Strengthening Cybersecurity in Business Operations: Lessons from Recent Healthcare Incidents
Published in
Complex Rehab
on December 18, 2024
By Ryan Wood, Chief Information Security Officer (CISO), VGM Group, Inc.
In today’s digital age, cybersecurity is no longer just an IT concern; it is a critical aspect of business operations. The recent cybersecurity incidents involving Change Healthcare and Medicare breaches have highlighted the vulnerabilities in our systems throughout the industry and the urgent need for robust cybersecurity measures.
Understanding the Incidents
The Change Healthcare incident, which occurred in February 2024, was a significant ransomware attack that compromised 4TB of data. Despite a $22 million ransom payment, the malicious actors did not delete their copy of the breached data, leading to widespread concerns about patient privacy and data security. Similarly, the Medicare breaches exposed the personal information of nearly one million beneficiaries, including names, Social Security numbers, and medical claims information. These breaches were part of a pattern where hackers exploited vulnerabilities in third-party systems, such as the MOVEit file transfer program.
Impact on Business Operations
These incidents have far-reaching implications for business operations, especially in the healthcare sector. The immediate impact includes financial losses, reputational damage, and operational disruptions. For instance, the Change Healthcare breach affected billing and care authorization portals, leading to delays and inefficiencies. Moreover, the exposure of sensitive information can result in legal liabilities and loss of customer trust.
For VGM & Associates members, the implications of these cybersecurity breaches extend far beyond immediate financial losses. The healthcare industry is particularly vulnerable due to the sensitive nature of the data it handles. Imagine the potential fallout if a breach exposed patient health records; not only could it lead to severe legal penalties under regulations like HIPAA, but it could also irreparably damage patient trust, ultimately affecting the bottom line.
Consider the specific case of the Change Healthcare incident. The ransomware attack that compromised 4TB of data disrupted billing processes and care authorizations, resulting in significant delays. This scenario underscores the critical need for robust cybersecurity measures in ensuring operational continuity. If such an incident were to occur within VGM & Associates, it could paralyze entire departments, delaying critical patient care and straining resources as IT teams scramble to contain the breach.
The Medicare breaches provide another poignant example. With nearly one million beneficiaries’ personal information compromised, the incident underscores the importance of securing third-party systems. VGM & Associates members often rely on multiple vendor partners for their operations, from billing services to electronic health records. Ensuring that these vendor partners adhere to stringent cybersecurity standards is not just best practice—it’s a necessity. Failure to do so can result in substantial legal liabilities and loss of business.
Consider this phishing attack example as if it were to target VGM & Associates or any provider in our industry. We will use the MITRE ATT&CK framework to step through a real-world scenario that we, as a security team, see happening daily. The MITRE ATT&CK framework is like a big map that helps us understand how cyber attackers operate. Imagine it as a guidebook that shows the different tricks and techniques hackers use to break into systems and cause trouble.
Here’s a simple breakdown:
Categories of Attacks: It lists various stages of an attack, from the initial break-in to how they move around inside a system.
Techniques and Tactics: Each stage has specific methods (or tactics) that attackers use, like stealing passwords or hiding their tracks.
Defense Strategies: By knowing these tactics, we can better prepare and defend our systems against attacks.
Think of it as a playbook for both attackers and defenders, helping us stay one step ahead in the cybersecurity game.
MITRE ATT&CK Chain Steps
- Initial Access: The attacker sends a phishing email with a malicious link or attachment to a DME provider. The email appears to be from a trusted source, leveraging the existing relationship.
- Execution: The victim clicks on the link or opens the attachment, which executes malicious code on their device or sends them to a website.
- Credential Access: The attacker harvests the user’s credentials through a fake login page or malware. The user inadvertently types in their credentials, thinking they are logging into a legitimate VGM & Associates system.
- Persistence: The attacker uses the harvested credentials to gain persistent access to the victim’s account. If Multi-Factor Authentication (MFA) is not enabled or is circumvented, the attacker can maintain access over time. MFA is like adding extra locks to your door. Instead of just using a password, you need to provide another piece of information, like a code sent to your phone, to prove it’s really you. This makes it much harder for hackers to get in. Many times, the attacker attempts or succeeds in successfully adding their own additional MFA device, which could then send the code to their device instead of yours.
- Lateral Movement: Using the compromised credentials, the attacker accesses other systems within the network, moving laterally to escalate privileges and gain further control. The attacker can also leverage these credentials to launch secondary attacks to other VGM & Associates members, starting another attack chain.
- Collection: The attacker gathers sensitive information, including patient health records, billing information, and other critical data.
- Exfiltration: The collected data is exfiltrated to the attacker’s remote servers. This can include downloading large datasets or slowly siphoning off data to avoid detection.
- Impact: The attacker may deploy ransomware, encrypting critical systems and demanding a ransom. Alternatively, they may use the exfiltrated data to commit fraud, sell it on the dark web, or carry out further attacks.
Given these examples, it is evident that the lessons learned from such incidents are invaluable. Strengthening third-party security is paramount. Businesses must perform due diligence in vetting their vendors’ cybersecurity protocols and require regular security assessments to ensure ongoing compliance. Robust data protection measures, such as data encryption and multi-factor authentication, can greatly reduce the risk of unauthorized access. Moreover, regularly updating and patching systems can prevent the exploitation of known vulnerabilities.
Developing a comprehensive incident response plan is another crucial step. Such a plan enables businesses to quickly contain and mitigate the impact of a cyberattack, minimizing operational disruptions and safeguarding sensitive data. Regular training and drills ensure that employees are well-prepared to respond effectively to any cybersecurity threats.
To truly safeguard their operations, businesses should adopt a zero-trust security model. Unlike traditional perimeter-based security, a zero-trust approach assumes that threats can come from both inside and outside the network, verifying every access request regardless of its origin. This strategy adds an additional layer of security, significantly enhancing the organization’s cybersecurity posture.
By understanding these lessons and implementing robust cybersecurity measures and awareness, VGM & Associates members can better protect themselves against future threats. Not only does this proactive approach safeguard their business operations, but it also demonstrates a commitment to safeguarding patient data, thereby maintaining trust and compliance in an increasingly digital world.
Lessons Learned
- Strengthen Third-Party Security: The Medicare breaches underscore the importance of securing third-party systems. Businesses must ensure that their vendors adhere to stringent cybersecurity standards and conduct regular security assessments.
- Implement Robust Data Protection Measures: Encrypting sensitive data and implementing multi-factor authentication can significantly reduce the risk of unauthorized access. Regularly updating and patching systems is also crucial to prevent exploitation of known vulnerabilities.
- Develop a Comprehensive Incident Response Plan: Having a well-defined incident response plan can help businesses quickly contain and mitigate the impact of a cyberattack. This includes regular training and drills for employees to ensure they are prepared to respond effectively.
- Enhance Employee Awareness and Training: Human error remains a significant factor in cybersecurity breaches. Regular training and awareness programs can help employees recognize and avoid phishing attempts and other common attack vectors.
- Adopt a Zero-Trust Security Model: Traditional perimeter-based security models are no longer sufficient. A zero-trust approach, which verifies every access request regardless of its origin, can provide an additional layer of security.
Moving Forward
The recent incidents serve as a wake-up call for businesses to prioritize cybersecurity in their operations. By adopting a proactive approach and implementing the lessons learned, businesses can better protect themselves against future cyber threats. As the Chief Information Security Officer at VGM, I urge all business leaders to take these threats seriously and invest in robust cybersecurity measures to safeguard their operations and customer’s data, especially when it comes to their patient’s health data.
Action Item: Strengthen Your Cybersecurity with Free and Trusted Resources
- Start with Free Resources: Utilize the Cybersecurity and Infrastructure Security Agency (CISA) for free tools and guidance. CISA offers a wealth of resources to help you understand and implement basic cybersecurity measures. Additionally, check with your local government for any cybersecurity support programs they might offer.
- Partner with Experts: Consider partnering with cybersecurity firms for more comprehensive protection. For example, ProCircular is a trusted partner that VGM uses for parts of our cybersecurity program. They can provide tailored solutions and expert advice to enhance your security posture.
By leveraging these resources, you can build a strong foundation for your cybersecurity efforts without overwhelming your team.
Resources
Change Healthcare Reports Ransomware Data Breach to HHS (hipaajournal.com)
Medicare data breach bared info of nearly 1M people (axios.com)
Medicare Data Breach Impacts 600,000 Beneficiaries (aarp.org)
https://apnews.com/article/change-cyberattack-hospitalspharmacy-alphv-unitedhealthcare-521347eb9e8490dad695a7824ed11c41
MITRE ATT&CK® – MITRE ATT&CK Framework
Home Page | CISA – Cybersecurity and Infrastructure Security Agency
ProCircular I CyberSecurity Consulting Based in the Midwest
READ THE FULL ARTICLE HERE
This article was originally featured in the VGM Playbook: Mastering Business Management and Optimization. To read the full article and more like this, download your copy of the playbook today!
TAGS
- cybersecurity
- operations
- playbook
- vgm