You have 4 free post views remaining. Please consider logging in.

What does Mike Tyson have to do with healthcare?






What does Mike Tyson have to do with healthcare?



View this email in your browser

37% of healthcare organizations did not have a cyberattack contingency plan in place, despite half having experienced a prior attack. This is despite the well-known fact that cyberattacks and data breaches in healthcare are rising.

Our takeaway: no matter the number and severity of warnings, absent a dramatic shift in both political and legal thinking, attacks will escalate exponentially until real life consequences for inaction occur.

After all, it’s easy to play Russian Roulette when you know the gun that you’re pointing at your head isn’t loaded!

Or put in a more direct way. Everyone who fought Mike Tyson 30+ years ago in his prime was fearless until a devastating left hook clocked him on the jaw or body!

About half of healthcare organizations that experienced a ransomware attack said the breach impacted patient data and 34% said they failed to recover the data after the attack, and more than a quarter of ransomware attacks impacted patient care.

Cyberattacks result in costly downtime, and delay critical procedures, yet only 63% of companies report having a cybersecurity response plan in place.

Over 30% of healthcare organizations experienced a cyberattack in the last three years while over the past five years, there has been a 256% increase in large breaches reported to the HHS Office for Civil Rights involving hacking. 

WHY?

Healthcare holds a disproportionate amount of sensitive data compared to other industries, the vast majority of which is digital. Yet many healthcare operators have failed to adequately encrypt this data at rest or in transit as we have reported previously, making the industry a lucrative target for hackers.

Experts have articulated that health systems MUST do more to prepare for cyberattacks, like conducting risk analyses.  As noted above 37% of healthcare organizations did not have a cyberattack contingency plan in place, despite half of organizations having experienced an attack.

Hackers have learned that they can get patient data by targeting the many third-party technology vendors that work with health systems.  That is why healthcare has become a much bigger target in ransomware. Email is the weakest link, and the bad guys figured out that they are better off going in through third party vendors like SolarWinds or Exchange which is why we are seeing more threat actors using vendors to get a foothold in your network.

This is why Change Healthcare, which handles patient records for 1 in 3 Americans was targeted. Andrew Witty, CEO of Change parent company UnitedHealth Group, confirmed the company paid a $22 million ransom to the hackers.

In healthcare, over a third of data breaches come through third-party vendors, more than in any other industry and are one of the biggest risks we see.

Couple this with another fact: 55% of medical practices allowed employees more access to data than necessary.

WHY?

Surely, they must be aware that human error results contribute disproportionately to these targeted and malicious attacks.

Many of the organizations that fall victim to ransomware could have avoided the attack by employing basic hygiene. Often the attacks leverage a vulnerability that could have been mitigated prior to the attack. Patch and vulnerability management practices should be employed across the organization and serve as core components in any cybersecurity program.

The increase in breaches has garnered attention from federal regulators and lawmakers and this year has resulted in the HHS releasing voluntary cybersecurity goals for the sector and is looking to propose enforceable standards.

Yet, despite a bi-partisan Congressional Committee we have seen no meaningful action.
It is obvious that we need regulation and policies BUT we also need a federally mandated ecosystem to assist with and standards for the cleanup and restoration activities after such an event.

We as patients deserve better!

The Biden administration plans to introduce cybersecurity requirements for hospitals. Hospitals that don’t comply could lose up to 100% of their yearly CMS payment increase and face extra penalties of up to 1% of their base payments, according to one proposal.

If HHS truly wants enforcement, we propose making these goals mandatory!

WE will continue to monitor and update you on Congressional activity, the White House proposals, and our legal environment including the varying Circuit Courts differing views on Article 3 standing.

Don’t miss out on these informative topics – check out our podcasts and newsletters now!  

Richard Freiberg
Profitability Consultant
Richard Freiberg CPA PC
Phone (980)339-3352
Cell (914)393-0033
www.rmfreibergcpa.com
LinkedIn
to subscribe to Cyber Insights Today
to subscribe to LinkedIn Newsletter Cyber Security

Providing valuable counsel to help boost your company’s bottom line, while navigating competitive forces, industry, and economic risks in today’s challenging environment
 
 

Twitter

Facebook

Website

Copyright © 2024 Richard Freiberg CPA PC, All rights reserved.

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.

Email Marketing Powered by Mailchimp


cyberinsights
Author:

Comments from the Peanut Gallery

1 thought on “What does Mike Tyson have to do with healthcare?”

  1. In shadows of the past,
    fears unheeded, whispers grow.
    Stargazing hopes dimmed by threats,
    herbs tend gentle, but hearts must know.
    Guardians of care, rise and shine.

Leave a Comment

Categories

Recent Articles

Scroll to Top

Our goal is to help people in the best way possible. this is a basic principle in every case and cause for success. contact us today for a free consultation. 

Practice Areas

Newsletter

Sign up to our newsletter