HIPAA Risk Analysis Tip – #WannaStopCrying

Unless you’ve just returned from a 10-day interplanetary space mission, you’ve heard about the weaponization of ransomware into a Weapon of Mass Effect (WME) starting last Friday, May 12th. Organizations worldwide are in chaos trying to protect their systems while remaining operational. It seems that a group called the Shadow Brokers stole and released a suite of Equation Group attack tools purportedly designed by an in-house hacking team for NSA.  In these tools was a malware called DoublePulsar designed to exploit older versions of Windows. The Shadow Brokers are believed to be tied to the North Korean government.

While Microsoft prioritized the development of patches for vulnerabilities targeted by DoublePulsar (perhaps having been tipped off by NSA), many organizations apparently did not install them leaving machines still running Windows XP, Windows Vista, or Windows Server 2003 susceptible to an attack.  Now those organizations are scrambling to find and implement those patches.

What follows are short game and long game prescriptions.  Yes, we need to ultimately establish, implement and mature an information risk management program.  AND, yes, we must deal with the day-to-day discovery of new threats and vulnerabilities.

Short Game Plan for #WannaStopCrying:

  1. Don’t Block the Domain: By registering the malware’s unregistered domain name, a British security researcher unknowingly led all new infections of the ransomware to kill themselves. So at this point, Britain’s National Cyber Security Center (NCSC) recommends not to block that domain as it is to be used to resolve at the point of compromise.
  2. Patch Systems – Install MS17-010 issued by Microsoft in March; install Microsoft’s “one-off security fixes for operating systems no longer supported: Windows XP, Windows Server 2003 and Windows8 and/or other guidance issued by Microsoft.
  3. Until the security patch is applied, disable the Server Message Block v1 (SMB) on all computers.
  4. Upgrade all computers to Windows 10 along with the Windows Defender Antivirus which can detect this malware.
  5. Maintain daily or more frequent offline / offiste backups of critical data, including application, databases, mail systems and users files. Test backups regularly for data restoration.
  6. Keep informed by accessing:
    1. NIST Computer Security Resource Center – encouraging the sharing of information security tools and practices
    2. FBI Cyber Security Terrorism – addressing evolving threats
  7. Ensure antivirus signatures are up to date as vendors are working to deliver updated signatures to detect/prevent a reoccurence.
  8. Retrain employees and other workforce members on social engineering, phishing and spoofing methods and ramifications. Test the results frequently.
  9. Check on this process with your Business Associates. Require attestations of the steps they have undertaken to protect your information.

But then what? what’s next #WannaSpy? #WannaDie? #WannaLie?  How and when will you be ready?

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Related Blogs

Clinical Research Organizations: M&A Goldmine or Data Liability? Why Cybersecurity Must Be on Every Investor’s Radar

Clinical Research Organizations: M&A Goldmine or Data Liability? Why Cybersecurity Must Be on Every Investor’s Radar

The market for clinical trials is experiencing significant momentum in mergers and acquisitions (M&A). Private equity (PE) investment in Clinical Research Organizations (CROs) and Site Management Organizations (SMOs) is being spurred by site consolidation, expansion of specialized services, and technology innovation. These firms are important players in the pipeline of drug development and the best targets for investors who wish to capitalize on healthcare innovation.
8 Easy Ways to Prepare for an OCR HIPAA Compliance Audit

8 Easy Ways to Prepare for an OCR HIPAA Compliance Audit

The Office for Civil Rights (OCR) has officially launched its third round of HIPAA audits, following previous assessments in 2012 and 2016.  Learn 8 easy ways to prepare for an OCR HIPAA compliance audit and safeguard your health information against rising cyber threats. Past audits revealed widespread compliance gaps, prompting increased oversight.
OCR’s Proposed HIPAA Security Rule Notice of Proposed Rulemaking

OCR’s Proposed HIPAA Security Rule Notice of Proposed Rulemaking

In Part 1 of this blog, I provide an overview of OCR’s proposed changes to the HIPAA Security Rule, some commentary on the background, rationale and the potential impact on healthcare, descriptions of key changes in definitions, and OCR’s broader themes. In Part 2, I will dive into specific proposed new or updated standards and implementation specifications and speculate on what may happen next.

Connect
With Us


Let us know who referred you, if you went to an event, found us in search, or liked one of our LinkedIn posts.