Home Health & Hospice Week

HIPAA:

Look Inward For Threats To Your Cybersecurity

Whether it’s an accident or on purpose, you must protect yourself against internal security incidents.

Given the current environment, you may have an eagle eye out for external cyberattacks that threaten your agency’s operations. But the reality is that workforce-related incidents and insider threats should be on your radar, too.

Update: The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) has added a new warning on insider threats to its online resources. The alert offers statistics, advice, and tips on how to identify and address insider threats.

Any person — including employees, vendors, and contractors — with access to your IT and business assets could be a threat to your agency and “could use this information in a way that negatively impacts the organization,” explains the HC3 brief.

According to the Ponemon Institute’s 2020 Insider Threats Report, 61 percent of internal issues are caused by “negligent insiders,” with 25 percent attributed to insider incidents related to credential theft. Most of these incidents aren’t intentional and are caused by a “lack of awareness about security policies and a failure to provide security awareness training,” the report maintains.

However, you should still be concerned about “malicious insiders” with a “grievance against the company,” HC3 says. These disgruntled staff account for 14 percent of insider threat incidents and can wreak havoc on your organization, according to the Ponemon Institute report.

Data security incidents usually don’t just pop up. In fact, you can look for three sets of indicators that can help you identify a potential incident. Here’s a brief overview of the trio of indicators, according to HC3 guidance:

1. Behavioral: Unusual or odd behavior from your staff or business partners may warrant an extra eye. Malicious insiders may be prone to personality conflicts with other employees, may engage in office bullying or unprofessional behavior, or may fight with managers and co-workers, HC3 suggests. Other signs to look for include “official records of security violations or crimes” and misusing agency time and money.

2. IT sabotage: Insider threats that aim to take down your systems through sabotage are not always easy to spot. Accessing other employees’ computers, disabling monitoring and logging systems, and changing login and password information without permission are all indicators of malicious activity. Nefarious software installation may go unnoticed, so it’s critical that IT staff keep on top of software updates and check for new account creations, remote access software, and malware infiltrations.

3. Data theft: With remote work's continuing popularity, it’s important to watch for unauthorized access to files and data, especially if an employee is trying to access agency servers during non-working hours. Other data theft clues include excessive emailing of corporate or sensitive data to a personal email, attachment-heavy emailing to non-corporate emails, “massive downloading of corporate data,” and “excessive use of corporate printers,” HC3 warns.

Prevent Insider Threats With These Tips

As part of the HIPAA Security Rule, covered entities (CEs) must design and implement a security plan. Training employees on cybersecurity concerns, including identifying insider threats is key to the success of your overall compliance.

Why? Staff are often nervous about calling out other employees or telling management about unusual network activity they may have noticed. They may feel like a breach is too minor to even mention — and that’s why cultivating compliance is so crucial.

“Train in incident management, top to bottom,” advises Jim Sheldon-Dean, principal and director of compliance services for Lewis Creek Systems in Charlotte, Vermont. “Staff need to feel like they are empowered to report their suspicions of information security incidents, the handling of incidents needs to be clearly defined, and top management needs to understand the impacts of incidents and the necessity to prevent them as reasonably practicable.” v

Note: Check out more HHS tips and tools on insider threats at www.hhs.gov/sites/default/files/insider-threats-in-healthcare.pdf.

Other Articles in this issue of

Home Health & Hospice Week

View All