The Ransomware Crisis, Part III: Best Practices

EDITOR’S NOTE: Edward Roche, in association with RACmonitor, is writing a series on the need for healthcare facilities in the U.S. to protect themselves from cybercriminals demanding ransom for patient records. This is the third installment in a series of reports on the ransomware crisis facing America’s hospitals.

The world is now witnessing one of the most significant ransomware waves in history, and hospitals are under attack.

Hospitals risk having all of their electronic medical records (EMRs) encrypted. In order to get the electronic “key” to unlock the data, a ransom must be paid.

In the previous segment of this series, we covered three areas of concern for hospitals: a) technology; b) operations; and c) legal/regulatory.

The technology side concerns operations of the ICT department. The operations side involves setting up internal processes such as “fire drills” and other exercises to make sure that everyone knows what to do after a ransomware attack occurs. The legal and regulatory side concerns how each hospital must adhere to state and local law. This usually involves substantial notification requirements for both governments and to individual patients whose records have been compromised. It also concerns how well the hospital knows how to support law enforcement, including preservation of evidence needed for a prosecution.

Best Practices

Here are a few best practices that hospitals might use to prepare for a ransomware attack.

First, cut off email access to the outside Internet. Evidence indicates that almost all ransomware is introduced into an information system by users who unknowingly download malware from the web.

Create a “crisis playbook” that defines roles and activities of all key parties in the case of a ransomware incident. Rehearse this playbook in a live simulation or tabletop exercise every two months.

Make sure that all hospital employees know how to operate in manual mode, if needed. Build the capability to work in manual mode for at least seven days. Have computer-readable forms ready and make sure each person has been trained for this contingency.

Compel your ICT professionals and others to keep an “evidence log” so that all information regarding the ransomware crime is logged. Make sure that ICT knows how to avoid erasing cyber evidence when they restore the information system.

If necessary, change the architecture of your ICT systems so they may not “infect” each other. For example, separate electronic medical records (EMRs) from personnel or other administrative systems. This involves building internal firewalls and other security measures to make it impossible for the infection to spread.

Have in place a pre-programmed notification procedure in case patient records are compromised. This includes having a legal team on standby. For example, you should have an off-site system in place, already prepared to send notification letters if the need arises. Have the notification letters drafted, reviewed, and approved. Note that you probably will not be able to depend on your own internal system to get mailing addresses, because it might be locked up with the ransomware.

Operate a parallel ICT infrastructure that mirrors your current system. Have “hot switching” procedures in place to use this alternative system in case the primary system is compromised. Rehearse this handover at least once every two months. A CIO from a large bank that followed this advice explained it this way:

“Every three months we shut down our mainframe production system and move the entire operation over to an exact copy of our infrastructure that has been custom-built for this purpose. Each time something goes wrong. There is a snag. People ask us why we do this when we know something might go wrong. The answer is simple: We do it exactly because we know that something will go wrong. And that is precisely what we are trying to identify ahead of time so that if a real problem occurs, we will know how to deal with it.”

Make sure you have in place pre-arranged contacts with law enforcement, both state and federal. Establish a single point of contact between your institution and the law enforcement community. Have a joint lunch meeting at least twice a year. If you are on a first-name basis, things will go much better if a real ransomware attack arises.

Implement tougher ICT security training standards for your employees. Make internal certification of proper ICT procedures a prerequisite for continued employment. Use online training. Build successful IT training into annual performance reviews to ensure that everyone is on board. This alone will greatly reduce the chances of contamination with malware.

Finally, hospitals should think about hiring specialists to perform a ransomware audit covering all three aforementioned areas: a) the technologies in the ICT infrastructure; b) contingency operational procedures in place in case of an attack; and c) skills in coordinating an effective legal and regulatory response. 

Facebook
Twitter
LinkedIn

Edward M. Roche, PhD, JD

Edward Roche is the director of scientific intelligence for Barraclough NY, LLC. Mr. Roche is also a member of the California Bar. Prior to his career in health law, he served as the chief research officer of the Gartner Group, a leading ICT advisory firm. He was chief scientist of the Concours Group, both leading IT consulting and research organizations. Mr. Roche is a member of the RACmonitor editorial board as an investigative reporter and is a popular panelist on Monitor Mondays.

Related Stories

Leave a Reply

Please log in to your account to comment on this article.

Featured Webcasts

Enhancing Outcomes with CDI-Coding-Quality Collaboration in Acute Care Hospitals

Enhancing Outcomes with CDI-Coding-Quality Collaboration in Acute Care Hospitals

Join Angela Comfort, DBA, MBA, RHIA, CDIP, CCS, CCS-P, as she presents effective strategies to strengthen collaboration between CDI, coding, and quality departments in acute care hospitals. Angela will also share guidance on implementing cross-departmental meetings, using shared KPIs, and engaging leadership to foster a culture of collaboration. Attendees will gain actionable tools to optimize documentation accuracy, elevate quality metrics, and drive a unified approach to healthcare goals, ultimately enhancing both patient outcomes and organizational performance.

November 21, 2024
Comprehensive Inpatient Clinical Documentation Integrity: From Foundations to Advanced Strategies

Comprehensive Outpatient Clinical Documentation Integrity: From Foundations to Advanced Strategies

Optimize your outpatient clinical documentation and gain comprehensive knowledge from foundational practices to advanced technologies, ensuring improved patient care and organizational and financial success. This webcast bundle provides a holistic approach to outpatient CDI, empowering you to implement best practices from the ground up and leverage advanced strategies for superior results. You will gain actionable insights to improve documentation quality, patient care, compliance, and financial outcomes.

September 5, 2024
Advanced Outpatient Clinical Documentation Integrity: Mastering Complex Narratives and Compliance

Advanced Outpatient Clinical Documentation Integrity: Mastering Complex Narratives and Compliance

Enhancing outpatient clinical documentation is crucial for maintaining accuracy, compliance, and proper reimbursement in today’s complex healthcare environment. This webcast, presented by industry expert Angela Comfort, DBA, RHIA, CDIP, CCS, CCS-P, will provide you with actionable strategies to tackle complex challenges in outpatient documentation. You’ll learn how to craft detailed clinical narratives, utilize advanced EHR features, and implement accurate risk adjustment and HCC coding. The session also covers essential regulatory updates to keep your documentation practices compliant. Join us to gain the tools you need to improve documentation quality, support better patient care, and ensure financial integrity.

September 12, 2024

Trending News

Featured Webcasts

Patient Notifications and Rights: What You Need to Know

Patient Notifications and Rights: What You Need to Know

Dr. Ronald Hirsch provides critical details on the new Medicare Appeal Process for Status Changes for patients whose status changes during their hospital stay. He also delves into other scenarios of hospital patients receiving custodial care or medically unnecessary services where patient notifications may be needed along with the processes necessary to ensure compliance with state and federal guidance.

December 5, 2024
Navigating the No Surprises Act & Price Transparency: Essential Insights for Compliance

Navigating the No Surprises Act & Price Transparency: Essential Insights for Compliance

Healthcare organizations face complex regulatory requirements under the No Surprises Act and Price Transparency rules. These policies mandate extensive fee disclosures across settings, and confusion is widespread—many hospitals remain unaware they must post every contracted rate. Non-compliance could lead to costly penalties, financial loss, and legal risks.  Join David M. Glaser Esq. as he shows you how to navigate these regulations effectively.

November 19, 2024
Post Operative Pain Blocks: Guidelines, Documentation, and Billing to Protect Your Facility

Post Operative Pain Blocks: Guidelines, Documentation, and Billing to Protect Your Facility

Protect your facility from unwanted audits! Join Becky Jacobsen, BSN, RN, MBS, CCS-P, CPC, CPEDC, CBCS, CEMC, and take a deep dive into both the CMS and AMA guidelines for reporting post operative pain blocks. You’ll learn how to determine if the nerve block is separately codable with real life examples for better understanding. Becky will also cover how to evaluate whether documentation supports medical necessity, offer recommendations for stronger documentation practices, and provide guidance on educating providers about documentation requirements. She’ll include a discussion of appropriate modifier and diagnosis coding assignment so that you can be confident that your billing of post operative pain blocks is fully supported and compliant.

October 24, 2024
The OIG Update: Targets and Tools to Stay in Compliance

The OIG Update: Targets and Tools to Stay in Compliance

During this RACmonitor webcast Dr. Ronald Hirsch spotlights the areas of the OIG’s Work Plan and the findings of their most recent audits that impact utilization review, case management, and audit staff. He also provides his common-sense interpretation of the prevailing regulations related to those target issues. You’ll walk away better equipped with strategies to put in place immediately to reduce your risk of paybacks, increased scrutiny, and criminal penalties.

September 19, 2024

Trending News

Happy National Doctor’s Day! Learn how to get a complimentary webcast on ‘Decoding Social Admissions’ as a token of our heartfelt appreciation! Click here to learn more →