News | Cybersecurity | August 20, 2019

New Report Examines Hospital Cybersecurity Challenges in Georgia

Report summarizes cybersecurity challenges faced by CIOs across the state, highlights recommended actions to protect patient data

New Report Examines Hospital Cybersecurity Challenges in Georgia

August 20, 2019 — Healthcare data breaches are currently being reported at a rate of more than one a day, according to a new report from the nonprofit Institute for Healthcare IT (IHIT). And for those who think it can’t happen to them, the odds are not in their favor. Breaches reported between 2009 and 2018 have resulted in the theft or exposure of almost 190 million healthcare records, a number equal to 59 percent of the U.S. population, according to the HIPAA Journal.

A breach can be problematic for large hospitals with the resources and budget to survive a cyberattack, but it can absolutely devastate a smaller facility, and with it, the surrounding community. That thought started keeping Georgia Sen. Bruce Thompson awake at night a few years ago. He was the impetus behind a grassroots initiative that brought together hospital chief information officers (CIOs) statewide to research and discuss the magnitude of the problem along with measures to support cybersecurity. The efforts of Thompson and the hospital CIOs have been summarized in the new IHIT report, titled “The State of Cybersecurity Among Georgia Hospitals.”

“I learned that a fifth of the nation’s rural hospitals are near insolvency and at a high risk of closing, according to a recent Navigant analysis,” Thompson said. “If you want to watch a rural community die, kill its hospital. After Lower Oconee Community Hospital (Glenwood, Ga.) shut down in 2014, other mainstays of the community followed. The bank and the pharmacy shuttered, and the only grocery store in the county closed. On Main Street, building after building closed or fell into disrepair.”

Hospitals have become a popular target among hackers because the electronic healthcare record (EHR) is worth more than any other data on the black market. Medical records could be worth $1,000 each while social security numbers are just 10 cents and credit card numbers are worth 25 cents.

Beginning in October 2017 and continuing through 2019, Georgia hospital CIOs gathered to explore the issues and determine ways they could work together to make a difference. These meetings included hospital CIOs from across the state, with regional working groups pulling together small groups to discuss specific challenges and exchange ideas on ways to solve them.

Among the top issues were: 

  • Preventing phishing attacks; 
  • Maintaining legacy technology that was not built to withstand the sophistication and volume of today’s cybersecurity attackers; 
  • Managing the increasing number of third-party systems that require access to patient health information; 
  • Grappling with the shortage of IT security talent, especially in rural markets; and
  • Overestimating the protection afforded by cybersecurity insurance policies.

The IHIT report summarizes recommendations from the CIOs around two primary initiatives:  establish a healthcare-specific resource center offering Georgia hospitals and healthcare providers access to the most current cybersecurity tools and information; and establish regional online networks for IT Safe Zones where providers can confidentially share threat and incident response insights.

At the heart of the IHIT recommendations is the need to immediately mobilize both executive branch and legislative resources to prepare for the next cyberattack before it sinks a community hospital, and its community.

Calvin Rhodes, the CIO of the State of Georgia, has embraced the IHIT findings and is working with the hospital CIOs to identify ways to offer support. “We saw a real need to extend the cyber academy training developed for state employees to cities and counties in Georgia, and we want to encourage hospital participation as well. Georgia’s new state-of-the-art Cyber Center is serving companies ranging in size from start-ups to the Fortune 500.”

The state is also offering organizations access to a service that provides a seasoned information security officer who will work with an organization one or more days a week with a one-year commitment. “We’re looking to other states for best practices as well,” said Rhodes. “One item that a couple other states often speak to is the benefits of the formation of a volunteer cyber event response task force; in those states it required legislation that provides liability protection for not only the volunteers but also the companies that employ the volunteers.”

For more information: www.instituteforhealthcareit.org

Related Cybersecurity Content

VIDEO: Preventing Medical Imaging Cyberattacks

How to Protect Health Data With Security Testing Automation

FDA and DHS Expand Partnership on Medical Device Cybersecurity

Related Content

New Report Reveals Vulnerabilities of Internet of Things-enabled Healthcare Devices
News | Cybersecurity | August 29, 2019
Use of the Internet of Things (IoT) is booming, with IHS Markit forecasting there will be 73 billion connected devices ...
According to the National Association of County and City Health Officials, only 33 percent of the organizations plan against cybersecurity threats and initiate patient identity protection protocols.

According to the National Association of County and City Health Officials, only 33 percent of the organizations plan against cybersecurity threats and initiate patient identity protection protocols. 

Feature | Cybersecurity | May 06, 2019 | Maxim Chernyak
As the...
FDA and DHS Expand Partnership on Medical Device Cybersecurity
News | Cybersecurity | October 30, 2018
The U.S. Food and Drug Administration (FDA) and the U.S. Department of Homeland Security (DHS) will be implementing a...
Medtronic is issuing a software update to address a safety risk caused by cybersecurity vulnerabilities associated with the internet connection between the Carelink 2090 and Carelink Encore 29901 programmers used to download software from the Medtronic software distribution network (SDN) . This update is a voluntary recall correction by the manufacturer to address the safety risk caused by the cybersecurity vulnerability.

Medtronic is issuing a software update to address a safety risk caused by cybersecurity vulnerabilities associated with the internet connection between the Carelink 2090 and Carelink Encore 29901 implantable EP device programmers.

Feature | Cybersecurity | October 17, 2018
October 17, 2018 — The U.S.
Philips Warns of Cybersecurity Vulnerabilities in IntelliSpace and iSite PACS Products
News | Cybersecurity | April 16, 2018 | Jeff Zagoudis, Associate Editor
Philips Healthcare last week issued a proactive advisory warning to its iSite and IntelliSpace picture archiving and...
Can Your Cardiac Device Be Hacked?
News | Cybersecurity | February 27, 2018
Medical devices, including cardiovascular implantable electronic devices, could be at risk for hacking. In a paper...
MDISS Launches 'WHISTL' Network of Medical Device Security Testing Labs
News | Cybersecurity | August 23, 2017
The Medical Device Innovation, Safety and Security Consortium (MDISS) recently launched the first of more than a dozen...
HHS Unveils Improved Web Tool to Highlight Recent Health Information Breaches
News | Cybersecurity | August 21, 2017
The U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) recently launched a revised web...
Overlay Init