1. Home
  2. |Insights
  3. |Task Force Report Hopes to Galvanize Cybersecurity Efforts in the Health Care Industry

Task Force Report Hopes to Galvanize Cybersecurity Efforts in the Health Care Industry

Client Alert | 5 min read | 06.28.17

In early June, the Health Care Industry Cybersecurity Task Force issued its final report to Congress titled Report on Improving Cybersecurity in the Health Care Industry. The long-anticipated report describes the task force’s findings regarding health care cybersecurity, which it describes as a “key public health concern that needs immediate and aggressive attention.” The report outlines six imperatives to bolster cybersecurity in the health care industry, citing the lack of security talent and the rampant use of legacy technologies as two of the top cybersecurity issues in the industry. According to the report, achieving these imperatives will require action from both the government and industry stakeholders. Given recent high-profile incidents affecting the health care industry, we strongly advise health care clients to review their cybersecurity practices and align them with those recommended in the report where practicable.

The Task Force

The task force was formed to identify and make recommendations regarding challenges in the health care industry in securing and protecting itself against cybersecurity incidents. The task force is composed of various government and private stakeholders ranging from device manufacturers to hospitals, including the Chief Information Security Officer of the Centers for Medicare and Medicaid Services. Established in accordance with the Cybersecurity Act of 2015, the task force has been directed to:

  • Analyze how other industries have implemented strategies and safeguards to address cybersecurity threats.
  • Analyze challenges and barriers private entities in the health care industry face securing themselves against cyberattacks.
  • Review challenges that covered entities and business associates face in securing networked medical devices and other software or systems that connect to an electronic health record.
  • Provide the Secretary of HHS with information to disseminate to the health care industry for purposes of improving their preparedness for, and response to, cybersecurity threats.
  • Establish a plan for creating a single system so that the federal government and health care industry stakeholders may share actionable cyber threat indicators and defensive measures in real time.
  • Report to Congress on the findings and recommendations of the task force.

The Issues

According to the report, the health care industry suffered more breaches stemming from cyberattacks than any other industry in 2015. Cybersecurity has been particularly challenging in the health care industry for a myriad of reasons. For one, as described in the report, availability of information is paramount to support the primary mission of health care – patient treatment – but allowing easy, prompt access to patient information may come at the expense of security measures implemented throughout other industries. Implementing security measures that slow down access, such as dual-factor authentication, means lost time that could be spent treating patients, according to the report. This, the report explained, may lead to health care facilities with workstations left unattended, virtually unfettered physical access to workstations, and passwords written down on paper.

The dearth of resources is another major reason for the cybersecurity problem in health care. A large portion of the health care industry consists of small- and medium-sized organizations with limited or non-existent funding and staffing devoted to cybersecurity. Such organizations do not have the resources to address cybersecurity threats, and many such organizations may not even know that they have experienced an attack until long after it has occurred. Larger organizations suffer from insufficient staffing as well, as noted in the report. The larger the organization, the more security staffing is needed to protect the larger attack surface area. In particular, affiliate sites of larger organizations often lack sufficient IT resources. According to the report, there is also a “multiplicity of actors” in health care cybersecurity, each with its own rules, creating a “significant legal and technical burden on health care organizations” when instead there should be a “single source for industry to go for authoritative clarification, explanation, and guidance.”

Although many health care workers assume that their level of cybersecurity vulnerability is low, recent high-profile incidents have demonstrated this to be false. For example, the WannaCry ransomware attack in May put a bright spotlight on the susceptibility of health care organizations across the globe to cyberattacks and especially highlighted the shortcomings of legacy systems, which unfortunately are still prevalent in the U.S. health care industry. Such vulnerabilities can dramatically interrupt patient care and therefore need to be a higher priority for the health care industry. The task force expressed its goal that the report galvanizes both the public and private sectors to comprehensively address cybersecurity challenges in order to protect patients.

Imperatives and Recommendations

The report outlines six overarching imperatives that the task force believes must be achieved to improve security in the health care industry:

  • Define and streamline leadership, governance, and expectations for health care industry cybersecurity.
  • Increase the security and resilience of medical devices and health IT.
  • Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities.
  • Increase health care industry readiness through improved cybersecurity awareness and education.
  • Identify mechanisms to protect R&D efforts and intellectual property from attacks or exposure.
  • Improve information sharing of industry threats, risks, and mitigations.

The report is incredibly comprehensive and includes over 100 recommendations and action items to address the six aforementioned imperatives. These recommendations target a variety of entities, including the federal government, regulatory and legislative entities, health care industry stakeholders, and public-private partnerships. While some recommendations apply only to certain health care subsectors, others have value for the entire industry. Some notable recommendations include the following:

  • HHS should create a centralized position within the agency to coordinate health care cybersecurity efforts.
  • Together, HHS and NIST should establish a health care-specific version of the NIST Cybersecurity Framework.
  • Congress should scale back constraints imposed by the Stark Law, Anti-Kickback Statute, and other fraud and abuse laws that discourage larger health care organizations from assisting physicians in acquiring cybersecurity resources.
  • Legacy systems should be phased out.
  • The FDA and other stakeholders should encourage security and privacy by design in medical devices.
  • Stakeholders should strengthen their authentication controls for health care workers, patients, medical devices, and electronic health records.
  • The industry should make more concerted efforts to develop and support the cybersecurity postures of smaller and under-funded entities.

The report contains valuable observations on the state of health care cybersecurity. Many of the report’s recommendations have been well-received, especially the recommendations to develop a health care-specific cybersecurity framework, encourage greater threat information sharing, and address the shortage of cybersecurity professionals. As the industry trends towards more interoperability, the frequency and impact of cyberattacks will only grow. Thus, we advise our health care clients to review the report and consider implementing its recommendations.  More importantly, health care cybersecurity incidents are likely to increase. We recommend that health care entities review their cybersecurity policies and practices, and make improvements in light of recent cybersecurity incidents and guidance from government.

Insights

Client Alert | 6 min read | 03.26.24

California Office of Health Care Affordability Notice Requirement for Material Change Transactions Closing on or After April 1, 2024

Starting next week, on April 1st, health care entities in California closing “material change transactions” will be required to notify California’s new Office of Health Care Affordability (“OHCA”) and potentially undergo an extensive review process prior to closing. The new review process will impact a broad range of providers, payers, delivery systems, and pharmacy benefit managers with either a current California footprint or a plan to expand into the California market. While health care service plans in California are already subject to an extensive transaction approval process by the Department of Managed Health Care, other health care entities in California have not been required to file notices of transactions historically, and so the notice requirement will have a significant impact on how health care entities need to structure and close deals in California, and the timing on which closing is permitted to occur....