PULSE TAKING THE PHYSICIAN S

Similar documents
Cybersecurity and Hospitals: A Board Perspective

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

SURVIVING THE CYBERPOCALYPSE. Craig Felty Vice President, Patient Care Services Hancock Regional Hospital

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

DeMystifying Data Breaches and Information Security Compliance

Putting It All Together:

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Cyber Attack: Is Your Business at Risk?

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

HIPAA COMPLIANCE AND

HIPAA & Privacy Compliance Update

Cybersecurity 2016 Survey Summary Report of Survey Results

mhealth SECURITY: STATS AND SOLUTIONS

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID

The Data Breach: How to Stay Defensible Before, During & After the Incident

HIPAA AND SECURITY. For Healthcare Organizations

HIMSS 15 Doing Better Business in the Era of Data Security and Privacy

How to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016

2017 RIMS CYBER SURVEY

Data Backup and Contingency Planning Procedure

Information Governance, the Next Evolution of Privacy and Security

Modeling Factors Associated with Healthcare Data Breaches. Session #155, March 3, 2018 Dr. Alex McLeod, Dr. Diane Dolezel, Texas State University

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

Cybersecurity and Nonprofit

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

HIPAA Compliance is not a Cybersecurity Strategy

SATISFIED WITH YOUR RETURN ON IT DOLLARS SPENT?

Forging a Stronger Approach for the Cybersecurity Challenge. Session 34, February 12, 2019 Tom Stafford, VP & CIO, Halifax Health

What is Cybersecurity?

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

HIPAA UPDATE. Michael L. Brody, DPM

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

HIPAA 2017 Compliancy Group, LLC

Choosing the right two-factor authentication solution for healthcare

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

The Relationship Between HIPAA Compliance and Business Associates

Healthcare HIPAA and Cybersecurity Update

HIPAA ( ) HIPAA 2017 Compliancy Group, LLC

HIPAA Highlights and Impact to your Telehealth Program. Wednesday, Sept 27, 2017

HIPAA Compliance & Privacy What You Need to Know Now

Moving from Prevention to Detection March 2017

Chapter 12. Information Security Management

a publication of the health care compliance association MARCH 2018

HEALTH CARE AND CYBER SECURITY:

Cyber Insurance: What is your bank doing to manage risk? presented by

CYBERSECURITY PREPAREDNESS AND RESPONSE

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

Speakers. Shellie Zavatsky Director of Internal Audit at Hurley Medical Center. Trent Long Director of Managed Privacy Services at FairWarning, Inc

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Cybersecurity in Higher Ed

Policy and Procedure: SDM Guidance for HIPAA Business Associates

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Cyber Pulse: The State of Cybersecurity in Healthcare

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Preparing for a Breach October 14, 2016

HIPAA Federal Security Rule H I P A A

Sustainable Security & Compliance Solutions NSAA IT Conference & Workshop Copyright 2016 Terra Verde, LLC. All rights reserved.

Defensible and Beyond

HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013

2015 HFMA What Healthcare Can Learn from the Banking Industry

Compliance & HIPAA Annual Education

REAL-WORLD STRATEGIES FOR MEDICAL DEVICE SECURITY

Executive Insights. Protecting data, securing systems

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

NE HIMSS Vendor Risk. October 9, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS

Not Just Another Day of HIPAA

Legal Aspects of Cybersecurity

The ABCs of HIPAA Security

All Aboard the HIPAA Omnibus An Auditor s Perspective

Mobile Technology meets HIPAA Compliance. Tuesday, May 2, 2017 MT HIMSS Conference

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

DON T GET STUNG BY A BREACH! WHAT'S NEW IN HIPAA PRIVACY AND SECURITY

Memorial Hermann Health System Eases Encryption with Zix

Effectively Meeting the Cyber Security Challenge: Strategies, Tips and Tactics

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Sage Data Security Services Directory

The Cyber War on Small Business

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

Cyber Risks in the Boardroom Conference

What It Takes to be a CISO in 2017

Addressing the elephant in the operating room: a look at medical device security programs

Ⅰ Introduction 1. Ⅱ Information Security Infrastructure and Environment 2. Ⅲ Information Security Incident Prevention 8

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

DATA BREACH NUTS AND BOLTS

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

THE SIXTH ANNUAL SURVEY ON THE CURRENT SECURITY AND CYBER RISK MANAGEMENT THE SEVENTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

CYBER RISK MANAGEMENT

Compliance. TODAY August Creative passion, collaboration, and soft skills in Compliance

HIPAA Compliance. Dr. John Barker Ph.D., MIEEE MEDICAL DEVICES BUSINESS SEMINAR

Transcription:

TAKING THE PHYSICIAN S PULSE TACKLING CYBER THREATS IN HEALTHCARE Accenture and the American Medical Association (AMA) surveyed U.S. physicians regarding their experiences and attitudes toward cybersecurity. The findings suggest a strong need for improved cybersecurity education for physicians.

Five Key Takeaways 1 2 3 4 5 Cyberattacks in physician practices are common Cyberattacks cause operational interruptions Physicians think that ephi sharing is important Physicians rely on third-party security assistance New technologies bring new challenges

Cyberattacks are common in clinical practices Over four in five (83%) physicians have experienced some form of cyberattack 1 Types of cyberattacks that physicians experience Phishing (e.g. someone clicked on a malicious link in an email) Computers were infected with viruses or malware (e.g. through a download) Employee or insider inappropriately accessed or attempted to access ephi A breach of ephi 20% 37% 48% 55% Network was hacked Our practice's information was held ransom (e.g. 'Ransomware') 9% 12% Other cybersecurity attack(s) not mentioned Not applicable; my practice has not experienced any issues/attacks Don't know 5% 9% 17% Base: Total sample; n=1,300; Q7: Which of the following has your practice ever experienced? (Multiple responses)

Physicians are concerned about future cyberattacks Over half (55%) are very or extremely concerned about future attacks 1 Level of concern for future cyberattacks 20% 35% 30% 13% 2% Extremely concerned Very concerned Moderately concerned Slightly concerned Not at all concerned Base: Total sample; n=1,300; Q15: How concerned are you about future cybersecurity attacks in your practice?

Physicians are concerned about future attacks Including interruption to their business (74%) and patient record data (74%) 2 Areas of most concern Interruption to business (e.g. EHR access) EHR security (including compromised patient data) Patient safety concerns Civil or criminal liability Concern over reputational harm Costs (e.g. ransom, credit monitoring) Loss of billing (from moving/cancelling appointments) Government enforcement/fines Medical device security Do not have back-up records None of the above 0% 6% 36% 34% 32% 30% 25% 19% 53% 74% 74% Base: Total sample; n=1,300; Q17: What concerns you most about future attacks (select up to five)?

Extent of business interruption due to cyberattack 2 Amount of downtime as a result of cyberattack 4 hours or less 64% 5-7 hours 20% 1-2 days 12% More than 2 days 4% Base = Experienced attacks; n=1,017; Q9: How long were your practice s normal operations suspended due to the cybersecurity attack? (Note: Normal operations means appointments were not rescheduled or cancelled, electronic records were accessible, etc.)

Physicians think that ephi sharing is important 3 Importance of sharing electronic patient data with outside entities 1% 44% 41% 11% [VALUE] Extremely important Very important Moderately important Slightly important Not important at all Base: Total; n=1,300; Q39: How important is your ability to share electronic patient data with entities outside of your health system in order to efficiently provide quality healthcare?

Physicians trust third-parties to keep ephi data secure 3 How do you know/ensure that ephi is sent/stored securely by the other entity? Vendor assures it is secure I trust it is secure They sign a contract My privacy officer handles We discuss with the entity I don t know if it s secure Patients 28% 27% 27% 22% 14% 12% Labs 34% 31% 25% 24% 13% 7% Pharmacies 32% 34% 17% 21% 12% 10% Payers 32% 31% 24% 23% 10% 9% Other practices / outpatient 25% 33% 16% 24% 16% 12% Clinical data registries 27% 32% 26% 28% 16% 10% Hospitals / Inpatient 29% 37% 20% 25% 14% 8% HIE 36% 31% 29% 28% 18% 6% State / local health dept. 27% 35% 20% 29% 17% 10% Research organizations 32% 29% 30% 31% 22% 7% Base = Total sample; n=1,300; Q38: Of those who exchange ephi, how do you know/ensure ephi is sent and stored in a secure manner by the other entity? (multiple response)

Physicians believe electronic access to data improves care 3 Extent of supporting the quality and efficiency of care Electronic access to data from entities outside of my health system 65% 32% 3% Electronic access to patient data from organizations within my health system (where I don't currently have access) 67% 29% 4% Ability to access data remotely (cell phone, personal computer, etc.) 64% 32% 4% Definitely would Probably would Would not Base: Total sample; n=1,300; Q40: To what extent would each of the following help you provide quality patient care more efficiently?

Responding to cyberattacks 4 How do physicians respond to the cyberattack? Notified internal IT group Notified/educated employees Implemented our practice's corresponding written policies and procedures Notified EHR or health IT vendor Shut down electronic records and moved temporarily to paper Notified Department of Homeland Security or FBI Notified Office of Civil Rights Cancelled patient appointments Moved patients to a different facility Paid the ransom Took action(s) not listed Took no action 17% 11% 10% 8% 5% 3% 13% 0% 65% 61% 59% 56% Base: Experienced attack; n=1,017; Q8: How did you and/or your practice respond to the attack? Multiple responses.

Roughly half of physicians have an in-house security official 4 Cybersecurity capabilities Outsourced security management 26% 28% 24% 22% Shared security management (e.g., with another practice in your area) 23% 27% 31% 19% In-house security official 49% 17% 22% 12% Receiving donated security-related hardware or software from other provider groups or health systems (e.g., hospitals) 17% 29% 31% 23% 1 - Already have 2 - Don't have but are interested 3 - No interest 4 - Don't know Base: Total sample; n=1,300; Q48: Which of the following does your practice have or would your practice be interested in?

Training content is generated by the health IT vendor for most 4 Cybersecurity capabilities Someone in my practice develops the content 20% My health IT vendor develops the content 37% Our practice hired a lawyer to develop the content 7% Another type of 3rd party develops content 18% Don't know 18% Base: Training content; n=1,237; Q45: Who generates the content covered in your practice s privacy and security training?

New technologies physicians are likely to adopt 5 Adoption of new technologies in physician practices Telemedicine 33% 21% 14% 5% 12% 14% Precision medicine 14% 20% 16% 8% 6% 36% Artificial Intelligence 6% 11% 13% 13% 17% 40% Biometrics Authentication 15% 21% 16% 7% 10% 31% Risk-based security (Analytics) 21% 23% 14% 6% 5% 32% Patient-generated health data 28% 27% 16% 4% 4% 21% Within the next year 1-2 years 3-5 years More than 5 years Not likely to adopt Don't know Base: Total sample; n=1,300; Q49: Please indicate when you are likely to adopt each of the following into your practice

Security training for physicians Tips for good cyber hygiene Simplifying the legal language of HIPAA Easily digestible summary of HIPAA 44% 47% 50% Explaining some of the more complex rules of HIPAA How to guide for conducting a risk assessment 38% 40% Information on what to consider before hiring a consultant to help with 33% Information on what to consider before hiring a consultant to help with Assistance with developing a compliant 'Notice of Privacy Practices' 22% 25% None of the above 6% Base: n=1,300; Q21: Which of the following would enable you to feel more confident that you are keeping your practice secure? (multiple responses)

METHODOLOGY Accenture and the AMA surveyed 1,300 physicians in the United States to assess their experience and attitudes toward cybersecurity, data management and compliance with the Health Insurance Portability and Accountability Act (HIPAA) guidelines. The online survey was conducted between July 2017 and August 2017. Prior to the survey, in-depth research and 12 phone interviews were conducted with physicians, technology officers and administrators. CONNECT WITH US @AccentureHealth AccentureHealth @AmerMedicalAssn American Medical Association