Benefits of HIPAA for Healthcare Professionals
It has been almost 27 years since the Health Insurance Portability and Accountability Act (HIPAA) was signed into law, more than 2 decades since the Privacy Rule was enacted, and this February will be the 20th anniversary of the HIPAA Security Rule. This article is the second in a series that explores the benefits of HIPAA, focusing on some of the ways that HIPAA has benefited healthcare professionals. The first article in the series covered the benefits of HIPAA for healthcare organizations. HIPAA was signed into law in 1996 by President Clinton and introduced standards in healthcare to improve efficiency, eliminate waste, combat fraud, and ensure that Americans could retain health insurance coverage when they are between jobs. When penning the legislation, Congress recognized the importance of the confidentiality of healthcare data and included provisions requiring the Secretary of the Department of Health and Human Services to establish standards for patient privacy and the transmission of electronic health information. Today, HIPAA is best known for these Rules, which restrict...
Hackers are Using AI Tools such as ChatGPT for Malware Development
There are many benefits of using AI in healthcare, including the acceleration of drug development and medical image analysis, but the same AI systems that benefit healthcare could also be used for malicious purposes such as malware development. The Health Sector Cybersecurity Coordination Center (HC3) recently published an analyst note summarizing the potential for artificial intelligence tools to be used by hackers for this purpose and evidence is mounting that AI tools are already being abused. AI systems have evolved to a stage where they can be used to write human-like text with a very high degree of fluency and creativity, including valid computer code. One AI tool that has proven popular in recent weeks is ChatGPT. The OpenAI-developed chatbot is capable of producing human-like text in response to queries and had more than 1 million users in December. The tool has been used for a myriad of purposes, including writing poems, songs, reports, web content, and emails, and successfully passed the Medical Licensing and Bar examinations. In response to the incredible popularity of...
Vulnerability Management and Remediation Deficiencies Identified at Alabama VA Medical Center
An inspection of information security at Tuscaloosa VA Medical Center in Alabama by the VA Office of Inspector General (OIG) uncovered deficiencies in three of the four assessed security control areas. The OIG inspection covered configuration management, contingency planning, security management, and access controls, with deficiencies identified in configuration management, security management, and access controls. Configuration management controls are required to identify and manage security features for all hardware and software components of an information system. OIG found deficiencies in vulnerability management, flaw remediation, and database scans. The Office of Information and Technology (OIT) routinely scans for vulnerabilities, and while OIG and OIT used the same vulnerability-scanning tools, OIT failed to identify all vulnerabilities. OIG identified 119 critical-risk vulnerabilities that OIT failed to detect. OIG also identified 301 vulnerabilities that had not been mitigated within the required 30- or 60-day windows, with 134 critical-risk vulnerabilities identified on...
Phishing Attack on Washington Therapist Exposes Patients’ PHI
A Washington therapist, Robert S. Miller LICSW, ACSW (RSM), has recently notified 640 current and former clients about a phishing incident that resulted in the exposure of some of their protected health information. State laws require notifications to be sent to state attorneys general when there has been a breach of the private information of state residents. The notifications typically provide the minimum information about privacy breaches, but in this case, the therapist explained exactly how the phishing attack played out. RSM had purchased an antivirus solution from the Iolo Software Company, and subsequently purchased an additional encryption program, which had disappeared from his computer. RSM was contacted by a person who claimed to be an Iolo employee who said he was aware that RSM’s computer had been hacked and requested access to clean the computer of viruses and malware. Access to the device was granted. RSM said he discovered this was a scam when the employee requested eBay cards worth $300. As a result of this incident, that individual had access to the computer from...



