| Literature DB >> 27437066 |
Dean F Sittig1, Hardeep Singh2.
Abstract
Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.Entities:
Keywords: Health information technology; cybersecurity; electronic health record; ransomware; socio-technical
Mesh:
Year: 2016 PMID: 27437066 PMCID: PMC4941865 DOI: 10.4338/ACI-2016-04-SOA-0064
Source DB: PubMed Journal: Appl Clin Inform ISSN: 1869-0327 Impact factor: 2.342
An Eight Dimensional Socio-technical Approach for Preventing or Mitigating Ransomware Attacks. (Based on Sittig & Singh’s Eight Dimensional Socio-technical model) [32]
| Socio-technical dimension | Recommendations for Health Care Organizations |
|---|---|
| Hardware/Software |
Perform regular backups of your data. Be sure to back up frequently (continuous or realtime backup may be ideal), and store your backups offline Maintain a “gold image” of system configurations (i.e., allows an organization to reset systems to the pre-attack state) Test your backup’s restore function regularly (e.g., quarterly for key data resources, yearly for less important aspects of the system) Keep your operating system, application software, browsers and plug-ins, firmware, and anti-virus software up-to-date with the latest patches Make sure your firewall is properly configured (e.g., require passwords on Remote Desktop Protocol [RDP] ports) Segment your network by categorizing IT assets (e.g., desktops, servers, routers), data, and personnel into groups, and restricting access to these groups using entry and exit traffic filtering Consider disabling USB (Universal Serial Bus) ports to prevent malicious software delivery Following a successful attack, disconnect the infected computers from the network Turn off wireless network functionality of the infected machine If the attack is widespread, shut down all network operations to prevent the malware from spreading |
| Clinical Content |
“Whitelist”, or allow only specified programs to run, while blocking all others, to prevent malicious executables from running Block email messages with attachments *.exe, *.zip, *.rar, *.7z, *.js, *.wsf, *.docm, *.xlsm, *.pptm, *.rtf, *.msi, *.bat, *.com, *.cmd, *.hta, *.scr, *.pif, *.reg, *.vbs, *.cpl, and *.jar from suspicious sources |
| User Interface |
Legitimate Messages Should Have A Telephone Number Someone Can Call (I.E., Out Of Band Check), And A Personal Email Address Which Has A Legitimate User Name That People Can Check In Their Local Directory; Email And Website Links Should Display Complete Internet Address (Url) To Build Trust Often The First Indication That An Attack Has Occurred Is An Alarming Message Sent To The Desktop Background, Or A Window Opens To A Ransomware Program That You Cannot Close, With Instructions On How To Pay The Ransom; Users Should Turn Off The Computer And Report It To Their It Support Team Immediately |
| People |
Do not follow unsolicited Web links in emails Users are trained on ransomware prevention strategies, including how to identify malicious e-mails (i.e., spam, phishing, and spear-phishing messages), and avoid clicking on potentially weaponized attachments (such as a *.exe, *.zip, *.rar, *.7z, *.js, *.wsf, *.docm, *.xlsm, *.pptm, *.rtf, *.msi, *.bat, *.com, *.cmd, *.hta, *.scr, *.pif, *.reg, *.vbs, *.cpl, *.jar files). Safe file attachment formats include *.jpg, *.png, *.pdf, *.docx, *.xlsx, and *.pptx Train users not to use USB flash drives unless the drives are obtained from a trusted source Restrict users’ administrative privileges on local desktops and laptops. For users who require administrative access, configure 2 accounts, one with administrative privileges that is used only when necessary, and one with more restrictive privileges that they use for routine activities, including reading email and browsing the Internet Restrict the ability of users to “write” (i.e., create and delete files), on shared drives of departmental or group shares |
| Workflow/communication |
Scan all software downloaded from the internet prior to executing it Conduct simulated phishing attacks (i.e., fraudulent email messages or websites that appear to be from legitimate sources), to raise user’s awareness of the problem Conduct mock system recovery exercises (i.e., identify backups and test restore capabilities) Conduct regular risk assessments Require 2-factor authentication for remote access to applications Consider using organization-wide password reset (expiration) in response to a successful attack |
| Internal Policies, Procedures, and Environment |
Based on risk and business impact assessments, identify applications and data based on importance to the business (e.g., Tier 0 – essential for business operations; Tier 1 – 1 hour downtime acceptable; Tier 2 – 1 day downtime acceptable; Tier 3 – 1 week downtime acceptable) – Develop a plan to manage a ransomware situation accordingly Restrict users’ ability to install and run software applications using the principle of “Least Privilege,” or minimize users’ access to only those systems and services required by their job IT security should be under the control of executives with extensive IT experience (e.g., CIO or Chief Information Security Officer) Consider blocking users’ access to personal email accounts (e.g., Gmail, Yahoo, Hotmail, iCloud) and web advertisements to avoid malvertising (i.e., insertion of malicious code into online advertisements to infect unsuspecting users) |
| External Rules and Regulations |
Review all information security-related HIPAA requirements Contact your organization’s insurance provider, a computer forensics expert, and the FBI in the event of a successful attack |
| Measurement and Monitoring |
Monitor network activity to identify suspicious activity Monitor the external environment for security incidents and address gaps and deficiencies as they are identified Following unexpected extended system downtime (e.g., ransomware), convene an investigation team consisting of key stakeholders and Health IT professionals to review the event and its management, identify potential root causes, and discuss future prevention or mitigating procedures |