Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/26/2011
11:09 AM
50%
50%

Federal ID Strategy To Boost Health Data Security

Voluntary plan which seeks two-factor authentication and for online identity management should find wide application in healthcare.

Slideshow: RFID In Healthcare
Slideshow: RFID In Healthcare
(click image for larger view and for full slideshow)
A federal plan to involve the private sector in beefing up online identity management and user authentication, while also making it easier for individuals to manage passwords, should find plenty of applications in healthcare--which is exactly what the Obama administration envisions.

The National Strategy for Trusted Identities in Cyberspace, a roadmap released earlier this month for protecting consumers from fraud and identity theft, calls for the voluntary building of an "identity ecosystem" in which consumers can have a single, user-specific credential to log into any participating website. This, according to federal officials, will allow security-conscious sectors, including healthcare and finance, to make new online services available.

"[I]ndividuals and businesses need to be able to check each other's identity for certain types of sensitive transactions, such as online banking or accessing electronic health records," the 52-page document reads. Among other things, the strategy calls for wider adoption of two-factor authentication and unique security credentials for each user.

This is exactly the sort of thing healthcare needs, according to Hussam Mahgoub, senior VP for corporate development and research--and resident security specialist--at Diversinet, creator of a secure platform for developing mobile healthcare applications. "There's a lot of confusion in the marketplace about security and privacy," Mahgoub said.

Of particular worry, according to Mahgoub, is that the Health Insurance Portability and Accountability Act's (HIPAA) privacy and security regulations don't address "strong authentication" for users when they access protected health information (PHI).

Diversinet, which is based in Toronto but does most of its business in the United States, recently published a white paper listing nine best practices for securing health data on mobile networks and devices, that in many ways dovetails with the federal strategy. Diversinet recommends installing apps on smartphones, tablets, and laptops to turn each device into a kind of "wallet" for PHI. Sensitive data should be encrypted and the app should be able to deactivate or delete PHI from lost or stolen devices, just as banks and retailers can deactivate lost credit cards, Mahgoub explained.

Jeff Sponaugle, chief security and technology officer for Beaverton, Ore. healthcare connectivity company Kryptiq, sees at least one recent change in healthcare that needs this kind of approach. Interim Drug Enforcement Agency (DEA) regulations that took effect in June 2010 allow the electronic prescribing of certain controlled substances such as narcotics, but only with enough security in place to satisfy the law enforcement community, which has a lot more pull with the DEA than does the health IT industry.

"With electronic prescribing of controlled substances, two-factor authentication will be coming to the desktop of physicians and staff," Sponaugle said in an email. "The requirements for [electronic prescriptions for controlled substances] are very clear and do provide a 'need' for the physician to get some kind of digital ID."

Sponaugle noted, however, that two-factor authentication and other "strong" forms of digital security have been around for years, but often place too high of a burden on users to encourage widespread adoption. Resistance may rise when the users happen to be time-crunched and technologically challenged physicians.

"The key for promoting two-factor is to make it integrated into the application the doctor uses most," reported Sponaugle, who said that Kryptiq tries whenever possible to integrate its platform for secure messaging and e-prescribing into other companies' electronic medical records (EMRs). "As the EMRs add front-facing, two-factor workflows, we will use that same infrastructure for messaging. It would be a disaster if you made a doctor use a different two-factor system for the EMR, and yet another different system for messaging or prescribing," Sponaugle said.

"In the end, the goal of the second factor is to provide some protection from the key problem in security, which is people. People choose poor passwords, reuse them, tell them to people, log in from a kiosk in a coffee shop with a key logger, etc.," Sponaugle added. "Coming up with good workflow usability of the two factors is what will make it succeed."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13991
PUBLISHED: 2020-09-24
vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.
CVE-2020-15160
PUBLISHED: 2020-09-24
PrestaShop from version 1.7.5.0 and before version 1.7.6.8 is vulnerable to a blind SQL Injection attack in the Catalog Product edition page with location parameter. The problem is fixed in 1.7.6.8
CVE-2020-15162
PUBLISHED: 2020-09-24
In PrestaShop from version 1.5.0.0 and before version 1.7.6.8, users are allowed to send compromised files. These attachments allowed people to input malicious JavaScript which triggered an XSS payload. The problem is fixed in version 1.7.6.8.
CVE-2020-15843
PUBLISHED: 2020-09-24
ActFax Version 7.10 Build 0335 (2020-05-25) is susceptible to a privilege escalation vulnerability due to insecure folder permissions on %PROGRAMFILES%\ActiveFax\Client\, %PROGRAMFILES%\ActiveFax\Install\ and %PROGRAMFILES%\ActiveFax\Terminal\. The folder permissions allow "Full Control" t...
CVE-2020-17365
PUBLISHED: 2020-09-24
Improper directory permissions in the Hotspot Shield VPN client software for Windows 10.3.0 and earlier may allow an authorized user to potentially enable escalation of privilege via local access. The vulnerability allows a local user to corrupt system files: a local user can create a specially craf...