<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0"><channel><description>Micro blogs and anecdotes for consultants and cyber geeks.  

Richard Staynings is a 25 year veteran of cybersecurity and IT consulting and has by experience learned to see the funny side of many things in daily life. Some of the better anecdotes are shared here for your entertainment.</description><title>Cyber Thoughts</title><generator>Tumblr (3.0; @cyber-thoughts)</generator><link>https://microblog.staynings.com/</link><item><title>Balancing access and usability with security is top priority for hospitals</title><description>&lt;a href="https://www.healthcareitnews.com/video/balancing-access-and-usability-security-top-priority-hospitals"&gt;Balancing access and usability with security is top priority for hospitals&lt;/a&gt;: &lt;p&gt;Sound advice from my friend and follow security leader Chad Wilson at Childrens’ National Health System &lt;/p&gt;</description><link>https://microblog.staynings.com/post/179497096860</link><guid>https://microblog.staynings.com/post/179497096860</guid><pubDate>Sat, 27 Oct 2018 16:27:06 -0600</pubDate></item><item><title>Man-in-the-Middle Attacks and “HTTPS Inspection Products”</title><description>&lt;p&gt;Man-in-the-middle (MITM) attacks occur when a third party intercepts and potentially alters communications between two different parties, unbeknownst to the two parties. MITM attacks can be used to inject malicious code, intercept sensitive information like protected health information (PHI), expose sensitive information, and modify trusted information.&lt;/p&gt;&lt;p&gt;Many organizations have implemented end-to-end connection security on their internet transactions using Secure Hypertext Transport Protocol, or “HTTPS.”  Additionally, some organizations use “HTTPS interception products” to detect malware over an HTTPS connection. HTTPS interception products, also known as “HTTPS inspection,” work by intercepting the HTTPS network traffic and decrypting it, reviewing it, then re-encrypting it.  To do so, HTTPS interception products must install trusted certificates on client devices to perform the HTTPS inspection without presenting warnings.&lt;/p&gt;&lt;p&gt;However, this process may leave organizations using HTTPS interception products vulnerable, because the organizations can no longer verify web servers’ certificates; view the protocols and ciphers that an HTTPS interception product negotiates with web servers, and, most importantly, independently validate the security of the end-to-end connection. In other words, the organizations that use these interception products are able to validate only the connection between themselves and the interception product, not between themselves and the server.  This is problematic, because many HTTPS interception products do not properly verify the certificate chain before re-encrypting and forwarding information to the organizations, which leaves the connection vulnerable to a malicious MITM attack.&lt;/p&gt;&lt;p&gt;The United States Computer Emergency Readiness Team (US-CERT) recommends that organizations verify that their HTTPS interception product properly validates certificate chains and passes any warnings or errors to the client. Organizations can find a partial list of products that may be affected at CERT Coordination Center’s &lt;a href="https://insights.sei.cmu.edu/cert/2015/03/the-risks-of-ssl-inspection.html"&gt;The Risks of SSL Inspection&lt;/a&gt;. Also, organizations may use badssl.com as a method of determining if their HTTPS interception product properly validates certificates and prevents connections to sites using weak cryptography.&lt;/p&gt;&lt;p&gt;Securing end-to-end communications performs an important function in protecting the privacy of HTTPS traffic and preventing some forms of MITM attacks.  US-CERT recommends reviewing the following mitigations in &lt;a href="https://www.us-cert.gov/ncas/alerts/TA15-120A"&gt;Alert TA15-120A&lt;/a&gt; to reduce vulnerability to MITM attacks:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Update Transport Layer Security and Secure Socket Layer (TLS/SSL) US-CERT recommends upgrading TLS to 1.1 or higher and ensuring TLS 1.0 and SSL 1, 2, 3.x are disabled unless required. The continued use of TLS 1.0 and SSL 1, 2, 3.x is leading to increased cases affected by MITM attacks and session hijacks.&lt;/li&gt;&lt;li&gt;Utilize Certificate Pinning&lt;/li&gt;&lt;li&gt;Implement DNS-based Authentication of Named Entities (DANE)&lt;/li&gt;&lt;li&gt;Use Network Notary Servers&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Further, a recent security analysis (&lt;a href="https://jhalderm.com/pub/papers/interception-ndss17.pdf"&gt;The Security Impact of HTTPS Interception&lt;/a&gt;) of HTTPS interception products found that poor implementation of many of these products may actually reduce end-to-end security and introduce new vulnerabilities.  US-CERT recently issued an Alert, &lt;a href="https://www.us-cert.gov/ncas/alerts/TA17-075A"&gt;TA17-075A&lt;/a&gt;, warning of the vulnerabilities that organizations expose themselves to when they use HTTPS interception products.&lt;/p&gt;&lt;p&gt;Covered entities and business associates using HTTPS interception products or considering their use should consider the risks presented to their electronic PHI transmitted over HTTPS, and intercepted with an HTTPS interception products, as part of their risk analysis, particularly considering the pros and cons discussed by the US-CERT alerts, and the increased vulnerability to malicious third-party MITM attacks.&lt;/p&gt;&lt;p&gt;In addition to reviewing recommendations from US-CERT, covered entities and business associates should also review recommendations from the National Institute of Standards and Technology (NIST) for securing end-to-end communications, especially regarding the configuration, use and updating of TLS/SSL implementations. &lt;a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification/guidance/index.html"&gt;OCR’s Guidance&lt;/a&gt; to Render Unsecured PHI Unusable, Unreadable, or Indecipherable to Unauthorized Individuals references NIST SP-800 series publications to describe the valid encryption processes to use to ensure that electronically transmitted PHI is not unsecured.&lt;/p&gt;&lt;p&gt;Source: OCR April 3, 2017&lt;br/&gt;&lt;/p&gt;</description><link>https://microblog.staynings.com/post/159164192965</link><guid>https://microblog.staynings.com/post/159164192965</guid><pubDate>Mon, 03 Apr 2017 15:14:05 -0600</pubDate><category>cybersecurity</category><category>healthcare</category><category>hipaa</category><category>ocr</category><category>us-cert</category></item><item><title>'Elliot Hacks His Hospital'</title><description>&lt;a href="http://youtu.be/g6gG-6Co_v4"&gt;'Elliot Hacks His Hospital'&lt;/a&gt;</description><link>https://microblog.staynings.com/post/142925031500</link><guid>https://microblog.staynings.com/post/142925031500</guid><pubDate>Sat, 16 Apr 2016 19:23:18 -0600</pubDate></item><item><title>Fair is Fair!</title><description>&lt;p&gt;Users: Please DoNotTrack me &lt;br/&gt;WebAdIndustry: Screw you &lt;br/&gt;&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;WebAdIndustry: Please DoNotAdBlock me 
&lt;br/&gt;Users: Screw you&lt;br/&gt;&lt;/p&gt;</description><link>https://microblog.staynings.com/post/142307753070</link><guid>https://microblog.staynings.com/post/142307753070</guid><pubDate>Tue, 05 Apr 2016 13:35:50 -0600</pubDate><category>web privacy</category></item><item><title>cyber-thoughts:

Spotted on a colleagues’ phone tonight over...</title><description>&lt;img src="https://64.media.tumblr.com/7c2b75d3f8f00d37e7d5a3357838ebbd/tumblr_o4h2z1uBjY1td43cxo1_500.jpg"/&gt;&lt;br/&gt;&lt;br/&gt;&lt;p&gt;&lt;a class="tumblr_blog" href="http://cyber-thoughts.tumblr.com/post/141525660505"&gt;cyber-thoughts&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Spotted on a colleagues’ phone tonight over dinner.  And I thought I was behind on email!!!!!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Are we each receiving too many emails or is it just a thing of the past now that we all iMessage, Jabber, and SnapChat?&lt;br/&gt;&lt;/p&gt;</description><link>https://microblog.staynings.com/post/141529263895</link><guid>https://microblog.staynings.com/post/141529263895</guid><pubDate>Tue, 22 Mar 2016 22:44:09 -0600</pubDate><category>too much email</category></item><item><title>Spotted on a colleagues’ phone tonight over dinner.  And I...</title><description>&lt;img src="https://64.media.tumblr.com/7c2b75d3f8f00d37e7d5a3357838ebbd/tumblr_o4h2z1uBjY1td43cxo1_500.jpg"/&gt;&lt;br/&gt;&lt;br/&gt;&lt;p&gt;Spotted on a colleagues’ phone tonight over dinner.  And I thought I was behind on email!!!!!&lt;/p&gt;</description><link>https://microblog.staynings.com/post/141525660505</link><guid>https://microblog.staynings.com/post/141525660505</guid><pubDate>Tue, 22 Mar 2016 21:28:13 -0600</pubDate></item><item><title>OCR Launches Phase 2 of HIPAA Audit Program</title><description>&lt;p&gt;As a part of its continued efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the HHS Office for Civil Rights (OCR) has begun its next phase of audits of covered entities and their business associates.  Audits are an important compliance tool for OCR that supplements OCR’s other enforcement tools, such as complaint investigations and compliance reviews.  These tools enable OCR to identify best practices and proactively uncover and address risks and vulnerabilities to protected health information (PHI).&lt;/p&gt;&lt;p&gt;In its 2016 Phase 2 HIPAA Audit Program, OCR will review the policies and procedures adopted and employed by covered entities and their business associates to meet selected standards and implementation specifications of the Privacy, Security, and Breach Notification Rules.  These audits will primarily be desk audits, although some on-site audits will be conducted.&lt;/p&gt;&lt;p&gt;The 2016 audit process begins with verification of an entity’s address and contact information.  An email is being sent to covered entities and business associates requesting that contact information be provided to OCR in a timely manner.  OCR will then transmit a pre-audit questionnaire to gather data about the size, type, and operations of potential auditees; this data will be used with other information to create potential audit subject pools.&lt;/p&gt;&lt;p&gt;If an entity does not respond to OCR’s request to verify its contact information or pre-audit questionnaire, OCR will use publicly available information about the entity to create its audit subject pool.  Therefore an entity that does not respond to OCR may still be selected for an audit or subject to a compliance review.  Communications from OCR will be sent via email and may be incorrectly classified as spam.  If your entity’s spam filtering and virus protection are automatically enabled, we expect entities to check their junk or spam email folder for emails from OCR.&lt;/p&gt;&lt;p&gt;The audit program is developing on pace and OCR is committed to transparency about the process.  OCR will post updated audit protocols on its website closer to conducting the 2016 audits.  The audit protocol will be updated to reflect the HIPAA Omnibus Rulemaking and can be used as a tool by organizations to conduct their own internal self-audits as part of their HIPAA compliance activities.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;OCR’s audits will enhance industry awareness of compliance obligations and enable OCR to better target technical assistance regarding problems identified through the audits.  Through the information gleaned from the audits, OCR will develop tools and guidance to assist the industry in compliance self-evaluation and in preventing breaches.  We will evaluate the results and procedures used in our phase 2 audits to develop our permanent audit program.&lt;/p&gt;&lt;p&gt;To learn more about OCR’s Phase 2 Audit program, please visit our website at &lt;a href="http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/index.html."&gt;http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/index.html.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Follow OCR on Twitter at &lt;a href="http://twitter.com/HHSOCR."&gt;http://twitter.com/HHSOCR.&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;</description><link>https://microblog.staynings.com/post/141443357305</link><guid>https://microblog.staynings.com/post/141443357305</guid><pubDate>Mon, 21 Mar 2016 13:03:52 -0600</pubDate><category>cybersecurity HIPAA OCR healthcare</category></item><item><title>Addressing Gaps in Cybersecurity:  OCR Releases Crosswalk...</title><description>&lt;img src="https://64.media.tumblr.com/55eb3170d80ee09073711c2d0b9b9cbb/tumblr_o35tuywUCG1td43cxo1_500.jpg"/&gt;&lt;br/&gt;&lt;br/&gt;&lt;p&gt;&lt;b&gt;Addressing Gaps in Cybersecurity:  OCR Releases Crosswalk Between HIPAA Security Rule and NIST Cybersecurity Framework&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The sensitive health information maintained by health care providers and health plans has become an increasingly attractive target for cyberattacks. The need for health care organizations to up their game on health data security has never been greater. &lt;/p&gt;&lt;p&gt;To help health care organizations covered by the Health Insurance Portability and Accountability Act (HIPAA) to bolster their security posture, the Office for Civil Rights (OCR) today has released a &lt;a href="http://www.hhs.gov/sites/default/files/NIST%20CSF%20to%20HIPAA%20Security%20Rule%20Crosswalk%2002-22-2016%20Final.pdf"&gt;crosswalk&lt;/a&gt;, developed with the National Institute of Standards and Technology (NIST) and the Office of the National Coordinator for Health IT (ONC), that identifies “mappings” between the NIST Framework for Improving Critical Infrastructure Cybersecurity (the Cybersecurity Framework) and the HIPAA Security Rule.  The crosswalk also includes mappings to other commonly used security frameworks.&lt;/p&gt;&lt;p&gt;In addressing security, many entities both within and outside of the healthcare sector have voluntarily relied on detailed security guidance and specific standards issued by NIST.  In February 2014, NIST released the Cybersecurity Framework to help organizations in any industry to understand, communicate and manage cybersecurity risks. &lt;/p&gt;&lt;p&gt;Entities covered by HIPAA must implement strong data security safeguards in their environments, and in particular, comply with the HIPAA Security Rule to ensure the confidentiality, integrity, and availability of all of the electronic protected health information (ePHI) they create, receive, maintain or transmit.  We hear frequently from covered entities and business associates who say they are working hard in an increasingly challenging atmosphere to assure their PHI is adequately protected.  We also know from our HIPAA enforcement work that far too frequently entities are leaving PHI vulnerable to breach and access by unauthorized persons.  &lt;a href="http://www.usatoday.com/story/money/personalfinance/2015/07/24/steve-weisman-health-care-data-breach/30593661/"&gt;According to a report in USA Today&lt;/a&gt;, the healthcare industry has accounted for over 40 percent of data breaches over the last three years, and 91 percent of all health organizations have reported a breach over the last two years.  &lt;/p&gt;&lt;p&gt;Organizations that have already aligned their security programs to either the NIST Cybersecurity Framework or the HIPAA Security Rule may find this crosswalk helpful in identifying potential gaps in their programs.  Taking specific action to address these gaps can bolster compliance with the Security Rule and improve an entity’s ability to secure ePHI from a broad range of threats.  The HIPAA Security Rule is designed to be flexible, scalable, and technology-neutral, which enables it to accommodate integration with more detailed frameworks such as the NIST Cybersecurity Framework.  Although the Security Rule does not require use of the NIST Cybersecurity Framework, and use of the Framework does not guarantee HIPAA compliance, the crosswalk provides an informative tool for entities to use to help them more comprehensively manage security risks in their environments. &lt;/p&gt;&lt;p&gt;In addition, Congress, in both the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH) as well as the Cybersecurity Information Sharing Act of 2015 (CISA), called for guidance on implementation of NIST frameworks. In response, this crosswalk provides a helpful roadmap for HIPAA covered entities and their business associates to understand the overlap between the NIST Cybersecurity Framework, the HIPAA Security Rule, and other security frameworks that can help entities safeguard health data in a time of increasing risks.  The crosswalk also supports the President’s Cybersecurity National Action Plan (CNAP) by encouraging HIPAA covered entities and their business associates to enhance their security programs, increase cybersecurity awareness, and implement appropriate security measures to protect ePHI.&lt;/p&gt;</description><link>https://microblog.staynings.com/post/140030346110</link><guid>https://microblog.staynings.com/post/140030346110</guid><pubDate>Fri, 26 Feb 2016 08:04:10 -0700</pubDate><category>cybersecurity healthcare</category></item><item><title>No matter how much you spend on security, you can’t...</title><description>&lt;img src="https://64.media.tumblr.com/b00dbb896d66a8a57c18665673faf122/tumblr_o35t3jIZgt1td43cxo1_500.jpg"/&gt;&lt;br/&gt;&lt;br/&gt;&lt;p&gt;No matter how much you spend on security, you can’t change “STUPID”! Laptop left unlocked on a train out of London this morning for at least 5 minutes in an almost empty carriage while its owner went to the toilet. Anyone could have uploaded or downloaded anything. ………Or maybe his hope was that he could expedite a laptop refresh!&lt;/p&gt;</description><link>https://microblog.staynings.com/post/140029717995</link><guid>https://microblog.staynings.com/post/140029717995</guid><pubDate>Fri, 26 Feb 2016 07:47:43 -0700</pubDate><category>cybersecurity</category></item><item><title>Hollywood Ransomware</title><description>&lt;p&gt;It looks like Hollywood Presbyterian Hospital system was victim of
 “Locky” ransomware.  &lt;br/&gt;&lt;/p&gt;&lt;p&gt;Sophos has an explanation: 
&lt;a href="https://nakedsecurity.sophos.com/2016/02/17/locky-ransomware-what-you-need-to-know/"&gt;https://nakedsecurity.sophos.com/2016/02/17/locky-ransomware-what-you-need-to-know/&lt;/a&gt;&lt;br/&gt;&lt;/p&gt;</description><link>https://microblog.staynings.com/post/139841620575</link><guid>https://microblog.staynings.com/post/139841620575</guid><pubDate>Tue, 23 Feb 2016 02:14:17 -0700</pubDate></item><item><title>HHS OCR In Action</title><description>&lt;p&gt;&lt;i&gt;February 3, 2016&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Administrative Law Judge rules in favor of OCR enforcement, requiring Lincare, Inc. to pay $239,800&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A U.S. Department of Health and Human Services Administrative Law Judge (ALJ) has ruled that Lincare, Inc. (Lincare) violated the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule and granted summary judgment to the Office for Civil Rights (OCR) on all issues, requiring Lincare to pay $239,800 in civil money penalties (CMPs) imposed by OCR.  This is only the second time in its history that OCR has sought CMPs for HIPAA violations, and each time the CMPs have been upheld by the ALJ. &lt;/p&gt;&lt;p&gt;Lincare is a provider of respiratory care, infusion therapy, and medical equipment to in-home patients, with more than 850 branch locations in 48 states.  OCR’s investigation of Lincare began after an individual complained that a Lincare employee left behind documents containing the protected health information (PHI) of 278 patients after moving residences.  Evidence established that this employee removed patients’ information from the company’s office, left the information exposed in places where an unauthorized person had access, and then abandoned the information altogether.  Over the course of the investigation, OCR found that Lincare had inadequate policies and procedures in place to safeguard patient information that was taken offsite, although employees, who provide health care services in patients’ homes, regularly removed material from the business premises. Further evidence indicated that the organization had an unwritten policy requiring certain employees to store protected health information in their own vehicles for extended periods of time.  Although aware of the complaint and OCR’s investigation, Lincare subsequently took only minimal action to correct its policies and strengthen safeguards to ensure compliance with the HIPAA Rules. &lt;/p&gt;&lt;p&gt;“While OCR prefers to resolve issues through voluntary compliance, this case shows that we will take the steps necessary, including litigation, to obtain adequate remedies for violations of the HIPAA Rules,” said OCR Director Jocelyn Samuels.  “The decision in this case validates the findings of our investigation.  Under the ALJ’s ruling, all covered entities, including home health providers, must ensure that, if their workforce members take protected health information offsite, they have adequate policies and procedures that provide for the reasonable and appropriate safeguarding of that PHI, whether in paper or electronic form.”&lt;/p&gt;&lt;p&gt;Lincare claimed that it had not violated HIPAA because the PHI was “stolen” by the individual who discovered it on the premises previously shared with the Lincare employee.  The ALJ rejected this argument, in agreement with OCR:  “[U]nder HIPAA, Respondent [Lincare] was obligated to take reasonable steps to protect its PHI from theft.”&lt;/p&gt;&lt;p&gt;The Notice of Proposed Determination and the ALJ’s opinion may be found on the OCR website at &lt;a href="http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/lincare/index.html."&gt;http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/lincare/index.html.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Follow OCR on Twitter at &lt;a href="http://twitter.com/HHSOCR."&gt;http://twitter.com/HHSOCR.&lt;/a&gt;&lt;br/&gt; &lt;/p&gt;</description><link>https://microblog.staynings.com/post/138613923235</link><guid>https://microblog.staynings.com/post/138613923235</guid><pubDate>Wed, 03 Feb 2016 10:25:40 -0700</pubDate></item><item><title>Virus Debate Reaches the White House.  No this isn’t another...</title><description>&lt;img src="https://64.media.tumblr.com/8b4bf564c6acac25aa26a5e874cf1ff1/tumblr_o1sjw2ZfSm1td43cxo1_500.jpg"/&gt;&lt;br/&gt;&lt;br/&gt;&lt;p&gt;Virus Debate Reaches the White House.  &lt;/p&gt;&lt;p&gt;No this isn’t another cyber attack, this is a pathogen for a change!  Remember those?&lt;/p&gt;</description><link>https://microblog.staynings.com/post/138374227750</link><guid>https://microblog.staynings.com/post/138374227750</guid><pubDate>Sat, 30 Jan 2016 17:26:26 -0700</pubDate></item><item><title>Security bod watches heart data flow from her pacemaker to doctor via ... er, SMS? 3G? Email?</title><description>&lt;p&gt;&lt;a href="http://www.theregister.co.uk/2016/01/05/researcher_hacks_her_own_pacemaker/"&gt;http://www.theregister.co.uk/2016/01/05/researcher_hacks_her_own_pacemaker/&lt;/a&gt;&lt;br/&gt;&lt;/p&gt;</description><link>https://microblog.staynings.com/post/136684502435</link><guid>https://microblog.staynings.com/post/136684502435</guid><pubDate>Tue, 05 Jan 2016 09:47:43 -0700</pubDate></item><item><title>Attack of the health hackers</title><description>&lt;a href="http://www.staynings.com/pubs/Financial.Times.-.Attack.of.the.Health.Hackers.2015.12.22.pdf"&gt;Attack of the health hackers&lt;/a&gt;: &lt;p&gt;PDF of print article&lt;br/&gt;&lt;/p&gt;</description><link>https://microblog.staynings.com/post/135743674095</link><guid>https://microblog.staynings.com/post/135743674095</guid><pubDate>Tue, 22 Dec 2015 17:54:18 -0700</pubDate></item><item><title>Attack of the Health Hackers</title><description>&lt;h2&gt;&lt;b&gt;&lt;i&gt;Breach
of Anthem database, probably from China, is part of a 2015 wave of 100m hacked
medical records&lt;/i&gt;&lt;/b&gt;&lt;/h2&gt;&lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;












&lt;p&gt;&lt;i&gt;Financial Times, By Kara Scannell and
Gina Chon, 21 December 2015&lt;/i&gt;&lt;/p&gt;



&lt;p&gt;Attrib:
&lt;a href="http://www.ft.com/intl/cms/s/0/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3uzhPuwCi"&gt;http://www.ft.com/intl/cms/s/0/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3uzhPuwCi&lt;/a&gt;&lt;/p&gt;





&lt;p&gt;&lt;a href="http://www.ft.com/intl/cms/s/0/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3uzhPuwCi"&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Last
January an administrator at health insurer Anthem noticed an
unusually complex query running on the computer network. It looked like a
colleague was responsible, but a quick check revealed that it was coming from
somewhere else.&lt;/p&gt;&lt;p&gt;Minutes
later, Anthem was in crisis mode. Investigators believe the hackers were
from China and had been operating undetected inside the company’s network for
months. They gained access by tricking the employee to click on a phishing
email that was disguised to look like an internal message.&lt;/p&gt;&lt;p&gt;Using the
administrator’s credentials, hackers combed through Anthem’s database containing
names, social security numbers and birth dates of over 78m people who have been
enrolled in its insurance plans since 2004.&lt;/p&gt;&lt;p&gt;Anthem’s
breach sent a wave of panic through the healthcare industry. It exposed
clients’ most sensitive and valuable personal information, and revealed just
how unprepared the health industry was to threats from increasingly
sophisticated cyber criminals —
and from nation states.&lt;/p&gt;&lt;p&gt;Hackers
accessed over 100m health records — 100 times more than ever before last year.
Eight of the 10 largest hacks into any type of healthcare provider happened
this year, according to the US Department of Health and Human Services.&lt;/p&gt;&lt;p&gt;Insurers
scrambled to hire cyber security companies to scrub their systems. Premera Blue
Cross, CareFirst BlueCross BlueShield, and Excellus Health Plan announced
breaches affecting at least 22m individuals in total since March, including
hacks that stretched back more than a year. Investigators told the FT that they
believe some of the hacks are related and trace back to China.&lt;/p&gt;&lt;p&gt;The
insurers face multiple investigations from state insurance regulators and
attorneys-general and some could face fines for failing to comply with state
data privacy laws, while federal law enforcement agencies are investigating who
is behind the hacks.&lt;/p&gt;&lt;p&gt;&lt;i&gt;“For a lot of them it is often less
of a priority than it should be. Because their focus is often on many other
things it creates a vulnerability that I think a lot of hackers have figured
out,”&lt;/i&gt; said Deven
McGrath, Deputy Director for Health Information Privacy at the HHS’s Office of
Civil Rights. &lt;i&gt;“We’re seeing some pretty
consistent areas of non-compliance across the board.”&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The
HHS is investigating the breaches and declined to comment on them specifically.
Healthcare companies are required by privacy laws in numerous countries,
including the US and UK, to protect personal data. Yet they have been
inconsistent in maintaining basic security, say regulators.&lt;/p&gt;&lt;p&gt;In
the UK, there have been no reported hacks at the National Health Service, but
it has been fined £1.3m by the Information Commissioner’s Office, which
conducts audits on behalf of the government over data privacy. The fines are
mostly for sloppiness: lost laptops, files left at a grocery shop and records
abandoned at a bus stop.&lt;/p&gt;&lt;p&gt;&lt;i&gt;“The Health Service holds some of
the most sensitive personal information available, but instead of leading the
way in how it looks after that information, the NHS is one of the worst
performers. This is a major cause for concern,”&lt;/i&gt; Christopher Graham, the Information
Commissioner, said this year. ICO was granted new authority this year to
conduct compulsory audits of NHS systems. &lt;i&gt;“Protecting
the security of data across government and especially within the health system
is a top priority,”&lt;/i&gt; an NHS spokesman said.&lt;/p&gt;&lt;p&gt;As
in the UK, US healthcare providers see a majority of its data breaches falling
into the categories of lost laptops or improper access to systems by insiders.
Yet as more information is maintained in electronic form — an idea pushed
heavily by the US government to make health records more portable — cyber
intrusions have grown.&lt;/p&gt;&lt;p&gt;At
some hospitals, the doctors who are often part of management have long resisted
electronic measures that they thought could slow down or interfere with patient
care. HHS’s Ms McGrath said this is a common excuse, but she said it is far
more troubling that many companies don’t encrypt their data.&lt;/p&gt;&lt;p&gt;The
problem has been exacerbated by the hundreds of hospital mergers that have
occurred over the past few years, often resulting in multiple IT systems in one
hospital group. Cyber security is often overlooked as a priority.&lt;/p&gt;&lt;p&gt;&lt;i&gt;“It’s a very fragmented industry so
there aren’t as many major players who drive the entire sector the way you’ve
seen when it comes to financial services and cyber security,”&lt;/i&gt; said Bryan Palma, Senior
Vice-President of Cisco’s Advanced Services in Cyber Security. &lt;i&gt;“That is not happening in healthcare.”&lt;/i&gt;&lt;/p&gt;&lt;p&gt;With
healthcare profit margins under pressure, only about 3 per cent of the IT
budget is earmarked for cyber security, according to experts. Too many aspects
of patient care are shared on a single hospital network. That means hackers in
search of patient data could also disrupt life-saving equipment such as
respirators running on the same network.&lt;/p&gt;&lt;h2&gt;&lt;b&gt;A
new threat emerges&lt;/b&gt;&lt;/h2&gt;&lt;p&gt;The
threat changed this year with the emergence of hacks that investigators say are
connected to China.&lt;/p&gt;&lt;p&gt;&lt;i&gt;“We know of multiple threat groups
operating out of China that have engaged in attacks in the healthcare
industry,”&lt;/i&gt; said
Charles Carmakal, an investigator with Mandiant, a cyber security company.
Mandiant was hired by Anthem, Premera and others.&lt;/p&gt;&lt;p&gt;&lt;i&gt;“While we believe we know from an
organisational perspective who they are, we can’t tell who tasked them to do
it. The big question is: are they hackers for hire and were they asked by the
Chinese government to do this?”&lt;/i&gt; said Mr Carmakal.&lt;/p&gt;&lt;p&gt;The
Chinese government has denied it was involved in the hacks. American
investigators believe hackers in China targeted insurers in the US, including
Anthem, to learn how medical coverage and insurer databases are set up, people
familiar with the cases said. The records are also valuable for intelligence
purposes. Addressing healthcare challenges has been a top priority of the
Chinese government, which is facing an ageing and affluent population that is
demanding better care.&lt;/p&gt;&lt;p&gt;&lt;i&gt;“China is very interested in
anything that will help them with the illnesses they are dealing with and
changes in their population,”&lt;/i&gt; said Dmitri Alperovitch, co-founder of CrowdStrike, who
declined to talk specifically about the Anthem breach. &lt;i&gt;“For example, diabetes is a big problem in China so they have targeted
companies in that space.”&lt;/i&gt;&lt;/p&gt;&lt;p&gt;China
has promised to provide universal access to healthcare to all its citizens by
2020. Currently, China’s spending on healthcare per capita still lags far
behind that of developed countries, and the healthcare system is riddled with
corruption and kickbacks.&lt;/p&gt;&lt;p&gt;The
industry is also an attractive target for criminals who sell personal health
data on the black market. Medical records are much more valuable than credit
card numbers because it often takes longer to detect so the data have a longer
shelf life. Data such as social security numbers can be used in a range of
schemes from tax refund fraud, insurance fraud or Medicare fraud.&lt;/p&gt;&lt;p&gt;A
credit card record can be bought for about $1 on the black market, but &lt;i&gt;“one person’s complete [medical] record I’ve
seen anywhere between $200 and $2,000,”&lt;/i&gt; said Carl Leonard, an analyst for
Raytheon Websense, a security company.&lt;/p&gt;&lt;p&gt;The
market is flooded with stolen credit card details, he said, so &lt;i&gt;“healthcare records attract the premium
now”.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Investigators
do not believe information from the Anthem breach has been sold on black
markets. However, other hackers have targeted victims of the Anthem attack with
fake emails that appear to be from Anthem or offer credit protection. Those
emails aim to steal data that could be sold to criminals, people familiar with
the case say.&lt;/p&gt;&lt;p&gt;Anthem
plans to spend $130m over two years to better protect its networks from
breaches. The company has assured regulators that it has strengthened its
system, taking steps such as changing administrator passwords every 10 hours
and hiring 55 cyber security experts.&lt;/p&gt;&lt;h2&gt;&lt;b&gt;Bad
‘cyber hygiene’&lt;/b&gt;&lt;/h2&gt;&lt;p&gt;The
hackers’ tactics vary but in many of the health breaches they set up domain
names that look similar to the websites operated by the insurance companies,
which were set up before the hacks were detected.&lt;/p&gt;&lt;p&gt;The
fake sites often had one letter off from the authentic site or used the number
“1” in place of where the letter “l” should be in site names, according to
research done by cyber security companies ThreatConnect and Symantec.&lt;/p&gt;&lt;p&gt;For
Anthem, which was formerly known as WellPoint, the domain &lt;a href="http://we11point.com"&gt;www.we11point.com&lt;/a&gt; was set up. There was also &lt;a href="http://secure-web.cisco.com/1VrXrV31M0vXecYPA27DJsl76srXaOHjqcBHiE2xDnAQWityn4csDTcn1qcopMMs0WPuKQ383pjF9vQfBjH7p5qDtLzvKvgzRgoGChI5y9sD0Ru6ZqfZZPNVOS2X429BUUya3YRzgADwgsrgd2B3MC8RlUd1WWDDEZajBw6dIrJ8Cb3OgBsz7MvI3hkQm1YtnuUrOYlcjDYI2EvT_u8HzUcH-TZ5RhEpNWRPLM-KWpOq27uWFlBZZe5lRH31L6vLmHQfKvAXOsfedvHWylw_aoKNWoOFWNTkWKI2JdFqm5-1ibUmLNXnw7bpUZpQ_xiT55aQbFIQFx8hW2mBKLgh2oehLF2FQI78TlE7WAHJAv-o/http%3A%2F%2Fprennera.com"&gt;prennera.com&lt;/a&gt; for Premera, &lt;a href="http://empireb1ue.com/"&gt;EmpireB1ue.com&lt;/a&gt;
for Empire Blue and &lt;a href="http://secure-web.cisco.com/18wx2O7RVtH0Ue0FiaSNGy3Uo-taAGbmfghJdpgvHddgD7tJZ7JCyBt5e4m7nhZf_KQOt_KVSImRdt5us-KZzq9dVk8bcpa67OgZmr1WlKlBKJ1obDswpy983yGGglB64HxRrn-QctroRybokdiirGGoZRbRnt6UZZvwSER03P-irSA0VHl6HeZZVlINeVmpDF_TMqeMiS0WUfRH9oXs8i9HPrkvOxolxbJdKYtQzdN6mX6Ck_dBUmOx7BlEq4ZKg17slRanf4D4w05W-P6DI8b6VtFpyH4M_sDLexdD92HlvlNGbipdCtU6QYlnYUJq3Fj_i2NRyeGJFjshiSCoripu1G4woNDql-QbmMMPEpz8/http%3A%2F%2Fcaref1rst.com"&gt;caref1rst.com&lt;/a&gt; for CareFirst. All of these domain
names were traced to China.&lt;/p&gt;&lt;p&gt;When
the Anthem administrator discovered the hack on January 27, it was just as the
hackers were extracting a large file of patient data. The hackers are believed
to have been in the system for months, staying under the radar by running multiple
queries against the database to understand it before they began removing files,
a person familiar with the attack said.&lt;/p&gt;&lt;p&gt;The
hackers used a repeating pattern of extracting data and slightly altering the
query to avoid detection. They then removed the data and transferred it to an
encrypted share site, similar to a drop box. The hackers chose a share site
similar to one that Anthem already used, making detection tougher.&lt;/p&gt;&lt;p&gt;Anthem
has been faulted for not having the right “cyber hygiene” or protections in
place to minimise the risk of a hack or limit what information was vulnerable
if the network was infiltrated.&lt;/p&gt;&lt;p&gt;Citing
a report produced by Mandiant, a class-action lawsuit filed by dozens of
Americans enrolled in its health insurance plans alleges Anthem did not
implement a two-factor authentication, failed to require users to change their
password and allowed employees to access personal information that went beyond
the scope of their job.&lt;/p&gt;&lt;p&gt;Anthem
also allegedly ignored alerts — including one that lasted a month, according to
the lawsuit — and failed to implement systems that would monitor data usage or
extractions. The company now has two-factor authentication for its high-level
system administrators.&lt;/p&gt;&lt;p&gt;In a
September 2013 audit of Anthem, the US Office of Personnel Management’s
inspector general said the insurer had vulnerabilities that could provide a
“gateway for malicious virus and hacking activity.”&lt;/p&gt;&lt;p&gt;Anthem
could face fines and be required to take corrective measures.&lt;/p&gt;&lt;p&gt;Already,
the hack has cost Anthem about $230m in legal and consultant fees. Most of the
costs were covered by its cyber insurance policy. However, Thomas Zielinski,
Anthem’s general counsel, told insurance regulators in August that its cyber
insurance has become more expensive since the breach. Now Anthem is on the hook
for the initial $25m cost of any breach, and has purchased a policy offering
$100m in additional coverage.&lt;/p&gt;&lt;p&gt;&lt;i&gt;“The [Anthem] breach has raised
awareness,”&lt;/i&gt; Mr
Palma said. &lt;i&gt;“The healthcare industry is
saying, ‘This is real now. There is precedent in our industry.’ They are late
to the party but at least they are there now.”&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;h2&gt;&lt;b&gt;The
Anthem breach that affected almost 80m customers was a wake-up call to US
regulators.&lt;/b&gt;&lt;/h2&gt;&lt;blockquote&gt;&lt;p&gt;Health
insurers already had to meet cyber standards and are subject to federal health
reporting rules when there is a breach. But the vulnerabilities exposed in the
Anthem hack prompted regulators to question whether current cyber security
standards are up to the job of protecting against today’s hackers.&lt;/p&gt;&lt;p&gt;The
National Association of Insurance Commissioners is updating the cyber standards
insurers have to meet and also set up a consumer bill of rights for breach
situations in October.&lt;/p&gt;&lt;p&gt;“Do
we need to increase what they [insurers] do no matter who is behind it?” said
Connecticut state insurance commissioner Katharine Wade. “It’s constantly
evolving and you could have the best systems in the world but still have a
breach. So we have to take a balanced approach.”&lt;/p&gt;&lt;p&gt;Just
a few months before the Anthem breach was reported, the NAIC created a cyber
security task force in November 2014. The NAIC has also been meeting with
representatives from Anthem, Premera and CareFirst to get updates on their
hacks and remediation efforts.&lt;/p&gt;&lt;p&gt;Other
states are also looking to step up their standards. In Indiana, where Anthem is
based, attorney-general Greg Zoeller said he has advocated legislation that
would require companies that collect data to meet safer storage standards,
including deleting files that are no longer needed for business purposes.&lt;/p&gt;&lt;p&gt;

In New York, state attorney-general Eric
Schneiderman plans to push a bill next year that would broaden the definition
of “private information” that companies will be required to report in case of a
breach. This would include medical and biometric information and health
insurance details. 



&lt;/p&gt;&lt;/blockquote&gt;</description><link>https://microblog.staynings.com/post/135743550030</link><guid>https://microblog.staynings.com/post/135743550030</guid><pubDate>Tue, 22 Dec 2015 17:51:56 -0700</pubDate></item><item><title>The Security of Medical Devices</title><description>&lt;p&gt;&lt;i&gt;&lt;b&gt;Republished here because this is very solid advice!&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;[Written and first blogged by John D. Halamka, MD, MS, is CIO of Beth Israel Deaconess Medical Center,
 Chairman of the New England Healthcare Exchange Network and Co-Chair of
 the HIT Standards Committee.  &lt;a href="http://geekdoctor.blogspot.mx/2015/08/the-security-of-medical-devices.html"&gt;http://geekdoctor.blogspot.mx/2015/08/the-security-of-medical-devices.html&lt;/a&gt; ]&lt;/i&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Last week the U.S. Food and Drug Administration advised hospitals not to
 use Hospira&amp;rsquo;s Symbiq infusion system, concluding that a security 
vulnerability enables hackers to take remote control of the system. The 
agency issued the advisory some 10 days after the U.S. Department of 
Homeland Security warned of the vulnerability in the pump.&lt;br/&gt;&lt;br/&gt;&lt;a href="http://abcnews.go.com/WNT/video/fda-warns-commonly-medical-device-hacked-32829030"&gt;My view is that this will be the first of many advisories &lt;/a&gt;&lt;br/&gt;&lt;br/&gt;
For years, manufacturers of medical devices depended on the “kindness of
 strangers” assuming that devices would never be targeted by bad actors. EKG machines, IV pumps, and radiology workstations are all 
computers, often running un-patched old operating systems, ancient Java 
virtual machines, and old web servers that no one should currently have 
deployed in production.   &lt;br/&gt;&lt;br/&gt;
In the short term, hospitals must do their best to isolate medical 
devices from the internet and from other computing devices that could 
infect them. At BIDMC, we have three wireless networks&lt;br/&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;
A guest network for patients and families&lt;/li&gt;&lt;li&gt;
A secure network for clinicians and staff&lt;/li&gt;&lt;li&gt;
A device network for medical devices that is not connected to the Internet or the other two networks.&lt;br/&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
Further, we use firewalls around medical devices to prevent them from communicating to outside parties.&lt;br/&gt;&lt;br/&gt;
Over the past few years, I’ve asked medical device manufacturers to give
 me a precise map of the network ports and protocols used by their 
devices so that I can build a “pinpoint” firewall - only allowing the 
minimum necessary transactions from/to the device. Many manufacturers 
do not seem to know the minimum necessary communication requirements for
 their products.&lt;br/&gt;&lt;br/&gt;
A few years ago, BIDMC had a reportable breach when a medical device 
manufacturer removed our hospital provided security protections in order
 to update a device from the internet. It took about 30 seconds for the
 unprotected device to become infected and transmit data over the 
internet. The Office of Civil Rights adjudicated that it was the 
manufacturer, not BIDMC, which was responsible for the breach. We were
 advised to follow any visiting manufacturer reps around the hospital to
 ensure that they do not remove hospital provided security protections 
in the future.&lt;br/&gt;&lt;br/&gt;
Some manufacturers have claimed that adding operating system patches, 
intrusion detection/prevention and other cybersecurity defenses will 
require them to re-certify their devices with the FDA.&lt;br/&gt;&lt;br/&gt;
That is simply not true. The FDA has issued guidance declaring it the 
responsibility of the manufacturers to secure their devices. No 
re-certification will ever be needed for adding new protections.&lt;br/&gt;&lt;br/&gt;
In the short term, CIOs need to build “zero day” defenses, creating an 
electronic fence around vulnerable devices. In the medium term, 
manufacturers must update their products. In the long term, medical 
devices must be designed from the ground up with security as a 
foundational component.&lt;br/&gt;&lt;br/&gt;
Whenever I write about a topic, I avoid hyperbole. In this case, the 
threat is real, I have experienced it myself, and CIOs must act.&lt;br/&gt;&lt;br/&gt;
My advice, after securing your own perimeter - get the CTOs of your 
medical devices on the phone and ask them for their security roadmap. If they do not have one, plan to change your vendor.  We’re already 
doing that with some devices because attention to this issue by some 
manufacturers has been insufficient.&lt;br/&gt;&lt;/p&gt;</description><link>https://microblog.staynings.com/post/126476398170</link><guid>https://microblog.staynings.com/post/126476398170</guid><pubDate>Tue, 11 Aug 2015 21:04:43 -0600</pubDate><category>cybersecurity</category><category>healthcare security</category><category>medical devices</category><category>information security</category></item><item><title>US Victims of Chinese Cyber Espionage over the past five years!</title><description>&lt;img src="https://64.media.tumblr.com/cad2d32ee625300ff3e3ee1748a72d2a/tumblr_nskw5zZ6sL1td43cxo1_500.png"/&gt;&lt;br/&gt;&lt;br/&gt;&lt;p&gt;US Victims of Chinese Cyber Espionage over the past five years!&lt;/p&gt;</description><link>https://microblog.staynings.com/post/125875820520</link><guid>https://microblog.staynings.com/post/125875820520</guid><pubDate>Tue, 04 Aug 2015 16:08:23 -0600</pubDate><category>cybersecurity</category><category>cyberattack</category><category>information security</category></item><item><title>If Google was a Guy</title><description>&lt;a href="https://www.youtube.com/watch?v=YuOBzWF0Aws"&gt;If Google was a Guy&lt;/a&gt;</description><link>https://microblog.staynings.com/post/125537889155</link><guid>https://microblog.staynings.com/post/125537889155</guid><pubDate>Fri, 31 Jul 2015 14:11:45 -0600</pubDate></item><item><title>Photo</title><description>&lt;img src="https://64.media.tumblr.com/2873a6c2dec7d6c9b5cf1c8db4882fe2/tumblr_nsdavvr2Ue1td43cxo1_500.jpg"/&gt;&lt;br/&gt;&lt;br/&gt;</description><link>https://microblog.staynings.com/post/125536161660</link><guid>https://microblog.staynings.com/post/125536161660</guid><pubDate>Fri, 31 Jul 2015 13:45:31 -0600</pubDate></item><item><title>Email in Real Life</title><description>&lt;a href="https://youtu.be/HTgYHHKs0Zw"&gt;Email in Real Life&lt;/a&gt;</description><link>https://microblog.staynings.com/post/120712897195</link><guid>https://microblog.staynings.com/post/120712897195</guid><pubDate>Thu, 04 Jun 2015 13:13:14 -0600</pubDate></item></channel></rss>
