AHIMA releases 17 steps to cybersecurity as attacks increase
In response to an ever-worsening cybersecurity environment in healthcare, with an increasing number of cyberattacks on hospitals, health systems and clinics, the American Health Information Management Association has issued new cybersecurity guidelines for healthcare professionals to reference as they seek ways to implement cybersecurity prevention measures.
These include actions that can be started immediately as well as comprehensive efforts that require more long-term commitments. The roadmap, tittled, AHIMA Guidelines: The Cybersecurity Plan, was primarily authored by Kathy Downing, vice president, information governance, informatics, privacy and security, at AHIMA, who has the apt Twitter handle @HIPAAQueen.
[Also: Precision med is about to have its breakout moment ]
“Information governance – the development of an organization-wide framework for managing information throughout its lifecycle and supporting the organization’s strategy, operations, regulatory, legal, risk and environmental requirements – is a critical organizational initiative that healthcare organizations must embrace in order to thrive in the environment of cyber threats and attacks in healthcare today,” Downing wrote.
“The cybersecurity plan is a part of the privacy and security competency and needs to address people, processes and technology," she added.
The new cybersecurity guidelines outline 17 steps to completing a successful cybersecurity plan. These steps include:
- Conduct a risk analysis of all applications and systems.
- Recognize record retention as a cybersecurity issue.
- Patch vulnerable systems.
- Deploy advanced security endpoint systems that provide more effective protections than standard antivirus tools.
- Encrypt workstations and laptops, smartphones and tablets, and portable media and backup tapes.
- Improve identity and access management.
- Refine web filtering (blocking bad traffic).
- Implement mobile device management (MDM).
- Develop incident response capability.
- Monitor audit logs to selected systems.
- Leverage existing security tools like intrusion prevention system/intrusion detection system (IPS/IDS) to detect unauthorized activities.
- Evaluate business associates.
- Improve tools and conduct an internal phishing campaign.
- Hire an outside security firm to conduct technical and non-technical evaluations.
- Prepare a “State of the Union” type presentation for an organization’s leaders on cybersecurity.
- Apply a “defense in depth” strategy.
- Detect and prevent intrusion.
"Review current access control protocols and tighten them up," AHIMA advises. "Another proactive step you can take is to conduct an evaluation or assessment of current security policies. If they have not been updated or modified to account for risks of hacking, this is an action item that should be undertaken."
Twitter: @SiwickiHealthIT
Email the writer: bill.siwicki@himssmedia.com