Security

How should HIPAA covered entities respond to healthcare ransomware?

The Health and Human Services Department’s Office of Civil Rights ruled that ransomware attacks are HIPAA breaches…

“;
}
});

/**
* remove unnecessary class from ul
*/
$(“#inlineregform”).find( “ul” ).removeClass(“default-list”);

/**
* Replace “errorMessageInput” class with “sign-up-error-msg” class
*/
function renameErrorMsgClass() {
$(“.errorMessageInput”).each(function() {
if ($(this).hasClass(“hidden”)) {
$(this).removeClass(“errorMessageInput hidden”).addClass(“sign-up-error-msg hidden”);
} else {
$(this).removeClass(“errorMessageInput”).addClass(“sign-up-error-msg”);
}
});
}

/**
* when validation function is called, replace “errorMessageInput” with “sign-up-error-msg”
* before return
*/
function validateThis(v, form) {
var validateReturn = urValidation.validate(v, form);
renameErrorMsgClass();
return validateReturn;
}

/**
* DoC pop-up window js – included in moScripts.js which is not included in responsive page
*/
$(“#inlineRegistration”).on(“click”,”a.consentWindow”, function(e) {
window.open(this.href, “Consent”, “width=500,height=600,scrollbars=1”);
e.preventDefault();
});

and released a new guidance about how healthcare organizations should handle ransomware attacks under the HIPAA regulations. What’s included in this guidance? How should organizations respond to healthcare ransomware to maintain compliance?

Ransomware poses an increasingly dangerous threat to enterprise security. In the first half of 2016, organizations experienced 4,000 ransomware attacks per day, a 300% increase from 2015. These attacks often target healthcare organizations responsible for electronic protected health information (ePHI), prompting the Department of Health and Human Services to release a guidance on the topic.

The guidance starts by describing the threat of healthcare ransomware: attackers encrypt the data belonging to an organization using a secret encryption key and then use that secret key as leverage to demand ransom from the organization. Unless the organization pays the ransom, it is unable to gain access to its own information. In the case of healthcare records, this can have disastrous consequences for patient safety.

Covered entities and their business associates that comply with HIPAA may find themselves well-situated to prevent healthcare ransomware infections, as well as other malware attacks. These organizations already follow practical security measures, including conducting risk assessments, putting strong security procedures in place, training staff and limiting access to ePHI on a need-to-know basis.

When a HIPAA-compliant organization suffers a ransomware infection, it is often better prepared to recover than other entities. For example, HIPAA requires that healthcare providers have a solid disaster recovery plan that includes backing up important health records. If an organization falls victim to a healthcare ransomware infection, these backups can provide an authoritative source of the original data without paying the ransom.

Ask the Expert:
Got a vexing problem for Mike Chapple or any of our other experts? Ask your enterprise-specific questions today. (All questions are anonymous.)

Next Steps

Check out this handbook on how to prevent ransomware or recover from a ransomware attack

Learn how to prevent and respond to healthcare ransomware infections

Find out how the pros battle ransomware in healthcare


Dig Deeper on Malware, Viruses, Trojans and Spyware

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever’s puzzling you.





Source link

Tags

About the author

GG

Add Comment

Click here to post a comment

Your email address will not be published. Required fields are marked *