

No single solution is guaranteed to prevent attacks

A multi-layered portfolio is highly recommended

Prevention

Attacks bypassing basic security

measures will happen

Page 15: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Web Gateway Security

Internet security is a race against time

Offers protection against online threats by enforcing company security

policies, filtering malicious traffic in real-time, and blocks them on your network

within seconds – before they reach the user.

Page 16: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

the ability for your solution to

dynamically analyze behavior in

order to recognize

malicious software by its actions,

not its appearance

Antivirus Technologies

75%

Sources: microsoft.com/safety; microsoft.com/wdsi; support.microsoft.com/products/security

Key to effective protection:

Page 17: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

More than just backup – they will

revive your systems and have

your staff are operating in almost

no time

Includes features like

continuous data protection,

cloud-based replication and

recovery

Business Continuity Solutions

Page 18: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

• Wood Ranch Medical (CA)

• Eye Care Associates (OH)

• N.E.O. Urology (OH)

Page 19: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

• Know who is accessing your data

• Confirm identities

• Prevent non-compliant devices from

accessing your systems

75%

Verizon 2017 Breach Investigations Report

Password Policies

Page 20: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Multi-Factor Authentication

Additional layer of protection

Protect against phishing and other access

threats

Verifies the identity of all users with strong

two-factor authentication - before

granting access to applications

Page 21: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

For better security, the latest security patches and other critical

updates can be automatically installed through patch

management services to protect from latest known attacks

Computer Updates

Page 22: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Encrypt files at rest, in

motion (email) and

especially on laptops

Encryption

Page 23: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Security Awareness

Sources: microsoft.com/safety; microsoft.com/wdsi; support.microsoft.com/products/security

Your staff can be your greatest

weakness. Threats bypasses

defenses when they trick an

employee.

Page 24: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Look for experts with

experience handling

healthcare cybersecurity

The Right Controls

Page 25: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

• Web Gateway Security

• Anti-Virus

• Business Continuity Solution

• Multi-Factor Authentication

• Encryption

• Security Training

Overview

Page 26: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Detection

Page 27: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

If a breach is not detected

quickly the damage is

already done

The quicker a breach is

detected, the less cost an

organization will incur as a

result of the breach.

Detection

Page 28: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Phishing

Phishing emails hold the

potential to bypass many of

your cybersecurity defenses

31%

PhishMe research

Page 29: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Phishing

Train your team to spot red flags

Think before you click

Hover over

link to revel

where it is

pointing

Generic non-

personalized

greeting

CAN-SPAM

requires

physical

mailing

address

No opt-out

link (has to be

managed

outside

organization)

Page 30: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t
Page 31: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Shadow IT Detection:

• Conditional access and level

controls

• Save-As, Copy, Paste restrictions

Security Management Tools

Page 32: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Advanced Endpoint Detection

Replaces traditional anti-virus solutions

Stops threat by • swiftly killing malicious processes• quarantining infected files• disconnecting the infected endpoint device from the network

Page 33: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Dark Web Monitoring

Stolen credentials are used to

test for open door

access

Know which passwords and

accounts that have been

posted on the Dark Web

81%

Sources: microsoft.com/safety; microsoft.com/wdsi; support.microsoft.com/products/security

Page 34: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Overview

• HIPAA Standards

• Phishing Emails

• Security Management Tools

• Advanced Endpoint Detection

• Dark Web Monitoring

Page 35: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Response

Being prepared to mitigate

and report damage and notify

and reassure customers

Page 36: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Key Components of Successful Response Planning

Response Team Members - know who is responsible for what and when they are responsible for it

Return Time Objectives (RTO) - dictates the type of preparations and your business continuity budget

Recovery Point Objectives (RPO) - looking at the time between data backups and the amount of data that could be lost in between backups

Page 37: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Steps to take if you’ve been breached

Respond quickly and appropriately in a

compliant manner

1. Get help: legal and technical

2. Assess the damage

3. Address any HIPAA reporting

obligations

4. Depending on the situation, contact

law enforcement

Page 38: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Recovery

Restoring any

capabilities or

servers that were

impaired by the

attack

Page 39: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Recovery Planning

Explore “what if” scenarios

Look at other cyber

events that have impacted

other practices

Help identify gaps before a

cyber security event occurs

Page 40: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Downtime

The biggest expense from an attack

• operational stoppage, idle workers

• productivity loss

• hardware repair/replacement

10X

Sources: Datto

Factor time trying to restore your system from backups

Page 41: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Recovery vs backup

Having copies of data doesn’t mean you can keep your practice running

• Evaluate multiple cloud and on-premises deployment options to find the right

fit for your organization

• Look for solutions that keeps your workloads available and offers redundant

devices

Page 42: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Questions?

Page 43: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

16 Ways

To protect your

practice from a

cyber attack!

Page 44: PROTECT YOUR PRACTICE AGAINST CYBER THREATS May 12th, …€¦ · HIPAA HITECH’s main function was for data privacy, not data security 2009. Don’t wait for legislation Didn’t

Thank you• Tyler Lewan

• Account Executive

[email protected]

• Cell : 847-987-9606

• Josh Prager

• Lead Engineer

[email protected]

Vertical Solutions