Here Come the Cyber RACs: DHS Cybersecurity Task Force Releases Report — Says Current Guidelines Inadequate

Last week, the U.S. House of Representatives Committee on Energy and Commerce held a hearing on cybersecurity in healthcare. The U.S. Department of Homeland Security (DHS) Cybersecurity Task Force also just released a report suggesting that current guidelines are not adequate to meet the current situation.

The hearing was prompted by the recent wave of ransomware infecting healthcare providers worldwide, one of the most significant such attacks in history.

A recent survey on Monitor Monday, revealed that 80 percent of respondents considered cybersecurity to be either a “red hot” or “hot” topic in healthcare. Hospitals are under attack, at risk of losing their electronic medical records (EMRs). Malware infects hospitals’ information systems, then encrypts their data. In order to get the electronic “key” to unlock the data, a ransom must be paid. 

Here is a typical message:

“Your important files are encrypted. Many of your documents, photos, videos, databases, and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee that you can recover all your files safely and easily. You have only three days to submit the payment. After that, the price will be doubled. Also, if you don’t pay in seven days, you won’t be able to recover your files forever.”

Not only healthcare establishments are vulnerable. This week the University College London (UCL) was hit with the infamous WannaCry malware. The National Security Agency (NSA) has tied this malware to North Korea, a regime long known for nefarious activities. Ransomware from that country is said to have infected more than 300,000 systems in 150 countries. Entire web hosting companies have been infected, resulting in the complete collapse of hundreds of websites and all associated cloud services supplying enterprise software.

The heartland is vulnerable. The most recent reported attack on a hospital in the United States took place late last week at the Waverly Health Center, a hospital in Cedar Falls, Iowa. A few weeks ago, ransomware hit a senior living community in Dallas, Texas. It is impossible to keep track of this deluge of malware attacks against hospitals and other healthcare facilities.

Cybersecurity Framework for Healthcare Providers

Consideration is being given to modifying Section 405(d) of the Medicare law with a view toward developing a “cybersecurity framework.” Federal agencies would be asked to harmonize “existing and future laws and regulations” across the healthcare industry. Work would begin on identifying best practices that are “scalable” from the smallest to largest healthcare organizations.

The Cyber Security Task Force report calls for the U.S. Department of Health and Human Services (HHS) to create a “cybersecurity leader role” to help align efforts across the nation’s healthcare sector. It is not entirely clear what “align” means. This leadership nexus would serve as a “single point of entry for health care industry partners” needing to share information on cyber threats.

The Stark Law and the Anti-Kickback Statute also may be modified to make it possible for cybersecurity organizations to share information and recommend software to physicians.

Medical devices are a particular area of concern. A task force is being put together to study the cybersecurity of all forms of medical devices, including implants. This promises to be a complex and difficult job, but it is viewed as being imperative.

As it creates new products, the government may start to require medical device manufacturers to adopt a secure systems development lifecycle (SDLC). Eventually, we may see approval of medical devices becoming contingent upon certification that they have been developed according to these more rigorous standards.

The backbone information systems that run healthcare are of great concern as well. It is generally recognized that many of these older systems are not as up-to-date on cybersecurity as they should be. More effort will be put into study of how these legacy information systems can be made less vulnerable to malware and other forms of hacking.

In order to better coordinate a national response to cyberattacks, the government will create MedCERT: The Medical Computer Emergency Readiness Team.

There are many recommendations and observations in the just-released report. It should be mandatory reading for every employee of ICT in every single healthcare organization across the United States.

We can be reasonably sure that eventually, healthcare organizations will be audited to make sure that they are in compliance with government-approved and certified cybersecurity practices. This was attempted in the past, but this new wave of malware has revived the notion. Thus, an entire new industry of auditors could be created: The Cyber RACs (Recovery Audit Contractors).

RACmonitor will continue to keep an eye on these developments. 

Facebook
Twitter
LinkedIn

Edward M. Roche, PhD, JD

Edward Roche is the director of scientific intelligence for Barraclough NY, LLC. Mr. Roche is also a member of the California Bar. Prior to his career in health law, he served as the chief research officer of the Gartner Group, a leading ICT advisory firm. He was chief scientist of the Concours Group, both leading IT consulting and research organizations. Mr. Roche is a member of the RACmonitor editorial board as an investigative reporter and is a popular panelist on Monitor Mondays.

Related Stories

Key Takeaways from CHIACON 2025

Key Takeaways from CHIACON 2025

I had the pleasure of attending the annual California Health Information Conference in Long Beach, California, as an attendee and as a speaker, last week.

Read More

Leave a Reply

Please log in to your account to comment on this article.

Featured Webcasts

Mastering Principal Diagnosis: Coding Precision, Medical Necessity, and Quality Impact

Mastering Principal Diagnosis: Coding Precision, Medical Necessity, and Quality Impact

Accurately determining the principal diagnosis is critical for compliant billing, appropriate reimbursement, and valid quality reporting — yet it remains one of the most subjective and error-prone areas in inpatient coding. In this expert-led session, Cheryl Ericson, RN, MS, CCDS, CDIP, demystifies the complexities of principal diagnosis assignment, bridging the gap between coding rules and clinical reality. Learn how to strengthen your organization’s coding accuracy, reduce denials, and ensure your documentation supports true medical necessity.

December 3, 2025

Proactive Denial Management: Data-Driven Strategies to Prevent Revenue Loss

Denials continue to delay reimbursement, increase administrative burden, and threaten financial stability across healthcare organizations. This essential webcast tackles the root causes—rising payer scrutiny, fragmented workflows, inconsistent documentation, and underused analytics—and offers proven, data-driven strategies to prevent and overturn denials. Attendees will gain practical tools to strengthen documentation and coding accuracy, engage clinicians effectively, and leverage predictive analytics and AI to identify risks before they impact revenue. Through real-world case examples and actionable guidance, this session empowers coding, CDI, and revenue cycle professionals to shift from reactive appeals to proactive denial prevention and revenue protection.

November 25, 2025
Sepsis: Bridging the Clinical Documentation and Coding Gap to Reduce Denials

Sepsis: Bridging the Clinical Documentation and Coding Gap to Reduce Denials

Sepsis remains one of the most frequently denied and contested diagnoses, creating costly revenue loss and compliance risks. In this webcast, Angela Comfort, DBA, MBA, RHIA, CDIP, CCS, CCS-P, provides practical, real-world strategies to align documentation with coding guidelines, reconcile Sepsis-2 and Sepsis-3 definitions, and apply compliant queries. You’ll learn how to identify and address documentation gaps, strengthen provider engagement, and defend diagnoses against payer scrutiny—equipping you to protect reimbursement, improve SOI/ROM capture, and reduce audit vulnerability in this high-risk area.

September 24, 2025

Trending News

Featured Webcasts

AI in Claims Auditing: Turning Compliance Risks into Defensible Systems

As AI reshapes healthcare compliance, the risk of biased outputs and opaque decision-making grows. This webcast, led by Frank Cohen, delivers a practical Four-Pillar Governance Framework—Transparency, Accountability, Fairness, and Explainability—to help you govern AI-driven claim auditing with confidence. Learn how to identify and mitigate bias, implement robust human oversight, and document defensible AI review processes that regulators and auditors will accept. Discover concrete remedies, from rotation protocols to uncertainty scoring, and actionable steps to evaluate vendors before contracts are signed. In a regulatory landscape that moves faster than ever, gain the tools to stay compliant, defend your processes, and reduce liability while maintaining operational effectiveness.

January 13, 2026
Surviving Federal Audits for Inpatient Rehab Facility Services

Surviving Federal Audits for Inpatient Rehab Facility Services

Federal auditors are zeroing in on Inpatient Rehabilitation Facility (IRF) and hospital rehab unit services, with OIG and CERT audits leading to millions in penalties—often due to documentation and administrative errors, not quality of care. Join compliance expert Michael Calahan, PA, MBA, to learn the five clinical “pillars” of IRF-PPS admissions, key documentation requirements, and real-life case lessons to help protect your revenue.

November 13, 2025
E/M Services Under Intensive Federal Scrutiny: Navigating Split/Shared, Incident-to & Critical Care Compliance in 2025-2026

E/M Services Under Intensive Federal Scrutiny: Navigating Split/Shared, Incident-to & Critical Care Compliance in 2025-2026

During this essential RACmonitor webcast Michael Calahan, PA, MBA Certified Compliance Officer, will clarify the rules, dispel common misconceptions, and equip you with practical strategies to code, document, and bill high-risk split/shared, incident-to & critical care E/M services with confidence. Don’t let audit risks or revenue losses catch your organization off guard — learn exactly what federal auditors are looking for and how to ensure your documentation and reporting stand up to scrutiny.

August 26, 2025

Trending News

Happy National Doctor’s Day! Learn how to get a complimentary webcast on ‘Decoding Social Admissions’ as a token of our heartfelt appreciation! Click here to learn more →

CYBER WEEK IS HERE! Don’t miss your chance to get 20% off now until Dec. 1 with code CYBER25

CYBER WEEK IS HERE! Don’t miss your chance to get 20% off now until Dec. 2 with code CYBER24