Question: Some of my colleagues have reported getting weird emails. I’m worried that all of the technology we’re now using to help residents connect with their families — and the pandemic, generally — puts our facility at risk for cyberattack. What do I need to know about investigating a breach if one does indeed happen? Kansas Subscriber Answer: Hiring forensic investigators to evaluate a breach in protected health information (PHI) or electronic protected health information (ePHI) can be an organization’s choice — or a requirement by a federal agency. One takeaway from the experts: If you suspect a breach, don’t erase the evidence. “First, contain the breach,” says Jen Stone, MSCIS, CISSP, QSA, a security analyst with Security Metrics in Orem, Utah. “Don’t wipe affected systems because you might destroy evidence needed by the forensic team to determine what ePHI was compromised and how to prevent it from happening again.” Adam Kehler, CISSP, principal consultant and healthcare practice lead with Online Business Systems, agrees. “When an organization finds out they have an incident such as ransomware, the temptation is to immediately power down the systems and wipe drives.
In doing so, they may actually be destroying evidence that could be useful in investigating the incident,” he adds. Depending on the severity of the data security incident, the parties involved, and the information usurped, you may need to get the authorities involved. More significant and nefarious breaches may warrant a call to your local law enforcement agency or the Federal Bureau of Investigation (FBI), counsels Kehler. It’s a good idea to get in touch with your IT vendors and cyber insurers, too. And if the breach is major, a lawyer might be next in line of those to contact. “These resources can help determine the most appropriate steps to take to ensure that they are able to limit the impact and quickly recover while maintaining evidence and meeting their compliance requirements,” Kehler says. If cybersecurity experts, law enforcement, or the HHS Office for Civil Rights (OCR) think that a forensic investigation may help, several things will follow. Do these things: Prepare for an in-person audit. “A forensic team will typically come onsite to your practice and carefully evaluate the state of your systems,” says Stone. They’ll do this “so you know exactly what happened and how the breach occurred,” she explains. Get ready for an in-depth review. The investigation will look closely at your IT products, machines, and protocols. This analysis will help the team determine the nitty gritty of the breach. Understand investigation logistics. “This evaluation is typically performed by taking an image and memory dump of affected systems,” Kehler says. “The investigation is performed on these images and dumps in order to avoid tampering with the evidence and maintaining chain of custody.” Keep systems up and running. Your first inclination may be to shut everything down, but that’s not a good idea. When you power off, the memory will be lost — and that could have catastrophic repercussions. “Many malware systems these days never write to disk; they are located in memory only,” Kehler says. Take the forensic team’s advice seriously. This kind of investigation is usually required after a costly, complicated cyberattack, so it is critical to work with the forensic team and listen to their instructions to eradicate problems. “They will tell you what you need to know to remediate the issue and offer recommendations for implementing security controls that will prevent future breaches,” Stone says.