CHIME, AEHIS, Offer Suggestions to Lawmakers for Improved Cybersecurity

May 20, 2016
The College of Healthcare Information Management Executives (CHIME) and the Association for Executives in Healthcare Information Security (AEHIS) have written a statement to lawmakers offering suggestions for how to bolster healthcare cybersecurity.

The College of Healthcare Information Management Executives (CHIME) and the Association for Executives in Healthcare Information Security (AEHIS) have written a statement to lawmakers offering suggestions for how to bolster healthcare cybersecurity.

CHIME references the recent the Ponemon Institute report that details how the cyber threat landscape has never been more dangerous. Indeed, the two healthcare associations are calling for greater collaboration between providers and medical device manufacturers and for the Food & Drug Administration (FDA) to develop standardized cybersecurity framework for medical devices, per their joint statement to the Senate Committee on the Judiciary Subcommittee on Crime and Terror.

The statement reads, “While ransomware is the topic of the day, it’s important to take a step back and remember that it is only a subset of the broader cybersecurity threats facing the industry. Additionally, it is important to note that ransomware is just a subset of malware in general, and has been a threat to all industries for over 10 years.”

CHIME and AEHIS members point to inconsistencies in the enforcement of the laws governing privacy and security as a major impediment to being able to implement sound risk mitigation strategies. “The existing enforcement paradigm is heavily focused on compliance with maintaining patient privacy, which can be a distraction or drain on already limited resources necessary to actually secure the numerous points of entry–medical devices, networks, EHRs. Variability in expectations of those that interact with healthcare data, including medical device manufacturers and business associates, will only contribute to the difficultly in securing each and every potential vulnerability,” they write.

They add, “To better safeguard healthcare systems, we must improve threat and incident information sharing across the industry. No single sector of the healthcare ecosystem can solve the problem alone. Only by pulling together and sharing best practices can we thwart cyber criminals and protect patients. This type of collaboration is vital towards remaining nimble to the threats of today, for every day a new threat is introduced into the industry.”

As such, CHIME and AEHIS offer various suggestions for lawmakers to consider as the sector matures in its efforts to improve cyber hygiene and fight bad actors:

Enabling the Use of a Healthcare-Specific Identification Solution: Reducing the reliance on SSNs and other identifiable information that help bad actors execute fraud will immediately devalue health records on the black market.

Incentives for Security: Policymakers should look for ways to encourage investment through positive incentives for those who demonstrate a minimum level of cyberattack readiness and mature information risk management programs.

Security as Factor in Reimbursement: Congress should allow CMS to consider a similar principle to value-based reimbursement modifiers to be applied to healthcare enterprises investing in security.

Reduce Regulatory Complexity: Congress should pursue legislation that harmonizes other privacy, security and information risk management requirements to eliminate the complex patchwork of regulations across industries and state lines.

Workforce Development Programs: Policymakers should support ways to develop security experts to address both cyber concerns and general information security challenges.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...