Greg Freiherr, Industry Consultant
Greg Freiherr, Industry Consultant

Greg Freiherr has reported on developments in radiology since 1983. He runs the consulting service, The Freiherr Group.

Blog | Greg Freiherr, Industry Consultant | Enterprise Imaging| May 17, 2017

Agents of Change: Cybersecurity In A World Of Old And New

cybersecurity

Mobile devices and standards that support interoperability stand out in the shadowy world of cyber intrusions. They allow access to patient files, the making of information requests, the placing of exam orders from anywhere at any time. Those devices may be smartphones or tablets — each with varying levels of security.

With increasing interoperability, data from multiple systems will be viewed simultaneously on a single screen — prior images beside those from exams just completed, displayed in windows beside ones with path reports, vital signs and demographics pulled from patient histories.

In an efficiently constructed and maintained enterprise imaging system, this stream of information will give radiologists and clinicians an unprecedented edge in making better decisions. For those in charge of cybersecurity, it could be a nightmare.

The more nodes in a network, the more opportunities for hackers to break in. And user-owned mobile devices — the so-called bring your own devices (BYODs) — will further increase the risk by reducing the medical institution's control.

 

HIPAA Requirements

Regulation promises some protection. To stay on the right side of the Health Insurance Portability and Accountability Act (HIPAA), medical images must be transferred securely and accessed only by authenticated users. (Notably, secure transfer and user authentication is up to the provider.) Tablet applications for radiology, including ones used on the iPad, often use the secure socket layer (SSL) protocol or virtual private networks that lessen risk of hacking when transferring and accessing images. To eliminate the risk that patient data might be lost if tablets are misplaced or stolen, images are accessed only from the server through login-based interfaces and image display typically stops after a preset time.

Adding BYOD mobile devices increases the risk of cyberintrusion. Because they own the device, users may add whatever software they (or their families) like, just as they may access entertainment sites that may harbor malware or viruses. BYOD mobile devices that transmit or store patient data in ways that are not HIPAA compliant give medical providers the biggest headaches, as lost or stolen devices can be hacked for the information they possess.

These problems can be addressed through a strict BYOD policy, one that details the apps and links not permitted on a BYOD; keeps security software updated; requires the use of a strong password; encrypts devices, while detailing how data can be wiped from lost or stolen devices; periodically audits devices for policy compliance; requires multifactor authentication to access patient data; and describes training for users on cybersecurity practices.

In short, HIPAA requirements applied to conventional means for accessing patient data should (must) be applied to BYODs.

 

FDA Steps In

But there is plenty to worry about in regard to traditional equipment, as well. Last year, the Food and Drug Administration (FDA) issued recommendations for industry (and agency staff) about how to manage some of these risks. The "nonbinding" guidance, which the agency says represents its "current thinking," notes that the software in networked medical devices may be vulnerable to hackers and, therefore, "typically requires continual maintenance throughout the product life cycle." That is good advice, especially for radiology.

Aging medical equipment — X-ray, CT, MRI and PET systems well past their prime, for example — make tempting targets for hackers. The operating systems onboard this equipment often is no longer supported by their makers, for example, Windows NT and XP.

The theft of patient-specific insurance data or personal data such as a Social Security numbers represent one opportunity for hackers. Another is ransomware, so named because it encrypts data that can only be decrypted by the cybercriminal, who typically requires the victim to pay a ransom to do so.

Of greatest concern to the FDA are malware and viruses that might physically harm patients. An infected implantable defibrillator or pacemaker might be reprogrammed by a hacker in ways that could cause injury or death, according to the FDA's guidance "Postmarket Management of Cybersecurity in Medical Devices." Of lesser consequence, but still a threat, is malware that causes a medical device to spit out incorrect data.

Alternatively, malware might collect Internet browsing information. Although patient harm may be limited, the FDA still suggests that the product be patched or updated to reduce or eliminate the threat.

And this threat is already frightening. Last year cybercriminals made off with data from 13 million patient records, according to Symantec Corp. Banner Health alone reported a data breach affecting 3.7 million patients and staff.

Effective cybersecurity is possible, but providers and manufacturers must be cautious. The need for vigilance will increase as interoperability standards raise the number of devices on a network and the BYOD trend gathers steam among medical practitioners.

Editor’s note: This is the third blog in four-part series on Agents of Change. The first blog, “iPads On Track To Be Radiologists' BYOD of Choice,” can be found here. The second blog, “Agents of Change: Interoperability Standards Offer Carrot Over Stick” can be found here.

Related Content

Lake Medical Imaging Selects Infinitt for Multi-site RIS/PACS
News | PACS | August 09, 2019
Infinitt North America will be implementing Infinitt RIS (radiology information system)/PACS (picture archiving and...
NetDirector Launches Cloud-based PDF to DICOM Conversion Service
News | PACS | August 08, 2019
NetDirector, a cloud-based data exchange and integration platform, has diversified their radiology automation options...
ScImage Introduces PICOM ModalityGuard for Cybersecurity
Technology | Cybersecurity | August 07, 2019
ScImage Inc. is bridging the gap between security and functionality with the introduction of the PICOM ModalityGuard....
Philips Announces 10-year Enterprise Informatics Agreement With Centre Hospitalier Régional Universitaire de Nancy
News | Enterprise Imaging | July 29, 2019
Philips and Centre Hospitalier Régional Universitaire (CHRU) de Nancy, a leading academic hospital in the Grand Est...
Videos | Enterprise Imaging | July 09, 2019
ITN Associate Editor Jeff Zagoudis speaks with Don Dennison
Videos | Enterprise Imaging | July 08, 2019
ITN Associate Editor Jeff Zagoudis speaks with Don Dennison
Hyland Healthcare Adds ImageNext Imaging Workflow Optimizer to Enterprise Imaging Suite
Technology | Enterprise Imaging | July 05, 2019
Hyland Healthcare is launching ImageNext, a vendor-neutral imaging workflow optimizer that combines intelligent imaging...
Laurel Bridge and 3M M*Modal Partner to Improve DICOM Structured Reporting
News | PACS | July 02, 2019
July 2, 2019 — Laurel Bridge Software announced an expanded relationship with 3M M*Modal, a provider of clinical docu
CarolinaEast Health System

CarolinaEast Health System

Sponsored Content | Case Study | Enterprise Imaging | July 02, 2019
Quality care matters deeply to CarolinaEast Health Syst...
Ambra Health Announces Integration With Box
News | Enterprise Imaging | June 27, 2019
Ambra Health announced an integration with Box to enable the sharing of medical imaging directly from within Box's...