About the Author
Shawn Bookwalter, PharmD, MSHI, MS, BCPS, is a fellow at the Institute for Safe Medication Practices in Plymouth Meeting, Pennsylvania.
Publication
Article
Pharmacy Practice in Focus: Health Systems
Author(s):
Proactive strategies to protect health care data from hackers.
As number of computing devices has exponentially increased, so has the risk surface area of the information technology (IT) system. Securing data effectively is especially relevant in regulated industries such as health care. Health care organizations often have extremely sensitive and confidential information, such as personally identifiable information, financial information, and protected health information. Patient trust in health care organizations is based on a sacred foundation of confidentiality, which can be violated during a cyberattack.
The Rise of Cybersecurity Threats
Image credit: sarayut_sy | stock.adobe.com
Cyberattacks are activities that are used to disrupt, steal, alter, destroy, or degrade data.1 If successful, these can result in a data breach, whereby an unauthorized person or group gains access to information without permission. In February 2024, a cyberattack on Change Healthcare resulted in a significant disruption in medical billing and reimbursement for several weeks. Change Healthcare billing software is used by 33,000 pharmacies, 5500 hospitals, and 900,000 physicians across the United States.2 The consequences of this attack were widespread as patients experienced delays in care and practitioners saw uncertainty in reimbursements.
The number of patient health care records exposed, stolen, or illegally disclosed increased from 7 million in 2018 to 38 million in 2019.1 Attacks within health care organizations can be disruptive for delivery of quality patient care and jeopardize patient safety. The hacker’s motivations for conducting these attacks can include notoriety, financial gain, or an aim to simply disrupt routine operations. A health care organization’s top priority is to effectively manage the health of patients, not necessarily to safeguard data. Certain industries, such as health care and energy, are selectively targeted for cyberattacks as these offer the potential to yield high value for hackers. The data that can be taken—financial information, protected health information, and sensitive information—have high monetary and intelligence value.3
The COVID-19 pandemic increased the number of computing devices as telehealth became more prevalent.4 The integration of these devices has led to overall positive benefits, such as precise health care delivery and communication, but there are challenges associated with safeguarding data.3 As the number of connected devices increases within a health care organization (computers, vital monitoring devices, etc), so does the surface area or overall risk exposure to cyber threats.5 With each new device connection, potential weaknesses in one device can be exploited to gain access in other connected devices. This concept allows a hacker to gain a backdoor entrance to other devices or programs (eg, servers, computers). Safeguarding health care data is critical to establishing, maintaining, and sustaining patient trust in the organization.
The Pillars of Information Security
To better understand how health care practitioners can help safeguard health care data, a review of the pillars of information security is necessary. Confidentiality, integrity, and availability (CIA) are the 3 pillars of information security, often referred to as the CIA triad. At the basiclevel, these cover relevant factors related to the design, deployment, and maintenance of IT systems. Although there are portions of each pillar reserved for IT professions, health care practitioners all have responsibility within each pillar to safeguard data.1 Each pillar is defined along with examples of cyber breaches as follows:
Role of Health Care Practitioners in Securing Data
It is not reasonable to believe that IT professionals are solely responsible for safeguarding IT systems. These actions are strategies that health care practitioners have a responsibility to emphasize. The entire health care team should implement and maintain practices that support safeguarding data.1 The following recommendations will focus on the steps health care practitioners can take and are not a comprehensive list of strategies.
People are often identified as the weakest link within an IT system. Every person working for the health care organization has a responsibility to effectively manage, respond, and mitigate the risks of cybersecurity threats.1 Social engineering attacks often take place in this manner. The general aptitude of people to aid others when they are requesting help enables social engineering, and this goodwill can be taken advantage of when the aid request originates from a hacker. To remedy these problems, it is necessary to provide both awareness and training programs that address and apply directly to the audience.4 However, providing generalized awareness and training may not be sufficient. The following list contains key cybersecurity strategies, which should be implemented in a health care organization’s IT system:
Final Thoughts
Shawn Bookwalter, PharmD, MSHI, MS, BCPS, is a fellow at the Institute for Safe Medication Practices in Plymouth Meeting, Pennsylvania.
The evolution of health IT has yielded benefits for the enhanced delivery of patient care. Hackers selectively target health care data for their high-value, sensitive, and confidential nature. All health care practitioners have a responsibility to safeguard data through understanding of key cybersecurity concepts.1 Safeguarding health care data not only minimizes disruptions in patient care but also sustains patient trust in the organization. Maintaining patient trust has the potential to improve health outcomes, quality of life, and perceptions of quality care.
References
Stay informed on drug updates, treatment guidelines, and pharmacy practice trends—subscribe to Pharmacy Times for weekly clinical insights.