Greg Freiherr, Industry Consultant

Greg Freiherr has reported on developments in radiology since 1983. He runs the consulting service, The Freiherr Group.

Blog | Greg Freiherr, Industry Consultant | Enterprise Imaging| May 17, 2017

Agents of Change: Cybersecurity In A World Of Old And New

cybersecurity

Mobile devices and standards that support interoperability stand out in the shadowy world of cyber intrusions. They allow access to patient files, the making of information requests, the placing of exam orders from anywhere at any time. Those devices may be smartphones or tablets — each with varying levels of security.

With increasing interoperability, data from multiple systems will be viewed simultaneously on a single screen — prior images beside those from exams just completed, displayed in windows beside ones with path reports, vital signs and demographics pulled from patient histories.

In an efficiently constructed and maintained enterprise imaging system, this stream of information will give radiologists and clinicians an unprecedented edge in making better decisions. For those in charge of cybersecurity, it could be a nightmare.

The more nodes in a network, the more opportunities for hackers to break in. And user-owned mobile devices — the so-called bring your own devices (BYODs) — will further increase the risk by reducing the medical institution's control.

 

HIPAA Requirements

Regulation promises some protection. To stay on the right side of the Health Insurance Portability and Accountability Act (HIPAA), medical images must be transferred securely and accessed only by authenticated users. (Notably, secure transfer and user authentication is up to the provider.) Tablet applications for radiology, including ones used on the iPad, often use the secure socket layer (SSL) protocol or virtual private networks that lessen risk of hacking when transferring and accessing images. To eliminate the risk that patient data might be lost if tablets are misplaced or stolen, images are accessed only from the server through login-based interfaces and image display typically stops after a preset time.

Adding BYOD mobile devices increases the risk of cyberintrusion. Because they own the device, users may add whatever software they (or their families) like, just as they may access entertainment sites that may harbor malware or viruses. BYOD mobile devices that transmit or store patient data in ways that are not HIPAA compliant give medical providers the biggest headaches, as lost or stolen devices can be hacked for the information they possess.

These problems can be addressed through a strict BYOD policy, one that details the apps and links not permitted on a BYOD; keeps security software updated; requires the use of a strong password; encrypts devices, while detailing how data can be wiped from lost or stolen devices; periodically audits devices for policy compliance; requires multifactor authentication to access patient data; and describes training for users on cybersecurity practices.

In short, HIPAA requirements applied to conventional means for accessing patient data should (must) be applied to BYODs.

 

FDA Steps In

But there is plenty to worry about in regard to traditional equipment, as well. Last year, the Food and Drug Administration (FDA) issued recommendations for industry (and agency staff) about how to manage some of these risks. The "nonbinding" guidance, which the agency says represents its "current thinking," notes that the software in networked medical devices may be vulnerable to hackers and, therefore, "typically requires continual maintenance throughout the product life cycle." That is good advice, especially for radiology.

Aging medical equipment — X-ray, CT, MRI and PET systems well past their prime, for example — make tempting targets for hackers. The operating systems onboard this equipment often is no longer supported by their makers, for example, Windows NT and XP.

The theft of patient-specific insurance data or personal data such as a Social Security numbers represent one opportunity for hackers. Another is ransomware, so named because it encrypts data that can only be decrypted by the cybercriminal, who typically requires the victim to pay a ransom to do so.

Of greatest concern to the FDA are malware and viruses that might physically harm patients. An infected implantable defibrillator or pacemaker might be reprogrammed by a hacker in ways that could cause injury or death, according to the FDA's guidance "Postmarket Management of Cybersecurity in Medical Devices." Of lesser consequence, but still a threat, is malware that causes a medical device to spit out incorrect data.

Alternatively, malware might collect Internet browsing information. Although patient harm may be limited, the FDA still suggests that the product be patched or updated to reduce or eliminate the threat.

And this threat is already frightening. Last year cybercriminals made off with data from 13 million patient records, according to Symantec Corp. Banner Health alone reported a data breach affecting 3.7 million patients and staff.

Effective cybersecurity is possible, but providers and manufacturers must be cautious. The need for vigilance will increase as interoperability standards raise the number of devices on a network and the BYOD trend gathers steam among medical practitioners.

Editor’s note: This is the third blog in four-part series on Agents of Change. The first blog, “iPads On Track To Be Radiologists' BYOD of Choice,” can be found here. The second blog, “Agents of Change: Interoperability Standards Offer Carrot Over Stick” can be found here.

Related Content

Technology | Enterprise Imaging | February 23, 2018
Visage Imaging Inc. announced the latest version of the Visage 7 Enterprise Imaging Platform, Visage 7.1.11, has been...
Konica Minolta Exa Enterprise Imaging Delivers Intelligent Radiology Analytics
News | Enterprise Imaging | February 20, 2018
At the 2018 annual meeting of the Healthcare Information and Management Systems Society (HIMSS), March 5-9 in Las Vegas...
Videos | Enterprise Imaging | February 13, 2018
ITN Contributing Editor Greg Freiherr offers an overview of enterprise imaging advances at the Radiological Society of...
ScImage Celebrates 25th Anniversary
News | PACS | February 08, 2018
February 8, 2018 – ScImage, a leading provider of...
Sponsored Content | Whitepapers | Vendor Neutral Archive (VNA) | February 07, 2018
As the needs of healthcare enterprises continue to evolve, a new type of system is quickly gaining popularity within...
Technology | PACS Accessories | February 06, 2018
lifeIMAGE announced the release of Clinical Connector, powered by lifeIMAGE – a high-performance, scalable, and secure...
Carestream’s Vue Motion Universal Viewer Earns 2018 KLAS Category Leader Award
News | Enterprise Imaging | February 01, 2018
February 1, 2018 — Carestream Health earned top ratings from healthcare...
Feature | Cybersecurity | January 31, 2018 | By Jeff Zagoudis
The year 2017 underscored the importance of strong cybersecurity practices in an increasingly connected world, as major...
Sponsored Content | Whitepapers | Enterprise Imaging | January 26, 2018
Multi-site enterprises face critical issues in managing their clinical images and data.
Overlay Init