WEDI Releases Healthcare Cybersecurity White Paper Outlining Best Practices to Mitigate Risk

March 20, 2017
The Workgroup for Electronic Data Interchange (WEDI) has issued a cybersecurity white paper examining health IT vulnerabilities and how stakeholders can mitigate risk in the wake of record data breaches striking the healthcare industry.

The Workgroup for Electronic Data Interchange (WEDI) has issued a cybersecurity white paper examining health IT vulnerabilities and how stakeholders can mitigate risk in the wake of record data breaches striking the healthcare industry.

WEDI, a Reston, Va.-based nonprofit organization focused on the use of health IT to create efficiencies in healthcare information exchange, developed the white paper, entitled “The Rampant Growth of Cybercrime in Healthcare,” which can found here, in order to examines common vulnerabilities that are typically exploited by cybercriminals in today’s healthcare environment, as well as best practices healthcare organizations can implement to mitigate these vulnerabilities.

According to the paper: “As the use of health IT becomes more widespread, cybersecurity must be more directly integrated into the fabric of healthcare and ultimately become an organizational asset that is perceived as commonplace and mission-critical as hygiene and patient safety procedures have become to quality care. No matter how high the walls that any one organization is able to erect against cybercriminals, the healthcare industry at large must coalesce as a united front to more collectively address how to implement a universal culture of cyberdefense and train a more resilient workforce to mitigate threats.”

Stemming from topics discussed at multi-stakeholder cybersecurity roundtables convened in November 2015 and April 2016 by WEDI and sponsored by Fortinet, the 15-page document outlines how cybercrimes are more commonplace in the healthcare landscape given the high value of digital health records which have “attracted organized crime and government-sponsored entities that in turn are capable of launching sophisticated attacks to disrupt, disable, destroy or maliciously control digital technology and data of organizations. As cybercrimes have become more prevalent and complex in healthcare, they are also causing greater damage.”

In light of the cybersecurity challenges identifies, roundtable participants identified the following best practices for mitigation to the industry, as explored in the white paper:

1.       Drive a cultural change in how cybersecurity is approached in healthcare, beginning with raising awareness to educate stakeholders around the risk and cost of cyberattacks;

2.       Build the business case for cybersecurity and move it into the executive suite;

3.       Develop cybersecurity frameworks that provide a robust, forward-facing roadmap to protect organizations in a changing environment; and

4.       Apply lessons learned from other industries.

Some additional key highlights from the white paper include:

  • It is critical for organizations to assess their current approach to cybersecurity, understand potential adversaries that they may encounter and identify the vulnerabilities that may be targeted before developing a comprehensive and robust strategy to effectively detect, mitigate and prevent cyberthreats across multiple fronts
  • In 2016, the leading causes of reported data breaches in healthcare were unauthorized access (40 percent) and hacking (33 percent), while theft and loss of data actually saw a decrease in the number of incidents
  • Of the current cyber threats that compromise data today, healthcare organizations are most concerned by ransomware (69 percent), phishing attacks (61 percent) and negligent insiders (55 percent) which can often be the most difficult to prevent and protect, given the human elements involved.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...