Vous êtes sur la page 1sur 16

Explanation of the Most Common Types of

Information Assurance Risks Part I


Administrative Risks
Risk 1. Lack of documentation to mitigate threats and
vulnerabilities
Explanation: Not having a formal, documented The ability of healthcare professionals to
program, which is always secondary to thorough correctly diagnose and treat the patients
risk analysis, might be the reason why youre not may be severely compromised due to the
able to implement effective safeguards to protect corruption of your practices ePHI.
your ePHI against possible vulnerabilities and
security threats. This may compromise your ePHI Mitigation: Conduct an annual risk analysis
security in several ways: and document all possible threats and
vulnerabilities to your practices ePHI. Based
on the documented risks and vulnerabilities,
You may face medical identity theft due to implement appropriate security measures
unauthorized access, theft or disclosure of ePHI. specifically targeted to mitigate the
Unauthorized access to your practices ePHI vulnerabilities to an appropriate level!
may leave it inaccessible, compromised and
exposed. Success Criteria: Documentation of possible
risks and implementation of safeguards
leading to reduction in security breaches.

www.netspective.com 2
Risk 2: Lack of security awareness and training
Explanation: The security of your practices ePHI Security awareness and training
might be at risk if your workforce members dont programs being non-interactive and
comply with the standard security protocols, either inappropriate.
due to the lack of awareness or due to the lack of A person not having the right skills,
training. Several factors that may contribute to such qualities and knowledge running the
behavior may include:
process of security awareness and
training.
Workforce members not really knowing what Not having enough metrics on
security really is and why is it so important when whether all your arrangements are
it comes to ePHI. actually improving security
Lack of sanction policies and procedures that awareness among your workplace
make it crystal clear to the workplace members members.
their respective duties to uphold the integrity of
ePHI or lack of compliance on the part of workers
Unrealistic expectations.
to the sanctioned policies and procedures. Conducting once a year training
exercise only.

www.netspective.com 3
Risk 2: Lack of security awareness and training
Mitigation: You can strengthen security
awareness and training among your Collect metrics on periodic basis to see
workplace members and thereby improve the progress of your training activities.
the security of your practices ePHI by taking While it is important that you collect
metrics to know if your efforts are actually
following steps: producing enough results, but in the
Make the sanction policies and meantime, youve to be realistic.
procedures as explanatory as possible. Promoting awareness is not a one day
process, it takes time and patience.
Apply appropriate sanctions against
members who fail to comply with the Success Criteria: Improved awareness and
security protocols and policies. better compliance on part of the workplace
Make security awareness and training members leading to strengthened security.
programs more interactive and periodic.
Appoint the right person with the perfect
skill set, heading this process.

www.netspective.com 4
Risk 3: Lack of roles delegation
Explanation: Your business associates or workforce Mitigation: Some important safeguards that may help
solve this issue may include:
members can, knowingly or unknowingly, access the
Implementing procedures and policies ensuring
confidential ePHI if your practice doesnt clearly define, that all the workforce members have appropriate
along logical lines, the roles and responsibilities allocated access to ePHI and no member gets too much
to each member. This is important as this will ensure that authority.
Assigning a senior level manager who authorizes
no member has too much authority and makes decisions operations before commencing.
on his own that can access critical and confidential systems Assigning different duties to the workforce
and information. members.
Developing and distributing among your workplace
members a work control policy that explains to the
Lets explain this by a simple example. Say one of your members things like their roles, degree of
workplace members is responsible to review the access coordination between members, their
responsibilities, compliance requirements and so on.
logs. Due to your practices poor role delegation, the same
person is also responsible for updating patient records. In Success Criteria: Decrease in the incidence of security
this scenario, that member is essentially left to monitor his breaches from within the organization.
own access to ePHI, facilities and systems. This can result in
unauthorized access attempts by the same member to
your practices ePHI.
www.netspective.com 5
Risk 4: Lack of business associate agreements when it has a
contractor creating, transmitting or storing ePHI
Explanation: The safeguard of your ePHI is Mitigation: Before getting into a contract with your
incomplete until enough security safeguards are service provider, make sure that your provider gives
provided by the service providers, as per satisfactory assurances regarding the creation,
agreement. If your service provider fails to provide transmission, storage and handling of ePHI. Such
assurances may include:
enough safeguards, it may result in:

Limiting the use/access to ePHI as required by


Unauthorized access or disclosure of your ePHI. law.
Compromising the ability of your workplace Employing enough safeguards to prevent
members to efficiently serve the patients. unauthorized use or disclosure of ePHI.
Medical identity theft. Following the same or substantially similar good
practices followed by your own institution.

Success Criteria: Highest level of security services


further strengthened by the service providers
leading to improved experience and better security.

www.netspective.com 6
Risk 5: Not having a process for periodically reviewing risk analysis policies
and procedures and making updates as necessary

Explanation: In something as dynamic as Secondary Mitigation: Risk analysis and making


healthcare security, the nature of risks and threats changes in your policies and procedures is not a
changes with time. Thats why the efficacy of the one time job. Make sure to repeat the same routine
safeguards you put to mitigate those risks declines periodically have daily, weekly, monthly, quarterly,
with time. The security of your ePHI might be at risk and annual checklists to review different types of
if you fail to periodically assess the nature of risks, risks.
the validity of your policies and procedures and Success Criteria: Successive risk analysis reports will
undermine the importance of making regular show that the changes made in the policies and
updates for improving the safeguards. subsequently in ePHI safeguards led to significant
decrease in security breaches.
Primary Mitigation: Do a periodic risk analysis to
determine the nature and severity of emerging risks
to your ePHI. Keeping in mind the result of the
analysis, make upgrades in your policies and
procedures. Once youre done with the paperwork,
translate what youve learned from the risk analysis
and the changes youve made in your policies into
actually strengthening the safeguards of your ePHI.

www.netspective.com 7
Risk 6: Not having a senior-level person whose job it is to develop and implement
security policies and procedures or act as a security point of contact.

Explanation: Not having a senior level person who Primary Mitigation: Identify the security official who
manages your security team can be jeopardizing is responsible for heading the security team. Define
the safety of your operations. Although security her role as being an individual who actively takes
implementation and maintenance is a team effort, part in policy making. Finally, she should be
but having a capable person who leads that team is responsible for the implementation of the policies
equally important. Moreover, the head of your for strengthening ePHI security.
security will act as a liaison between the security
department and the policy makers. If that link is
missing, you might not be able to influence the Success Criteria: Having a senior security officer
decisions of your higher ups when it comes to who actually influences policy making, reviews
defining policies and procedures. documentation, runs scans, establishes a secure
infrastructure, and strengthens ePHI security as a
result.

www.netspective.com 8
Risk 7: Not having an emergency mode operations plan to ensure the continuation of critical
business processes that must occur to protect the availability and security of ePHI immediately
after a crisis situation

Explanation: The functioning of healthcare Having an emergency mode helps you carry out
processes, including ePHI, is always a tug of war critical operations and assists you practice
between the security safeguards and security operation and secure the integrity of your ePHI in
threats. The security can be compromised anytime, the event of an emergency. Emergency operation
both by extrinsic or intrinsic threats, which might allows you to access controls, backup the data,
compromise the functioning of your entire business access logging and allows encryption while other
operations. things go down. If your practice is not having an
effective emergency mode, you might not be able
to provide services to the end users in the event of
an emergency. In addition, you not being able to
carry out important business processes may
compromise the security of your process and ePHI
even further.

www.netspective.com 9
Risk 7: Not having an emergency mode operations plan to ensure the continuation of critical
business processes that must occur to protect the availability and security of ePHI immediately
after a crisis situation

Primary Mitigation: Primary mitigation of this risk Secondary Mitigation: Test the continuity of
may include: operations during an emergency mode, on regular
intervals, so that the system can be promptly
Establish and implement the set of procedures shifted to the emergency mode in case of need.
that enable you to carry out important business
processes, like the functioning and security of Success Criteria: Your ability to readily shift to the
ePHI, when operating in an emergency mode. emergency mode in cases of system collapse, run
Employ audited and automated override of critical operations and maintain ePHI security all
access control mechanism and implement Role mark the success of emergency mode
Based Access Control (RBAC) for an emergency. establishment and implementation.
Establish a plan that determines the activities
and related requirements, for instance, process,
roles and responsibilities for full system
restoration.

www.netspective.com 10
Risk 8: The practice of not having policies and procedures for the creation and secure storage
of an electronic copy of ePHI that would be used in the case of system breakdown or disaster

Explanation: Like any other form of data, ePHI may Primary Mitigation: Establish and implement
be lost in case of system breakdown or disaster, if a policies and procedures for making copies of ePHI
proper backup in not kept and maintained. Backup on either physical or virtual media that can be
of an ePHI is important as it allows you to create retrieved when there is a breakdown of system.
and maintain the retrievable copies of ePHI in case
of emergency. The exact retrievable copies of ePHI Secondary Mitigation: Make sure that the
can be established and maintained in media like retrievable copies of ePHI are safe and protected
physical, removable media (e.g. CDs, USBs) or against unauthorized use and disclosure.
virtual media (e.g. cloud storage).

Success Criteria: Being able to retrieve ePHI from


the backup sources when the main source breaks or
faces a disaster.

www.netspective.com 11
Risk 9: Not having policies and procedures for the review of
information system activity
Explanation: Reviewing the activity of information If you dont have defined procedures or policies to
system enables one to identify and investigate analyze these activities, you might not be able to
irregular use of system, which might be due to detect and analyze security violations, unauthorized
some breach in your security protocols or maybe a disclosure or use of ePHI.
violation of your security policies. Reviewing the
activity of information system includes: Mitigation: Establish a system for reviewing the
records of activity of information security system.
Analyzing the audit reviews. This includes reviewing incident tracking reports,
Analyzing system activities and incident reports. audit logs, access reports and so on.
Analyzing the audit logs.
Reviewing the exception reports. Success Criteria: Being able to detect and analyze
any anomalies after reviewing information security
system activity records.

www.netspective.com 12
Risk 10: A practice that doesn't identify members of its incident response team and assure
workforce members are trained and that incident response plans are tested

Explanation: An incident response consists of defining, Incident response testing.


clearly, what constitutes a security incident and a step Making observations and recommendations on how
by step approach to how to deal with the situation to improve incident response.
afterwards. Without an effective incident response and Identifying who will speak to the law enforcement,
training of the workforce involved, the security of ePHI business associates, the media and the patients in the
will always be a far cry. In the absence of incident event of an incident.
response and workforce training, the security of your
system will be compromised. Not to mention, it will also Carefully training the members of the incident
increase the cost, time of recovery and will exacerbate response team.
the damage done to your critical processes.
Secondary Mitigation: Training and increasing
Primary Mitigation: An effective incident response plan awareness regarding incident in other workforce
would consist of following components: members too.
Identifying the roles that will participate in incident Success criteria: Successfully identifying which situations
reporting and response. qualify to be labeled as an incident and successfully
handling those uneventful events without
Providing role based training to the workforce compromising the security and mitigating the cost and
involved. time of recovery.

www.netspective.com 13
Risk 11: Not implementing the information systems security
protection tools to protect against malware
Explanation: It is important that you complete Documenting these incidents and their potential
regular and real time scans of your servers, outcomes.
workstations (including laptops and other electronic Employing automated mechanisms and tools to
devices), and information systems so that youre assist you in keeping a track of the incidents
able to identify and respond to the known or and collection and analysis of the information
suspected cases of security incidents. If youre not gathered as the result.
implementing these protocols, the security of your
ePHI and other critical business operations may get
compromised. Success Criteria: Improved protection against
malware, decrease in the incidence of malware
attacks and mitigation in the compromise of the
Mitigation: Mitigation steps may include: sensitive business components as the result of
malware attacks.
Identifying the known or suspected cases of
security incidents.
Decreasing, as much as possible, the harmful
effects of these incidents.

www.netspective.com 14
Risk 12: Not regularly reviewing information system activity

Mitigation: Establish a system for reviewing the


Explanation: Reviewing the activity of your business records of activity of information security system on
operations and system activity is a periodic process day to day basis. This includes reviewing incident
that you have to do on day to day basis. If youre tracking reports, audit logs, access reports and so
not doing that then perhaps youre overlooking on.
some very crucial threats to your system security.
Success Criteria: Being able to detect and analyze
any anomalies after reviewing information security
system activity records on daily basis.

www.netspective.com 15
Visit
http://www.netspective.com/opsfolio
E-mail : enquires@netspective.cc
Call : 202 656-6379

Thank You

Vous aimerez peut-être aussi