OCR: Avoiding Security Rule Lapses Can Guard Against Common Cyberattacks

Cyberattacks and ransomware demands have exploded in the health care sector in recent years, leading to multiple large breaches. But an analysis of those large breaches by the HHS Office for Civil Rights (OCR) has found common shortcomings that other organizations should address to prevent their own security incidents, a top OCR official said.

Nick Heesters, senior advisor for cybersecurity for the Health Information Privacy, Data, and Cybersecurity Division of OCR, said in a recorded webinar released Oct. 23 that proper implementation of HIPAA Security Rule provisions can help organizations prevent, detect, mitigate and recover from security incidents and breaches.[1]

The types of large breaches—those affecting 500 or more individuals—reported to OCR over the last five years have changed, Heesters explained. Breaches attributed to hacking or information technology (IT) incidents accounted for 49% of all large breaches cumulatively from September 2009 through December 2022; however, from January through September 2023, hacking and IT incidents accounted for 77% of all large breaches, he said.

Meanwhile, theft of devices containing protected health information (PHI)—which used to be far more common as a type of large breach—only accounted for 2% of all breaches in the first nine months of 2023, Heesters said.

“The big takeaway from this data is that a hacking breach is the most common type of large breach that a regulated entity is likely to experience,” he said. “This is consistent with what OCR observed last year, where hacking was about 79% of the large breaches reported to OCR in 2022.”

OCR has seen a 239% increase in large breaches involving hacking from 2018 to 2022, Heesters said, adding, “For ransomware, it’s a 278% increase for the same time frame. This is the largest cybersecurity threat facing the health care industry and the protected health information it holds.”

When it comes to the location of large breaches, data spanning the years from 2009 through 2022 shows that 31% of large breaches occurred in network servers, while 21% occurred in email systems, and 17% occurred in paper records, Heesters said.

For the first nine months of 2023, network server-based breaches were far more dominant, representing 67% of all large breaches, he said. Email system-based breaches fell slightly to 18% of all large breaches. Paper records represented only 5% of large breaches. “In sum, network servers and email accounted for 85% of the large breaches reported to OCR this year,” he said.

This document is only available to subscribers. Please log in or purchase access.
 


Would you like to read this entire article?

If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

* required field