37
MOBILE SECURITY THE CHALLENGE FOR HEALTHCARE Andrew Plato, CISSP, CISM, QSA Tom Henault President / CEO North American Data Protection Specialist Anitian Enterprise Security Sophos Inc.

Challenges of Mobile Security & BYOD in Healthcare

  • Upload
    anitian

  • View
    644

  • Download
    1

Embed Size (px)

DESCRIPTION

Healthcare in America is changing. New rules, new laws, new technologies and new expectations are driving healthcare providers to adapt to new ways of delivering services. Mobile technologies are a key part of making healthcare portable and personal. Tablets, smartphones and other handheld devices can give practitioners the freedom they need to deliver services with the speed and reliability patients expect. However, this increased focus on mobility carries numerous security risks. Malware, attacks, and theft can jeopardize data confidentiality and damage patient trust. Moreover, the new HIPAA Omnibus ruling puts increased focus on the need to secure electronic patient health information (ePHI). Join Anitian Enterprise Security and Sophos as we explore the challenges of mobility in healthcare. Anitian will outline some of the new changes to HIPAA as well as effective strategies for securing mobile devices. Sophos will discuss technologies and techniques that can deliver strong security and protection, without sacrificing the freedom and accessibility practitioners require. The presentation will conclude with an quick walk through of Sophos Mobile Security solution and the features it provides to protect healthcare data.

Citation preview

Page 1: Challenges of Mobile Security & BYOD in Healthcare

MOBILE SECURITYTHE CHALLENGE FOR HEALTHCARE

Andrew Plato, CISSP, CISM, QSA Tom HenaultPresident / CEO North American Data Protection Specialist Anitian Enterprise Security Sophos Inc.

Page 2: Challenges of Mobile Security & BYOD in Healthcare

Introductions

• Andrew PlatoPresident / CEOAnitian Enterprise Security

• Tom HenaultNorth American Data Protection SpecialistSophos, Inc.

Page 3: Challenges of Mobile Security & BYOD in Healthcare

Agenda

• Going mobile• Impact of HIPAA / HITECH on mobility• Solutions for Mobile Security• OPTIONAL: Sophos MDM Review

Page 4: Challenges of Mobile Security & BYOD in Healthcare

NOT On the Agenda

• EMR Implementations • Ridiculous promises• Frothy, sensationalist nonsense • Horror stories• Statistics

Page 5: Challenges of Mobile Security & BYOD in Healthcare

GOING MOBILE

Challenges of Mobility in Healthcare

Page 6: Challenges of Mobile Security & BYOD in Healthcare

What Are the Issues that Affect Mobility in Healthcare?

• People• Data• Apps• Access • Compliance (HIPAA/HITECH)

Page 7: Challenges of Mobile Security & BYOD in Healthcare

People

• Benefits• Mobility enables people to work better• People are comfortable with tablets, smartphones, laptops• Users demand it

• Challenges• Do you trust your users? • Do they have the ability to make sound decisions about

threats and risk? • What policies and procedures are necessary to make mobility

work?• How can you handle personal devices?

Page 8: Challenges of Mobile Security & BYOD in Healthcare

Data

• Benefits• Allows staff to access information anywhere• Rapid access to data to serve clients better

• Challenges• What are the threats to the data? • How do you protect the data? • How do you control access to data? • What happens if data is lost or stolen?

Page 9: Challenges of Mobile Security & BYOD in Healthcare

Applications

• Benefits• Mobile apps can completely redefine workflow • Easy to use and learn

• Challenges• How do you controls what apps do what?• How do you prevent malware apps? • How do you balance personal apps vs. company apps

Page 10: Challenges of Mobile Security & BYOD in Healthcare

Compliance

• Benefits• You have a lot of control over your compliance efforts• There are no specific requirements for mobility in the

relevant regulations• Challenges

• How do you craft a BYOD strategy to align with HIPAA/HITECH & Meaningful Use?

• How can mobile security help with preventing breaches? • How do you prove compliance?

Page 11: Challenges of Mobile Security & BYOD in Healthcare

Why is Mobility So Hard for Healthcare?

• Caregivers demand access and do not want roadblocks• Data is extremely sensitive • HIPAA/HITECH• A single breach can be disastrous • Healthcare networks are large, complex and diverse • Mobile devices and apps are maturing rapidly • There is no one product or solution that protects mobile

platforms

Page 12: Challenges of Mobile Security & BYOD in Healthcare

IMPACT OF HIPAA/HITECH

Challenges of Mobility in Healthcare

Page 13: Challenges of Mobile Security & BYOD in Healthcare

What Are the Threats

• Lost / theft • Personal entanglement • Malware • Content sharing • Phishing • Toll fraud• Productivity loss • Breach

• Reputational damage• Legal liability• HHS Fines • Breach notification costs• Estimated cost: $197 per

record lost

Page 14: Challenges of Mobile Security & BYOD in Healthcare

Costs Are Considerable

• Regulatory fines, penalties• Lawsuits and civil action have larger cost than fines• Response costs

1. Forensic analysis2. Notification and communication costs3. Credit, identity monitoring

• Audits are required – to ensure you meet: 1. Privacy rule2. Security rule3. Breach notification rule

Page 15: Challenges of Mobile Security & BYOD in Healthcare

Leading Causes of Breaches

15.90%

47.80%

14.90%

10.90%

5.93%Theft

Loss of Media

Unauthorized access oruse (hacking)

Human or technical error

Improper disposal

Page 16: Challenges of Mobile Security & BYOD in Healthcare

What Has Changed?

• HIPAA Omnibus announced in Jan 2013, in effect Sept 2013 now includes: • Covered entities• Business Associates • Contractors• Subcontractors

• Business Associates also required to encrypt PHI• HITECH also requires PHI breach notification, which was not part

of the original HIPAA rules• Must conduct a “good faith effort” risk assessment for any

suspected breach

Page 17: Challenges of Mobile Security & BYOD in Healthcare

HIPAA Security Rule Safeguards

• Access controls to restrict access to PHI to authorized personnel only

• Audit controls to monitor activity on systems containing e-PHI, such as an electronic health record system

• Integrity controls to prevent improper e-PHI alteration or destruction

• Transmission security measures to protect e-PHI when transmitted over an electronic network

Page 18: Challenges of Mobile Security & BYOD in Healthcare

How Do You Stay Compliant?

• Conduct an organizational risk assessment (this is required!)• Develop a HIPAA/HITECH compliance program• Classify data• Encrypt anything that you can easily pick up and walk out the

door with (laptops, tablets, mobile devices)• Control access (UTM, ACLs, etc.), core firewalls • Unify authentication & authorization to a common platform

(which is monitoring and audited)• Monitor & audit all access (SIEM)• Implement IDS/IPS organizational wide • Implement DLP, control content • Develop sound IR practices

Page 19: Challenges of Mobile Security & BYOD in Healthcare

SOLUTIONS FOR MOBILE SECURITY

Challenges of Mobility in Healthcare

Page 20: Challenges of Mobile Security & BYOD in Healthcare

What Policies / Procedures Are Necessary?

• Develop Mobile Security Strategy• Authority - Who is responsible for mobile security? • Define Resources – Money and people to implement the strategy. • Establish Need – Business justification for mobile security. • Requirements – What your mobile security solutions must do• BYOD – How will you handle personally owned devices? • Awareness – A program to educate and inform users. • Policy - Organizational policy and standards for mobile security and

operational authority.

• Update Incident Response Practices• IR Procedures should specifically address mobile security incidents• Train staff on procedures to report loss, theft or suspected breach• Update procedures to include risk assessment for suspected breach

More…

Page 21: Challenges of Mobile Security & BYOD in Healthcare

What Policies / Procedures Are Necessary?

• Have a Mobile Security Policy • Sophos has a great template in their Mobile Security Toolkit:

http://bit.ly/10zDpHP• Acceptable use• Rules for personal devices• Explain how devices will be reset / wiped• Define classes of employees and the access they have

• Have a Mobile Security Standard• Define the technical requirements for mobility in your environment• Supported platforms• MDM Rules

Page 22: Challenges of Mobile Security & BYOD in Healthcare

How Do You Control Access?

• Segment the network, implement a core firewall• Separate mobile devices to protected (wireless) networks• Implement standard UTM functionality (IPS, web filtering, AV,

application control, DLP, etc.) • Implement MDM• Require passcodes or smart cards on mobile devices • Use VPN clients for remote access• Prevent use of unauthorized USB drives • Use application delivery framework, such as Citrix or Remotium

Page 23: Challenges of Mobile Security & BYOD in Healthcare

How Do You Protect Data?

• If it moves, encrypt it: USB drives, laptops, systems, smartphones, tablets, backup tapes, etc.

• Use strict access controls on applications• Control, filter, encrypt and monitor email • Use application delivery framework (Citrix, Remotium, etc.)• Forbid storing data on mobile devices• Wipe devices immediately if lost or stolen• Implement DLP: network, email, web, systems, mobile • Implement database monitoring (DAM)

Page 24: Challenges of Mobile Security & BYOD in Healthcare

How Do You Control Apps?

• Create your own App store• Prohibit jail-breaking with MDM rules• Deploy endpoint malware monitoring on Android• Use network controls on UTM devices to block bothersome or

dangerous apps• Implement application compliance on MDM • Use application delivery framework (Citrix, Remotium, etc.)

Page 25: Challenges of Mobile Security & BYOD in Healthcare

How Do I Make this Work?

• HIPAA does not say “protect smartphones” is says “protect data, and disclose if you fail”

• Find your data, know where it is and who needs to use it• Automate enforcement – take users out of the protection loop

where possible• Look to the entire infrastructure, not just phones• Own the devices, avoid sharing personal devices where possible• Create classes of user, with stronger restrictions on users that

access PHI• Train users about the threats and good practices

Page 26: Challenges of Mobile Security & BYOD in Healthcare

SOPHOS MDM REVIEW

Challenges of Mobility in Healthcare

Page 27: Challenges of Mobile Security & BYOD in Healthcare

MDM: Key functionality today

SMCManage and control devices

SMCaaS

SMCManage apps

SMCaaS

SMCControl email access

SMCEnforce compliance

SMCaaS

Page 28: Challenges of Mobile Security & BYOD in Healthcare

Sophos Mobile Control Key functionality

SMCManage and control devices

SMCaaS

SMCManage apps

SMCaaS

SMCControl email access

SMCEnforce compliance

SMCaaS

SMCMobile Security

SMCaaS

optional

Page 29: Challenges of Mobile Security & BYOD in Healthcare

Control, secure, protect

Sophos Mobile Control - Mobile Device ManagementOn-premise or cloud-based solution to manage, control and protect mobile devices.Enable BYOD without the risks

Sophos Mobile Security – Anti-Virus for AndroidScans for malicious data-stealing apps and provides loss and theft protection. Free download Protect devices from Android malware

Sophos Mobile Encryption – Mobile Data ProtectionExtends SafeGuard Encryption for Cloud Storage to mobile devices – iOS or Android*Ensure persistent encryption

Page 30: Challenges of Mobile Security & BYOD in Healthcare

Sophos Mobile Control allows group or user-based compliance rules, to put fewer limitations on managed personal devices

Mixed ownership – on the road

Corporate device

Compliance rules Blacklisted apps Data roaming What happens when …

Personal device

Compliance rules Blacklisted apps Data roaming What happens when …

Page 31: Challenges of Mobile Security & BYOD in Healthcare

Secure access – on the road

Notebook

Cloud Storage

Mobile Device

We make the use of Dropbox & co. secure, our app extends that data protection to mobile devices

Page 32: Challenges of Mobile Security & BYOD in Healthcare

Mobile Security: settings in SMC

Web protection

The admin defines:• What to scan• When to scan• What the user can do

Additionally they can:• Trigger a scan• Set up web filtering• Block/wipe/lock an

infected or out of date device (compliance)

Page 33: Challenges of Mobile Security & BYOD in Healthcare

Mobile Security: compliance

Mobile security

Page 34: Challenges of Mobile Security & BYOD in Healthcare

Anti-malware – on the road

SOPHOSLiveConnect

SMC admin console

Page 35: Challenges of Mobile Security & BYOD in Healthcare

Keep malware at bay

Free Managed

Page 36: Challenges of Mobile Security & BYOD in Healthcare

Web Security – on the road

SOPHOSLiveConnect

Mobile Security – Enterprise• optional add-on to SMC• included in all of our suites• uses our threat intelligence

Great differentiator between us and key MDM competitors

Page 37: Challenges of Mobile Security & BYOD in Healthcare

Thank YouEMAIL: [email protected] for a

copy of the presentationWEB: www.anitian.comBLOG: blog.anitian.comCONTACT: Andrew Plato, CISSP, CISM, QSA

President / [email protected]