HITECH Compliance Checklist
Any businesses subject to HIPAA compliance are advised to use a HITECH compliance checklist to help ensure they meet the requirements of the Health Information Technology for Economic and Clinical Health Act – an Act passed in 2009 to facilitate the adoption and Meaningful Use of EHRs and to better protect PHI maintained on, or transmitted between, health IT systems. The passage of HITECH not only incentivized healthcare providers to adopt health information technology, but also set the ball rolling for a technological revolution in healthcare. Prior to the HITECH Act 2009, the rate of EHR adoption throughout the healthcare industry was just 3.2%. By 2017, 86% of office-based physicians and 96% of non-federal acute care hospitals had adopted EHRs. HITECH also led to the expansion of Health Information Exchanges and facilitated innovation in the healthcare industry. However, the objective to increase adoption of health information technology also raised concerns about the security of healthcare data stored on EHRs and shared between HIPAA covered entities and business...
CISA Shares Best Practices for Improving the Security and Resilience of Critical Infrastructure
November is Critical Infrastructure Security and Resilience Month, a month dedicated to improving awareness of the importance of strengthening critical infrastructure security and resilience. This annual effort is led by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and focuses on educating and engaging the government, critical infrastructure owners and operators, and the public about the role of critical infrastructure in the functioning of society and the economy, and how the safety and security of the nation depend on the ability of critical infrastructure owners to operate and withstand physical and cyber threats and to ensure steps are taken to improve security and resilience. Critical infrastructure is targeted by ransomware groups due to the massive disruption that can be caused, increasing the probability of a ransom being paid. State-sponsored threat actors target critical infrastructure to obtain sensitive information or cause destructive attacks that can trigger economic and social upheaval and cause fear and uncertainty. Critical infrastructure...
Organ Transplant Coordinator Gets 2-Year Jail Term for Illegally Accessing Health Records of Supreme Court Judge
In July this year, a federal jury convicted a former resident of Arlington, VA, for illegally accessing the medical records of Supreme Court Justice Ruth Bader Ginsburg while employed as an organ transplant coordinator, although was acquitted on the charge of publishing that information online. Trent James Russell, 34, was employed by an organ transplant coordination entity between 2017 and 2019 and in January 2019, remoted accessed Ginsburg’s medical records and took a screenshot of those records. When Russell discovered that his access to medical records had been disabled, he formatted his hard drive to destroy evidence and obstruct the law enforcement investigation. Russell was recently sentenced to 2 years in prison by U.S. District Judge Michael S. Nachmanoff. August 2, 2024: Organ Transplant Coordinator Convicted of Illegally Accessing Health Records of Supreme Court Judge An organ transplant coordinator has been found guilty of illegally accessing the health records of Supreme Court Justice Ruth Bader Ginsburg and deleting evidence but was acquitted on the charge of...
Planned Parenthood Ransomware Attack Affects 56,917 Patients
Planned Parenthood of Montana has shared further information on the RansomHub ransomware attack that was first announced in early September. When the security breach was announced, the investigation was still in the early stages, and it was unclear if the ransomware group had stolen any patient data. Planned Parenthood has now confirmed that the protected health information of 56,917 individuals was stolen in the attack. As previously announced, suspicious activity was identified within its computer network on August 28, 2024. An investigation was launched and on September 6, 2024, it was confirmed that unauthorized actors had accessed its network and exfiltrated copies of documents that contained some patient information. The ransomware group had access to its network and exfiltrated files between August 24, 2024, and August 28, 2024. The files were reviewed over the following weeks to determine the types of information involved. Planned Parenthood has now confirmed that the compromised data included names, addresses, dates of birth, medical record numbers, health insurance...
Ransomware Attack Severity Increased 68% in H1, 2024
The use of ransomware in cyberattacks decreased slightly in the first half of the year; however, the severity of ransomware attacks increased according to the 2024 Cyber Claims Report: Mid-Year Update from cyber insurance and security service provider Coalition. For the report, Coalition examined claims against cyber insurance policies between January 1, 2024, and June 30, 2024. Claims by businesses with less than $25 million in revenue fell by 4% to an average of $73,000 per incident but claim amounts increased for all other businesses. Claims by businesses with revenues between $25 million and $100 million increased by 23%, with average losses of $129,000 per incident and there was a 140% increase in losses at businesses with $100 million or more in revenue, with average losses rising to a record high of $307,000 per incident. While there was an overall increase of 14% in claims severity in H1, 2024, largely driven by the increase in ransomware attack severity, Coalition saw the lowest frequency of claims since H2, 2022. There was a slight reduction in ransomware-related claims...



