The US Division of Well being and Human Providers’ (HHS) Workplace for Civil Rights (OCR) has proposed new cybersecurity necessities for healthcare organizations with an intention to safeguard sufferers’ knowledge in opposition to potential cyber assaults.
The proposal, which seeks to switch the Well being Insurance coverage Portability and Accountability Act (HIPAA) of 1996, is a part of a broader initiative to bolster the cybersecurity of essential infrastructure, the OCR stated.
The rule is designed to strengthen protections for digital protected well being data (ePHI) by updating the HIPAA Safety Rule’s requirements to “higher tackle ever-increasing cybersecurity threats to the healthcare sector.”
To that finish, the proposal, amongst different issues, requires organizations to conduct a assessment of the expertise asset stock and community map, determine potential vulnerabilities that would pose a risk to digital data programs, and set up procedures to revive the lack of sure related digital data programs and knowledge inside 72 hours.
Different notable clauses embody finishing up a compliance audit at the least as soon as each 12 months, mandating encryption of ePHI at relaxation and in transit, implementing the usage of multi-factor authentication, deploying anti-malware safety and eradicating extraneous software program from related digital data programs.
The Discover of Proposed Rulemaking (NPRM) additionally necessitates that healthcare entities implement community segmentation, arrange technical controls for backup and restoration, in addition to carry out vulnerability scanning at the least each six months and penetration testing at the least as soon as each 12 months.
The event comes because the healthcare sector continues to be a profitable goal with ransomware assaults, not solely posing monetary threat but in addition placing lives at stake by disrupting entry to diagnostic gear and important programs that comprise affected person medical information.
“Healthcare organizations acquire and retailer extraordinarily delicate knowledge, which probably contributes to risk actors focusing on them in ransomware assaults,” Microsoft famous in October 2024. “Nonetheless, a extra vital motive these services are in danger is the potential for big monetary payouts.”
“Healthcare services positioned close to hospitals which can be impacted by ransomware are additionally affected as a result of they expertise a surge of sufferers needing care and are unable to assist them in an pressing method.”
In response to knowledge compiled by cybersecurity firm Sophos, 67% of healthcare organizations had been hit by ransomware in 2024, up from 34% in 2021. The basis trigger behind a majority of those incidents have been traced again to exploited vulnerabilities, compromised credentials, and malicious emails.
Moreover, 53% of healthcare organizations that had knowledge encrypted paid the ransom to revive entry. The median ransom fee was at $1.5 million.
The rise within the charge of ransomware assaults in opposition to the healthcare entities has additionally been complemented by longer restoration occasions, with solely 22% of victims absolutely recovering from an assault in per week or much less, a big drop from 54% in 2022.
“The extremely delicate nature of healthcare data and wish for accessibility will at all times place a bullseye on the healthcare trade from cybercriminals,” Sophos CTO John Shier stated. “Sadly, cybercriminals have realized that few healthcare organizations are ready to reply to these assaults, demonstrated by more and more longer restoration occasions.”
Final month, the World Well being Group (WHO), a United Nations company centered on world public well being, characterised the ransomware assaults on hospitals and healthcare programs as “problems with life and demise” and known as for worldwide cooperation to fight the cyber risk.