You are on page 1of 3

TECH NOTES

Cybersecurity awareness:
Downloaded from http://journals.lww.com/nursing by BhDMf5ePHKav1zEoum1tQfN4a+kJLhEZgbsIHo4XMi0hCywCX

Protecting data and patients


1AWnYQp/IlQrHD3i3D0OdRyi7TvSFl4Cf3VC1y0abggQZXdgGj2MwlZLeI= on 01/29/2024

By Lee Kim, JD, BS, CIPP/US, CISSP, FHIMSS

IN TODAY’S INCREASINGLY addition, the HIPAA Privacy Rule Safeguarding information


“connected” world, where much governs the permitted or required We all make decisions every day
of the patient information that we uses and disclosures of protected that significantly influence the se-
handle is in electronic form, we health information, regardless of curity or insecurity of our organi-
can’t maintain patient privacy with- the medium.2 zation’s data; for example, clicking
out information security. Patient Protecting information isn’t just a on a malicious link for a “phish-
information must be protected at function of the information technol- ing” website, opening a malicious
all stages of the information life- ogy (IT) department, it’s the shared e-mail attachment, divulging sensi-
cycle: when the information is responsibility of everyone within an tive information to a “social engi-
created, received, transmitted, organization. This responsibility ex- neer,” or allowing unauthorized
maintained, and destroyed. The tends to end users, such as nurses, personnel in restricted areas may
Health Insurance Portability and physicians, unlicensed assistive per- result in serious adverse conse-
Accountability Act (HIPAA) Secu- sonnel, technicians, and other staff, quences. Any compromise of pa-
rity Rule mandates the protection including interns, volunteers, con- tient information may pose a risk
of electronic health information sultants, contractors, and research- to patient safety.4
with physical, technical, and ad- ers. Technology safeguards alone People tend to be the weakest
ministrative safeguards.1 It also can’t make an organization secure; link in an organization’s informa-
requires covered entities and however, knowledgeable employees tion security program, and this is
business associates to implement can help reduce risks.3 This article especially true if employees are
cybersecurity awareness and train- discusses what nurses must do to unaware of the risks that they may
ing for all members of the work- promote cybersecurity and maintain introduce. Breaches can happen
force, including management.1 In patient confidentiality. very quickly given fast network
speeds and ready access to data,
even via mobile devices or web-
Learn the lingo based cloud applications.
Accordingly, employees should
Cybersecurity awareness: an approach to enabling a broad, organization-wide
understanding of information security and motivating employees to practice
regularly be taught about good
good cyber hygiene to help protect valuable and sensitive information9 “cyber hygiene,” including what to
do, what not to do, and why, by
Cyber hygiene: the process of ensuring that one is protecting and maintaining participating in mock exercises
systems and devices appropriately and using cybersecurity best practices10
that simulate phishing and social
Phishing: a fraudulent e-mail and/or website used to solicit personal or engineering. Besides simulating
sensitive information under false pretenses11 cyberattacks, these exercises can
Social engineering: A method used to convince someone to do something help determine the effectiveness of
and/or divulge information (for example, click on a malicious link, visit a the current cybersecurity aware-
malicious website, or divulge patient or other sensitive information) that ness and training program, and
often involves deceit, influence, and/or manipulation12 identify employees who may need
Ransomware: a type of malicious software (malware) that uses encryption to
more training.
deny authorized users access to systems or data; a ransom is then demanded Key points include educating
for access13 others about cybersecurity aware-
ness to prevent data leakage; think-
Breach: the impermissible use or disclosure of protected health information
ing before you communicate or
that compromises the security or confidentiality of the information.14
disclose via e-mail, social media,

www.Nursing2017.com June l Nursing2017 l 65

Copyright © 2017 Wolters Kluwer Health, Inc. All rights reserved.


TECH NOTES
Downloaded from http://journals.lww.com/nursing by BhDMf5ePHKav1zEoum1tQfN4a+kJLhEZgbsIHo4XMi0hCywCX

or other means; and avoiding shar- you don’t recall installing, be sure training programs, as well as
ing your usernames and passwords to notify your organization’s IT de- the information security program
with anyone or letting someone else partment immediately. Delaying as a whole, should be reevaluated
1AWnYQp/IlQrHD3i3D0OdRyi7TvSFl4Cf3VC1y0abggQZXdgGj2MwlZLeI= on 01/29/2024

use your computer while you’re the report of an incident may re- to identify any gaps. If gaps are
signed in. sult in harm, such as data being detected, a plan must be developed
Another integral part of the breached, corrupted, or encrypted to address them in both the short
cybersecurity awareness and train- and held for ransom (known as and long term.
ing program is the concept of “see “ransomware”). Ideally, your cybersecurity
something, say something.” If an Cybersecurity awareness programs awareness and training program
employee receives a suspicious should be conducted during on- should provide a hybrid perspec-
e-mail, phone call, or text message, boarding and at least annually. Ad- tive from both the clinician and IT
or a computer displays unusual ditionally, employees can receive more perspectives, including lessons
behavior, such as a system freeze frequent awareness reminders and learned from recent and past secu-
or crash, the presence of sent tips via screensavers, e-newsletters, rity incidents. It should also be
e-mails you don’t recall sending, or intranet messages, and so on. As se- easy to understand and implement,
the presence of installed programs curity incidents occur, awareness and regardless of staff members’ levels

HIMSS infographic for Data Privacy Day

66 l Nursing2017 l Volume 47, Number 6 www.Nursing2017.com

Copyright © 2017 Wolters Kluwer Health, Inc. All rights reserved.


Downloaded from http://journals.lww.com/nursing by BhDMf5ePHKav1zEoum1tQfN4a+kJLhEZgbsIHo4XMi0hCywCX

of technical sophistication. Wheth- cyber hygiene. Working with


er an organization is starting a new others involved with patient care,
cybersecurity awareness and train- nurses can make their healthcare
1AWnYQp/IlQrHD3i3D0OdRyi7TvSFl4Cf3VC1y0abggQZXdgGj2MwlZLeI= on 01/29/2024

ing program, implementing an organizations stronger and more


existing program, or looking to resistant to cyberattacks and com-
revamp a program, the Healthcare promises by taking these proactive
Information and Management steps. ■
Systems Society (HIMSS) offers
materials that can be incorporated.5 REFERENCES
See HIMSS infographic for Data 1. U.S. Department of Health and Human Services.
HIPAA security rule. https://www.hhs.gov/hipaa/
Privacy Day for an example. for-professionals/security/index.html.
In addition to the HIMSS 2. U.S. Department of Health and Human Services.
awareness tools, the National HIPAA privacy rule. https://www.hhs.gov/hipaa/
for-professionals/privacy/index.html.
Cyber Security Alliance (NCSA)
3. Healthcare Information and Management
provides free online resources Systems Society. HIMSS cybersecurity position
for those who want to learn more statement. www.himss.org/sites/himssorg/files/
Tab%2001%20Cybersecurity%20Position%20
about staying safe online.6 The Statement%20UPDATED.pdf.
NCSA also offers templates and 4. Independent Security Evaluators. Hacking
other materials to help organiza- hospitals. www.securityevaluators.com/hospitalhack.
5. Healthcare Information and Management
tions bolster their cybersecurity Systems Society. Privacy and security awareness
awareness and training programs initiatives. www.himss.org/library/healthcare-
privacy-security/initiatives.
with initiatives such as STOP.THINK.
6. National Cyber Security Alliance. Get involved.
CONNECT ., National Cyber Security https://staysafeonline.org/get-involved.
Awareness Month, Data Privacy 7. Healthcare Information and Management Systems
Day, and RE: Cyber.6 Society. The healthcare industry’s guide to keeping
information safe and secure when you are mobile.
You don’t necessarily need to www.himss.org/ncsam/keeping-information-safe-
wait for your organization’s next cy- and-secure-when-mobile.
bersecurity awareness and training 8. Healthcare Information and Management
Systems Society. 2016 Healthcare organization’s
program to implement good cyber guide to keeping passwords safe and secure.
hygiene practices. No matter where www.himss.org/library/healthcare-privacy-security/
passwords-secure-safe.
you are, your computer and mobile
9. (ISC)2 blog. The true meaning of “security
devices should always be physically awareness training.” http://blog.isc2.org/isc2_
safeguarded.7 Never leave laptops, blog/2010/12/the-true-meaning-of-security-
awareness-training.html.
tablets, smart phones, or mobile de- 10. Center for Internet Security. Cyber hygiene.
vices unattended, and don’t connect www.cisecurity.org/cyber-pledge.
to unsecured public wireless net- 11. U.S. Computer Emergency Readiness Team.
Report phishing sites. https://www.us-cert.gov/
works.7 Always use complex pass- report-phishing.
words that are difficult for others to 12. FBI.gov. Social engineering. https://www.fbi.
guess but easy for you to remember, gov/audio-repository/ftw-podcast-social-
engineering-101416.mp3/view.
regularly change your passwords,
13. FBI.gov. Incidents of ransomware on the rise.
and use a unique password for each https://www.fbi.gov/news/stories/incidents-of-
account.8 ransomware-on-the-rise.
14. U.S. Department of Health and Human
Services. Breach notification rule. https://www.
Be the gatekeeper hhs.gov/hipaa/for-professionals/breach-
In today’s “cyberworld,” safe and notification.

responsible use of technology Lee Kim is the Director of Privacy and Security for
HIMSS North America.
helps safeguard patient informa-
tion. Nurses can achieve this goal The author has disclosed no financial relationships
by educating themselves about related to this article. “CE Connection.”
cybersecurity awareness and good DOI-10.1097/01.NURSE.0000516242.05454.b4

www.Nursing2017.com June l Nursing2017 l 67

Copyright © 2017 Wolters Kluwer Health, Inc. All rights reserved.

You might also like