Are You Ready For Quantum Day in Healthcare?

From AI-driven diagnostics to wearable smart devices and telehealth breakthroughs, rapid digital transformation drives modern healthcare service delivery.

From what was once a tech-resistant industry — and one where many legacy systems still play critical roles in operations — healthcare tech adoption has radically evolved since pre-COVID.

With all these breakthroughs and benefits, many covered entities and business associates struggle to keep pace with the increased risk these innovations introduce into the modern healthcare ecosystem. The more technologies, web apps, smart devices, and cloud services your organization adopts, the greater chance of a cyber breach.

And, as concerning as this already is, as reflected in the millions of patient health record exposures each year, it’s merely the tip of an iceberg.

As the industry races toward “Quantum Day” or “Q-Day,” healthcare organizations may soon face the serious risk implications of quantum computing.

While it will further advance and revolutionize care delivery, it also gives threat actors unprecedented access to advanced tools that could, experts predict, break even the most stringent encryption methods, like RSA 2048, in less than 24 hours.

This widely used encryption standard is a well-tested defense barrier to protect electronic patient health information (ePHI) from today’s most complex tactics, techniques, and procedures (TTPs).

Yet, when Q-Day arrives, these complex attack methods will pale compared to the unprecedented security challenges waiting at the industry’s doorstep.

What is Q-Day in Healthcare?

What is Q Day? Quantum Day is a hypothetical future date when quantum computers will be powerful enough to empower threat actors to break through current cryptographic algorithms in 24 hours or less.

Evolving Quantum Computing Threats

Ultimately, preparing for Q-Day is a race against the clock — one where training and preparation must happen while security and compliance teams are exhausted trying to keep pace with the evolving threats healthcare’s expanding attack surface creates.

Right out of the gate, these teams and their security leaders must understand quantum threats looming around the corner.

Two quantum approaches pose among the greatest risks — Shor’s Algorithm and Grover’s Algorithm.

Shor’s Algorithm

Shor’s Algorithm enables quantum computers to efficiently factor large integers like breaking RSA encryption.

Grover’s Algorithm

Grover’s Algorithm doesn’t break symmetric encryption outright. It reduces data security levels, which require larger key sizes for data protection.

So, what’s the potential likelihood and impact?

If and when quantum computers reach that scale, it could make all the encryption standards the industry uses obsolete.

Why is this a problem?

Without resolution, all sensitive data will likely be at risk. If history repeats itself, the healthcare sector will have a tough time and struggle with necessary—and mandatory—transformations, especially if a high percentage of organizations continue to use legacy equipment.

Today’s data protection standards won’t be mature enough to tackle these new risks either.

Harvest Now Decrypt Later (HDNL)?

To compound these challenges further, attackers are already considering quantum potential. That means the data they exfiltrate in attacks today has the potential for exploitation and decryption later.

According to a brief CISA released as early as 2022, National Critical Functions (NCFs), like healthcare, “that depend on data confidentiality over long time frames are uniquely vulnerable to quantum challenges.”

This includes catch-and-exploit campaigns, in which adversaries capture encrypted data using current encryption algorithms. They then hold onto that data to decrypt it when a quantum computer can break that encryption.

When you consider current breaches, such as the Connecticut Community Health Center breach reported earlier this year, where a single breach potentially exposed 1 million records, attackers can already exfiltrate vast amounts of data in just hours. Quantum computing will rapidly escalate these capabilities.

Already this year, the Office for Civil Rights (OCR) has launched investigations into almost 100 breaches. On top of that, ransomware attacks on healthcare grew in the last 30 days. There were at least 35 alleged attacks on healthcare between January 1 and mid-February, with a larger number of threat actors targeting the sector.

There has also been a wave of ransomware attacks on radiology businesses, sometimes causing practice closures.

Is the Perfect Storm Brewing?

Bad actors target healthcare because they know the sector has long-term, high-value data. Many organizations also lag in data governance and data protection.

Part of the struggle is that many healthcare organizations lack clear insight into all their assets and risks. They don’t clearly understand where all their data is, what that data is, or how the organization and its vendors use it. Sometimes, the sensitivity of that data isn’t even clear. For example, is it classified? Is it encrypted at transit and rest?

On top of that, the healthcare threat landscape constantly evolves. And through that, there are some emerging trends:

  • Increase in volume and complexities of supply chain and cloud attacks
  • Faster speed of intrusions
  • AI-assisted attacks

As previously mentioned, the sector is also plagued with legacy systems teams can’t easily upgrade or support with timely changes like encryption, operating system updates, patches, etc.

Resolving these issues is critical in meeting quantum computing risks that are ahead. All of these drive home the most critical point. Healthcare must stop threat actors from taking data today.

Preparing Critical Infrastructure for Post-Quantum Cryptography

So, what can you do now? Here are some best practices to shift your security and compliance practices in the right direction:

  • Stay informed on post-quantum cryptography.
  • Start planning now to protect your data today.
  • Implement effective data protection controls like governance, encryption, loss prevention, and data segmentation.
  • Review:
  • Educate your board, senior leaders, and stakeholders on what’s ahead and how much more challenging and far-reaching Q-Day may be.
  • Develop three- to five-year strategic plans to address post-quantum cryptography with the understanding that current encryption methods may become obsolete.
  • Prepare mitigation plans.
  • Upgrade your current environment where you can. This won’t be something you can address overnight. Start now to stay ahead of pressing quantum risks.
  • Take a deeper dive into encryption protocols. Talk with vendors that specialize in encryption. Assess your current and future state.

Understand that although there is a theoretical “Q” date, no one can predict exactly when it may happen. But, as soon as quantum computers have these capabilities, it will be a significant issue for everyone.  

If you don’t already have trusted data protection practices, now is the time to look at them and make them an organizational-wide priority. The longer you delay, the greater the gap widens. It will only get harder to get ahead of attackers — and they’re hoping you don’t.

Ultimately, if you can successfully prevent threat actors from extorting data today, you’ll be better prepared to prevent them from extorting you with that data in the future.

Act Now to Secure Your Quantum Future

Contact Clearwater today for expert guidance and proactive solutions tailored to safeguard your organization from the quantum threat and beyond.https://clearwatersecurity.com/contact/ 

 

 

 

 

 

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Related Blogs

Clinical Research Organizations: M&A Goldmine or Data Liability? Why Cybersecurity Must Be on Every Investor’s Radar

Clinical Research Organizations: M&A Goldmine or Data Liability? Why Cybersecurity Must Be on Every Investor’s Radar

The market for clinical trials is experiencing significant momentum in mergers and acquisitions (M&A). Private equity (PE) investment in Clinical Research Organizations (CROs) and Site Management Organizations (SMOs) is being spurred by site consolidation, expansion of specialized services, and technology innovation. These firms are important players in the pipeline of drug development and the best targets for investors who wish to capitalize on healthcare innovation.
8 Easy Ways to Prepare for an OCR HIPAA Compliance Audit

8 Easy Ways to Prepare for an OCR HIPAA Compliance Audit

The Office for Civil Rights (OCR) has officially launched its third round of HIPAA audits, following previous assessments in 2012 and 2016.  Learn 8 easy ways to prepare for an OCR HIPAA compliance audit and safeguard your health information against rising cyber threats. Past audits revealed widespread compliance gaps, prompting increased oversight.
OCR’s Proposed HIPAA Security Rule Notice of Proposed Rulemaking

OCR’s Proposed HIPAA Security Rule Notice of Proposed Rulemaking

In Part 1 of this blog, I provide an overview of OCR’s proposed changes to the HIPAA Security Rule, some commentary on the background, rationale and the potential impact on healthcare, descriptions of key changes in definitions, and OCR’s broader themes. In Part 2, I will dive into specific proposed new or updated standards and implementation specifications and speculate on what may happen next.

Connect
With Us


Let us know who referred you, if you went to an event, found us in search, or liked one of our LinkedIn posts.