<link rel="stylesheet" type="text/css" href="https://newamericadotorg-static.s3.amazonaws.com/static/css/newamericadotorg.min.css"></link>

What Can We Do to Address Our Dizzyingly Vulnerable Medical Data?

If you’re reading this, your personal information has probably been hacked.

Almost certainly, you had your social security number compromised in the massive Equifax breach. You probably had a credit card number stolen in the skim of systems at Target, Kmart, UPS, Staples, Home Depot, Neiman Marcus, Hilton, Dairy Queen, or T.J. Maxx. You may have been one of the 21.5 million federal employees who had their private information pilfered in a malware attack. You likely had an old password pilfered from a hack of Yahoo, Linkedin, AOL, Adobe, Ebay, Twitter, or Slack.

Though they’re less frequently talked about, the electronic medical records systems used by health systems and hospitals, health insurance companies, and their many thousands of third-party partners are just as vulnerable to breaches as many of the high-profile targets mentioned above. And the damages a serious healthcare breach could wreak are a lot more consequential.

While medical data and hospital functions may not seem as enticing to hackers as SSNs or banking information, they’re actually more valuable. Experian, for example, estimates that health records are worth up to 10 times more than credit card numbers on the black market (some experts even put it as high as 100x). This is, in part, because criminals can use medical data for a variety of damaging purposes, including prescription fraud, insurance claim fraud, abusive ad targeting, and even blackmail. And, unlike a credit card, medical records mostly contain information that can’t be cancelled or changed and that is much more personal than a string of numbers. Think of all the information a provider might have: a patient’s complete psychiatric record, sexual history, sensitive diagnoses, medication histories, and more. There’s a reason the government has ironclad laws like HIPAA that require healthcare record holders to protect the privacy of this kind of patient data.

Though we haven’t seen an Equifax-scale incident hit healthcare yet, a quiet epidemic of medical data breaches has already started. The Protenus Breach Barometer reports that 477 health data breach incidents occurred in 2017 (Editors note: In addition to being one of our outstanding Fellows, Robert Lord is also the co-founder and President of Protenus). In the past three years, hackers have leveraged ransomware to cripple hospitals across the world, shutting down operations for days at a time until the ransom is paid. In the WannaCry attack that hit around 200,000 systems in May 2017, doctors were blocked from accessing patient files and emergency rooms were forced to send sick people away. In 2015, hackers, likely acting on behalf of a foreign government, accessed a database kept by the insurance company Anthem that contained records of approximately 78.8 million consumers and staff. In the last three years, almost half of Americans’—over 160 million individuals—sensitive health information has been exposed through data breaches.

Just weeks ago, news broke that a group known as Dark Overlord hacked into the systems of London Bridge Plastic Surgery, a business that allegedly caters to elite, celebrity, and royal clientele. According to The Daily Beast, the collective claims the trove of data they stole includes graphic photos of "in-progress genitalia and breast enhancement" and post-op patient bodies that include faces. As Jacob Brogan wrote for Slate’s "Future Tense",it should serve as a chilling warning about how vulnerable our sensitive medical data can be.

Over the past decade, healthcare has has transformed from a heavily analogue, paper-based paradigm for record-keeping to one that is almost entirely digital.  The federal government, hospitals, and providers have rightly pushed for this migration from paper to electronic medical records, which allow for more efficient and accurate sharing of patient information across facilities (though controversies and challenges remain on this front). Thanks in part to a $30 billion investment authorized by Congress in the HITECH Act, over 96 percent of hospitals now use some form of electronic health records (EHRs).

With this increase in the amount of electronic patient data comes a new set of complex security concerns. Increasingly, patients are given access to their data through online patient portals. Health Information Exchanges (HIEs) give providers a means to improve patient safety, quality of care, and to reduce healthcare costs, but do so by allowing them to access patient data from facilities other than their own.  Trends like telehealth (a broadly-defined set of technologies used to care for, monitor, and educate patients), personalized medicine, and population health have also led healthcare technologists and advocates to push for more and easier modes to view, track, and update health information. While third parties like community physicians, affiliates, and vendors are often long-time trusted partners, they constitute yet another large segment of new EHR users with access to patient data. As more individuals gain access to patient information, significant new patient privacy monitoring challenges also rise.

Indeed, though this increasing flow of data gives patients and providers greater autonomy and choice, each access point becomes a potential weak link that hackers can exploit.

So, here’s the question we have to answer: what can we do to address our dizzyingly vulnerable medical data?

In short, continue to build the capacity of the healthcare sector to combat these emerging cyber threats. According to cybersecurity professionals, a single technical solution is insufficient to protect data, so they often suggest employing “layered defenses,” a strategy that, as the name suggests, takes a layered approach to securing information. This might include using multiple technologies such as anti-virus solutions and firewalls, tools such as multi-factor authentication and encryption that make data inaccessible in the case of an attack, and training modules that inform employees how to identify phishing emails. With each layer, it becomes harder for bad guys to make their way to the crown jewels: data with high commercial or political value. The harder it is to compromise our systems, the more likely cyber criminals are to look for easier targets outside of healthcare.

However, even in cases where healthcare technologists are fortifying medical data defenses, they’re usually making the problematic assumption that the bad guys will always come from outside of their organization. Because healthcare workers are responsible for your care, they have (and need) privileged access to your health data. But with the wrong intentions, they are also insiders who might benefit or profit from it. Whether a curious nurse looks up the medical history of a professional athlete, a doctor inappropriately views the records of colleagues, a technician reviews lab results for a spouse during a bitter divorce, or an insurance auditor batch downloads claim records, these everyday breaches can have huge consequences for the lives, livelihoods, and dignity of patients.

While it’s heartening to see healthcare organizations allocating resources to stopping external threats to patient data—85 percent of healthcare organizations have increased cybersecurity spending the past year, and 12 percent increased these budgets by more than 50 percent—over 40 percent of healthcare breaches this year have stemmed from insider activity. It’s clear that healthcare organization needs to also invest in solutions to curb dangerous insider behavior. 92 percent of healthcare IT decision-makers reported that their organizations are vulnerable to insider threats and 62 percent of respondents identified privileged users—those who have access to all resources available from systems they manage—as the most dangerous type of insider. Think a mid-level employee hoping to skim a bit off the top of the firm’s transactions, or a mole sent in by a criminal network to scrape account numbers.

So, perhaps to slightly edit the first question we posed: What can we do to address our medical data that is increasingly vulnerable to healthcare insiders?

Three key stakeholder groups need to be involved.

The first is healthcare institutions, which would be well-suited to take a lesson from the financial sector’s playbook on tackling this challenge in the electronic banking realm. The industry has in large measure been successful because financial institutions have invested heavily in identifying good cybersecurity practices and training their employees, attracting top cybersecurity talent, and investing in innovative technical solutions. Today, most major financial institutions now deploy layers of security to combat both external and internal threats to the integrity of their systems. This means that they install firewalls, anti-virus, two-factor authentication and the like, as well as behavior monitoring analytics that gather insight and continuously monitor how users move throughout systems and interact with sensitive data. Today, with help of insight available from these monitoring systems, less than 5 percent of financial data breaches come from insiders, a statistic that healthcare organization should strive for.

The government plays a central role not only in establishing standards that ensure healthcare organizations’ privacy and security.  However, over the past decade, it has devoted a disproportionate amount of effort and capital to the digitization and interconnection of America’s health IT infrastructure, implicitly prioritizing modernization over security, privacy and safety. Now, it must incentivize the adoption of practices and technologies that help combat both internal and external threats in order to ensure the safety of the infrastructure that it has helped build.

Patients are the third, and as always, most important, stakeholder. After all, it is their wellbeing that is at stake when it comes to healthcare privacy breaches. Trust serves as the basis of any long-term patient-provider relationship. As technology plays an increasingly important role in delivering healthcare, diagnosing disease, and facilitating patient-provider communication, patients must be able to trust these systems just as they do their doctors. It is in our own best interests for all of us to hold systems accountable and vote with our wallets—if our health systems won’t make the changes necessary to protect our data (and make these technologies and policies transparent to anyone who would like to learn about them), we should consider finding more trustworthy providers.

Digitizing medical records and health data systems has done enormous good in making care more efficient and giving more power to patients in their health decisions. But it has also opened patients to new risks. Millions of patients have had sensitive diagnoses exposed over the years from data breaches, and we are not doing enough to be able to credibly tell them that this won’t continue to happen. If we are to augment (or even maintain) the gains that we’ve made in healthcare’s digital transformation, we must prioritize the trustworthiness of these new technologies, and respect the sacred obligation that we have to defend our patients from harm and indignity.