The CSO perspective on healthcare security and compliance
by Mirko Zorz - Editor in Chief - Monday, 20 May 2013.
Randall Gamby is the CSO of the Medicaid Information Service Center of New York. In this interview he discusses healthcare security and compliance challenges and offers a variety of tips.

Is it more difficult to security healthcare IT systems compared to other infrastructures?

I’ve worked in several industries and by far healthcare is the most difficult industry I’ve had to work in to date. Not all frameworks and regulations are created equal. In the case of healthcare, HIPAA and HITECH requirements require strong controls, clear lines of command and a lot of mandatory tracking and documentation.

In addition, as a healthcare security manager you must constantly remind yourself, and the people you work with, that you are not just protecting bits and bytes but that you have been given the responsibility to be the custodian of many people’s most sensitive and personal information. Exposures of this data are not only subject to heavy fines; persons’ reputations, potentially their ability to secure a job and even their family lives may be in jeopardy.

What healthcare-related compliance challenges do you face as the CSO of the Medicaid Information Service Center of New York?

Information services within the state of New York not only have federally mandated security requirements; the NYS Office of Cyber Security also has stringent policies on the access and use of protected health information (PHI) and personally identifiable information (PII).

It is sometimes quite challenging to determine who has precedence over a particular piece of information and reporting requirements can contain many branches to different organizations depending on the type of potential violation or data involved in an incident. In addition, access requirements must be constantly reevaluated and tracking mandated attestations for access are very time consuming.

Based on your experience, what areas should healthcare CSOs focus on?

Controls should always be a primary focus. First from a compliance perspective, “Have we put in place the necessary controls to maintain compliance?” Secondarily as a risk to the organization, “Is this control effective in reducing or eliminating a security risk to the organization as a whole?”

As a rule of thumb, if a control is left alone it will slowly deteriorate over time increasing risk to the organization. And if not monitored and adjustments made, eventually a control will become ineffective.

How do you deal with BYOD? Are there any positive sides to the trend?

BYOD is a scary proposition regardless of the industry. On the one side you have the productivity benefits that you derive from employees using a device that they are comfortable with and generally have on their person during their waking hours. However, the downside is that sensitive information may be walking out of your organization with little or no controls to protect it. Because of this, my organization does not allow the storage of any PHI or PII on our BYOD devices although company confidential information may be allowed if there is a business need.

We also have implemented a Mobile Device Manager (MDW) tool to monitor and control the limited BYOD devices authorized for use in our organization. We reduce our risk of exposure knowing that, at minimum, a strong password and other controls are in place on the employee’s device and that the employee has voluntarily agreed to allow us to track and remotely wipe the device’s contents should it be lost or stolen.

Spotlight

Internet Explorer vulnerabilities increase 100%

Posted on 23 July 2014.  |  Bromium Labs research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //