Risk
11/14/2011
11:22 AM
50%
50%

Encryption Security Lags In Healthcare?

Tech leaders warn policymakers that even as more electronic health records flood health IT systems, more encryption is needed.

Healthcare and IT experts convened on Capitol Hill last week to warn Congress that as healthcare organizations are increasing the use of electronic health records in light of federal mandates, they are not protecting these records within the database and elsewhere. Security professionals agree that in order for the public to trust these records, healthcare organizations need to start working on database security best practices--the same first-order practices that any organization with minimal security should start with to shore up sensitive data stores.

"Simply stated, the effort to promote widespread adoption and use of health IT to improve individual and population health will fail if the public does not trust it," said Deven McGraw, director of the Health Privacy Project for the Center for Democracy, in testimony to the Senate Committee on the Judiciary Subcommittee on Privacy, Technology, and the Law (PDF), Nov. 9.

According to McGraw, even with certain safe harbor incentives in place for organizations to be exempt from costly breach notifications if exposed data is encrypted, statistics show that healthcare organizations are still not encrypting their data.

"The new breach notification provisions of HITECH provide an incentive for healthcare providers to encrypt health information using standards approved by the National Institute of Standards and Technology (NIST)," he said. "But we know from the statistics on breaches that have occurred since the notification provisions went into effect in 2009 that the healthcare industry appears to be rarely encrypting data."

Todd Thiemann, senior director of product marketing at encryption vendor Vormetric, said his experiences corroborate what McGraw's seen.

"From what we've seen, you have a lot of data out there that government programs are tempting healthcare organizations to turn into electronic records from paper records, and a lot of institutions are still grappling with how to secure that stuff," he says. "The push for electronic medical records is this new wave crashing on the shore that they're dealing with."

As McGraw explained in his testimony, there has been no comprehensive study of why healthcare hasn't embraced encryption, but Thiemann has his hunches.

Read the rest of this article on Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Lisa Henderson
50%
50%
Lisa Henderson,
User Rank: Apprentice
11/15/2011 | 12:00:43 AM
re: Encryption Security Lags In Healthcare?
So the perception that most consumers have about not trusting health records that are stored electroncially is actually a truism? That healthcare organizations lag other industries in regard to security issues.

I agree with McGraw. Widespread adoption of healthcare IT to improve public health won't happen if people don't trust it and therefore don't use it. It doesn't matter how much money the government throws at it.

Lisa Henderson, InformationWeek Healthcare, contributing editor
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.