Health Industry Cybersecurity Practices and Videos
“Cybersecurity for the Clinician” Video Training Series
The “Cybersecurity for the Clinician” video training series totaling 47 minutes among eight videos explains in easy, non-technical language what clinicians and students in the medical profession need to understand about how cyber attacks can affect clinical operations and patient safety, and how to do your part to help keep healthcare data, systems and patients safe from cyber threats.
The series is good for one CME/CEU credit hour. Using these training videos also may satisfy documentation requirements of the CMS Emergency Preparedness Rule, the National Fire Protection Association and The Joint Commission for facility Hazard Vulnerability Analysis and Risk Analysis and Training.
About this Video Series
Technical Volume 1:
Cybersecurity Practices for Small Health Care Organizations
#1 – Introduction and Email Protection Systems
Most small practices leverage outsourced third-party e-mail providers, rather than establishing a dedicated internal e-mail infrastructure. The e-mail protection practices in this section are presented in three parts:
- E-mail system configuration: the components and capabilities that should be included within your e-mail system
- Education: how to increase staff understanding and awareness of ways to protect your organization against e-mail–based cyberattacks such as phishing and ransomware
- Phishing simulations: ways to provide staff with training on and awareness of phishing e-mails
#2 – Endpoint Protection Systems
A small organization’s endpoints must all be protected. But what are endpoints? And, what can a small healthcare organization do to protect their endpoints?
David Willis, MD and Kendra Siler, PhD with the Population Health Information Analysis and Sharing Organization at the Kennedy Space Center are here to discuss what you should be doing to reduce the chances of a cyber attack penetrating your endpoints.
#3 – Access Management
In this section, we will be discussing Cybersecurity Practice Area Number 3 – Access Management for small healthcare organizations.
This discussion will be organized into three sections:
- What is access management?
- Why is it important?
- How can HICP or “hiccup” help improve access management for small healthcare organizations?
#4 – Data Protection and Loss Prevention
The National Institute of Standards and Technology, or NIST for short, defines a data breach as “an incident that involves sensitive, protected, or confidential information being copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.”
Sensitive, protected, or confidential data includes Protected Health information (PHI), credit card numbers, customer and employee personal information, and your organization’s intellectual property and trade secrets.
#5 – Asset Management
#6 – Network Management
Networks provide the connectivity that allows workstations, medical devices, and other applications and infrastructure to communicate. Networks can take the form of wired or wireless connections. Regardless of the form, the same mechanism that fosters communication can be used to launch or propagate a cyber-attack.
Proper cybersecurity hygiene ensures that networks are secure and that all networked devices can access networks safely and securely. Even if network management is provided by a third-party vendor, organizations should understand key aspects of proper network management and ensure that they are included in contracts for these services.
#7 – Vulnerability Management
#8 – Incident Response
#9 – Medical Device Security
#10 – Cybersecurity Policies
Every hospital C-Suite executive needs to support a good cybersecurity program, which includes training clinical staff on the basics,” said Mark Jarrett, Chairman of the Healthcare and Public Health Sector Coordinating Council (HSCC). Dr. Jarrett, who is also the former Chief Quality Officer and Deputy Chief Medical Officer for Northwell Health, added “I would advise every hospital system in the country to consider using ‘Cybersecurity for the Clinician’ in their learning management systems.
For smaller sized organizations it’s quite normal to believe you will not be targeted or the victim of any cyberattacks. After all, why would a cyber criminal care about your local business? The truth of the matter is most cyberattacks are “opportunistic”; this means the criminals cast a wide net when they are looking for victims. Think of sea faring fishermen. The methodologies they use involve scouring the seas, casting their nets, and pulling in the fish that are caught.