Healthcare entities must be proactive about protecting sensitive data across their organization.
Remote access makes doing business extremely convenient. However, it’s critical to understand that with this ease, comes vulnerability. Insecure remote access is the number one attack pathway used by hackers today – don’t let your organization become the next victim.
Remote access technology is an incredibly valuable business tool – as long as there is an Internet connection, it allows workforce members to easily access the office network from anywhere.
See also: Is Working From Home HIPAA Compliant?
However, insecure remote access gives hackers a pathway to compromise organization networks and gain access to medical records.
Remember Target’s massive data compromise in 2013? It is believed that the incident began when a hacker gained access to one of Target’s systems via a remote access account belonging to an HVAC company. Hackers were able to use that access to gain a foothold on an internal system and then leapfrog to other systems inside the retailer’s network. The breach resulted in the theft of data on 40 million consumer credit and debit cards, and affected over 70 million.
Recent attack trends show that cyber thieves have been shifting focus to healthcare due to the lucrative nature of patient health information on the black market.
According to a 2015 Ponemon Institute study, medical identify theft incidents increased 21.7 percent since 2014.
Many healthcare organizations open up their networks to vendors, partners, suppliers, and other business associates to streamline processes and enable better service and support. Few implement processes governing third-party access.
See also: SecurityMetrics HIPAA Guide
It’s no coincidence that the exploitation of improperly configured remote management tools is the plan of attack most frequently used by hackers. If not properly secured, remote access puts organizations at a severe security disadvantage by allowing attackers to bypass the firewall and most other system security measures and remotely gain access to the POS or other systems in the payment environment. It’s simply that easy for hackers, especially because while there tend to be rules in place for employees using remote access, the same rules are not always applied to external parties.
See also: Remote Access: The Culprit Behind POS Malware
According to preliminary SecurityMetrics forensics investigation data of breached organizations during 2014, insecure remote access played a role in 93% of cases.
While IT may be able to manage security on one end with remote access, there is no guarantee of security on the remote user’s side. In the majority of recent hacking cases, specific businesses weren’t necessarily targeted, rather, the hackers likely scanned the Internet for vulnerable remote access systems first, and then attempted to compromise them.
By utilizing easily accessible scanning tools, the attacker can simultaneously scan multiple computers, routers, servers and websites, searching for specific data (like if the organization uses remote access).
It's critical to look at how to effectively govern company use of remote access technologies. When implemented and managed properly, remote access can be secure. Here are a number of best practices recommended to protect your organization against hackers:
See also: Current Hacking Trends: Remote Access
In our ‘always-on’ era, where work is conducted from the road via smartphone or at an offsite meeting on a tablet, it’s a safe assumption to say remote access is here to stay. Integrated biometrics (fingerprints, palm prints, facial characteristics) will likely help securely authenticate a person’s identity in the future, but in the meantime, healthcare has work to do.
To reduce opportunities for hackers to succeed, healthcare entities must be proactive about protecting sensitive data across their organization. Security must be an ongoing practice – a top priority that resides at the heart of business operations and data management.
See also: How Healthcare Security Complacency is Killing Your Organization