mhealth SECURITY: STATS AND SOLUTIONS

Similar documents
PCI Compliance. What is it? Who uses it? Why is it important?

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

Combating Cyber Risk in the Supply Chain

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Five network. security. threats. and how to fight them

DeMystifying Data Breaches and Information Security Compliance

ips.insight.com/healthcare Identifying mobile security challenges in healthcare

Cybersecurity Survey Results

How Cyber-Criminals Steal and Profit from your Data

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Cyber Criminal Methods & Prevention Techniques. By

What is Penetration Testing?

Encrypting PHI for HIPAA Compliance on IBM i. All trademarks and registered trademarks are the property of their respective owners.

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Teradata and Protegrity High-Value Protection for High-Value Data

Service Provider View of Cyber Security. July 2017

Cybersecurity in Higher Ed

UPDATE: HEALTHCARE CYBERSECURITY & INCIDENT RESPONSE Lindsay M. Johnson, Esq. Partner, Freund, Freeze & Arnold, LPA

Cyber Attack: Is Your Business at Risk?

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Defending Our Digital Density.

Best Practices in Securing a Multicloud World

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Internet of Things Toolkit for Small and Medium Businesses

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Security Audit What Why

ACM Retreat - Today s Topics:

Neil Peters-Michaud, CHAMP Cascade Asset Management ITAM Awareness Month December 2016

The State of Cybersecurity in Healthcare Organizations in 2016

Cybersecurity and Nonprofit

PULSE TAKING THE PHYSICIAN S

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

HEALTH CARE AND CYBER SECURITY:

Securing the SMB Cloud Generation

Secure Access for Microsoft Office 365 & SaaS Applications

Securing Today s Mobile Workforce

Keys to a more secure data environment

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Effective Strategies for Managing Cybersecurity Risks

U.S. State of Cybercrime

Learning from a breach

The Cyber War on Small Business

Anticipating the wider business impact of a cyber breach in the health care industry

THE STATE OF ENDPOINT PROTECTION & MANAGEMENT WHY SELF-HEALING IS THE NEW MANDATE

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

What is a mobile protection product?

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Entertaining & Effective Security Awareness Training

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

PCI DSS Compliance for Healthcare

Cyber Insurance: What is your bank doing to manage risk? presented by

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Cyber Security. The Question of the Day. Sylint Group, Inc. How did we come up with the company name Sylint and what does it mean?

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Cyber security tips and self-assessment for business

Building a Resilient Security Posture for Effective Breach Prevention

Information Governance, the Next Evolution of Privacy and Security

ENCRYPTION: ADDRESSABLE OR A DE FACTO REQUIREMENT?

A practical guide to IT security

External Supplier Control Obligations. Cyber Security

Cyber Fraud What can you do about it?

Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure?

Privacy and Security in the Age of Meaningful Use

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

align security instill confidence

Cyber Security Stress Test SUMMARY REPORT

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

Cyber fraud and its impact on the NHS: How organisations can manage the risk

A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

Evaluating the Security of Your IT Network. Vulnerability Scanning & Network Map

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Mobile Technology meets HIPAA Compliance. Tuesday, May 2, 2017 MT HIMSS Conference

Choosing the right two-factor authentication solution for healthcare

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Compliant. Secure. Dependable.

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Keep the Door Open for Users and Closed to Hackers

White Paper. Enabling Mobile Users and Staying Compliant. How Healthcare Organizations Manage Both

WHITE PAPER. HELPING BANKS SECURE DATA DURING AND AFTER DIGITIZATION An Infosys solution

Who We Are! Natalie Timpone

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Changing the Game: An HPR Approach to Cyber CRM007

HIPAA Regulatory Compliance

SecurityScorecard 2018 Healthcare Report. A Pulse on the Healthcare Industry's Cybersecurity Risks

Anatomy of a Healthcare Data Breach

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Mobile Devices prioritize User Experience

AT&T Endpoint Security

Forging a Stronger Approach for the Cybersecurity Challenge. Session 34, February 12, 2019 Tom Stafford, VP & CIO, Halifax Health

Transcription:

mhealth SECURITY: STATS AND SOLUTIONS www.eset.com

WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported by mobile devices. The term is most commonly used in reference to using mobile communication devices, such as mobile phones and tablets, for health services and information.

HOW DOES mhealth POSE SECURITY RISKS? Vulnerabilities Design flaws in hardware, software or connectivity; reliance on unreliable or unsecured vendors Human error and human frailty Hectic workplace, complex systems, serious temptations to breach privacy Compliance failure Improperly secured devices or data can lead to noncompliance, followed by fines or sanctions

PII (Personally Identifiable Information) Name, address, DoB, SSN Payment card and bank data Medical records PHI and ephi CRIMINALS ARE LOOKING TO STEAL INFORMATION Personally Identifiable Information (PII) is any valuable information ranging from paper records at admissions desk to full medical records on servers There are multiple ways to monetize PII from stolen your mhealth projects

THOUSANDS OF PEOPLE HAVE SUFFERED FROM IDENTITY THEFT Tens of millions of records have been exposed, and millions of dollars paid in fines. Countless hours have been spent to solve problems caused by intruders and intrusive code. And just imagine the negative impact on patient care when access to data is impeded, missing, or wrong.

THE RISK OF mhealth BY THE NUMBERS Nearly 90 % of organizations use at least one type of mobile device to engage patients HIMSS Mobile Technology Survey, 2015

THE SECURITY THREATS HEALTHCARE ORGANIZATIONS WORRY MOST ABOUT 76% Employee-owned mobile devices/byod 72% Unsecure mobile devices ➊ ➋ ➌ 69% Unsecure mobile apps Source: Ponemon Institute, 2016

THE STATE OF CYBERSECURITY IN HEALTHCARE ORGANIZATIONS IN 2016 READ THE FULL REPORT NOW ➊ Healthcare organizations experience at least one cyberattack a month on average. ➋ 47% of healthcare orgs experienced the loss or exposure of patient information over the past 12 months. ➌ Patient medical records are cited by 81% of healthcare organizations as the most valuable records for hackers to steal. Source: Ponemon Institute, 2016

THE STATE OF CYBERSECURITY IN HEALTHCARE ORGANIZATIONS IN 2016 (cont.) Only one-third of healthcare IT professionals say their organization s cybersecurity posture is very effective. Source: Ponemon Institute, 2016

ATTACK SURFACES Personal health data travels through a long chain of communication devices. Each of them are vulnerable to attack on multiple levels. MHEALTH DEVICE SMARTPHONE TELECOM INTERNET HEALTHCARE CENTER Possible attacks at communication points This is just an example. Many communication chains include even more vulnerabilities.

NEGATIVE IMPACT OF SECURITY BREACH Reputational damage Legal sanctions Unbudgeted costs Inaccurate data

PATIENTS ARE CONCERNED ABOUT THE SECURITY OF THEIR HEALTH DATA 70% 80% 83% 20s & 30s 40s 50s patients in their 20s & 30s patients in their 40s patients in their 50s University of Phoenix survey of 2000+ adults, 10/2015

External attackers Sharing data with third parties 65% 48% 35% 35% 27% Employee breaches/theft Wireless computing Inadequate firewalls GREATEST VULNERABILITIES IN DATA SECURITY Cyber Security Studies Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data Health Care and Cyber Security 2015 Protected Health Information Data Breach Report 2015 HIMSS Cybersecurity Survey by KPMG Health Care And Cyber Security

CYBERSECURITY THREAT TRENDS A review of the many 2016 cybersecurity trend/ threat predictors suggests a need to watch for the following: Denial of service attacks (as cover for system intrusion, malicious code insertion) Very targeted and/or realistic phishing attacks Malware attacks on, and/or spread by, servers Disgruntled employees and insecure partners To strengthen your mhealth security posture, see step-by-step tips on the following slides: Cybersecurity Roadmap and Four Pillars of Security.

mhealth CYBERSECURITY ROADMAP STEP F: FURTHER TEST Periodically test and adjust defenses Audit systems for changes & threats STEP A: ASSESS Catalog your digital and physical assets Determine risks to your systems STEP E: EDUCATE Share policies with staff, vendors, clients Empower employees to report risky practices STEP B: BUILD Write your security policy statement Add policies for specific assets as needed STEP D: DEPLOY Test and evaluate as you deploy controls Identify and correct any problems STEP C: CHOOSE Describe the controls that will enforce policies List any cybersecurity products you may need

FOLLOW THE 4 PILLARS OF PROTECTION Keep your devices, data and patients safe by implementing multiple layers of security: ESET's Four Pillars of Protection. Each pillar is a vital element in mhealth security strategies. Backup Encryption Anti-malware Strong authentication SEE OUR SOLUTION SEE OUR SOLUTION SEE OUR SOLUTION SEE OUR SOLUTION

Backup ESET provides the StorageCraft products to meet your backup and recovery needs. StorageCraft offers a suite of software and services that helps you recover anytime, anywhere, from any situation. It works as an integral part of your overall business continuity plan by protecting your Windows systems, applications and data from any disruption, large or small. READ MORE

Encryption DESlock+ is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires minimal user interaction,increasing user compliance and the security of your company data. READ MORE

Anti-malware Equipped with proactive malware defense and engineered to be light on your systems, endpoint security gives you the protection you need with fewer interruptions and false positives. Plus, with ESET Remote Administrator, you can easily manage tens or thousands of Windows, Mac, or Linux endpoints from one spot, eliminating the need for expensive management tools. READ MORE

Strong authentication ESET Secure Authentication is a software-based, two-factor authentication system that protects against data breaches due to compromised passwords. More flexible, cost effective, and comprehensive than hardware OTP tokens or appliances, ESET Secure Authentication is the simple way to strengthen passwords with no extra hardware needed. READ MORE