Page 34 of 36
Previous Page     Next Page        Smaller fonts | Larger fonts     Go back to the flash version

Thought Leaders: Mobile Security

Building a stronger security team

By Kate Borten Take advantage of free NIST resources to improve security, privacy and regulatory compliance.liance


here is a long-standing assumption by many man- agers that IT professionals are, by definition, also security pros. The truth is that IT and information security are not synonymous. Information security is a specialized field, and IT staff often falls short of the knowledge needed to implement a good security program that provides adequate patient privacy. But there are remedies. One excellent and often overlooked source of free advice is the National Institute of Standards and Technology (NIST) Computer Security Resource Center (CSRC). Unlike certain other generally accepted security standards, the CSRC’s stan- dards and guidelines are available to everyone. A recent burst of CSRC activity has resulted in numerous new and revised publications, and they deserve the attention of healthcare IT staff, leaders and business associates.

A significant benefit to following NIST standards and guide- lines – even if tempered to suit a particular organization – is that external auditors and investigators will more likely be positively predisposed to that organization. Unless an organization runs federal information systems and is therefore required to follow NIST standards, the standards are voluntary. But by adopting them, such an organization demonstrates that it is tuned in to the security world and that it is following the specific security practices referenced by healthcare regulators. Among the various helpful documents posted at the CSRC’s website ( are the Special Publications. Some titles may sound intimidating – for example, “Recommendation for Key Derivation Using Pseudorandom Functions” – but most are more approachable and have practical value for healthcare organizations.

Here is a sampling of Special Publications, all new or updated within the past year, on critical security topics: • “Guidelines for Securing Wireless Local Area Networks (WLANs)”;

• “BIOS Protection Guidelines”; • “Cloud Computing Synopsis and Recommendations”; • “Guidelines for Managing and Securing Mobile Devices in the Enterprise”;

• “Guide to Intrusion Detection and Prevention Systems (IDPS)”;

• “Guide to Malware Incident Prevention and Handling for Desktops and Laptops”; and

• “Guide for Conducting Risk Assessments.” 32 November 2012

Older but still valuable docu- ments give advice on encryption, media disposal, security risk management and

Kate Borten, CISSP, CISM, is president of The Marblehead Group and a consultant for 3M Privacy Screen Protectors. For more on The Marblehead Group: www.rsleads. com/211ht-210. For more on 3M: www.

workforce training. Although HIPAA’s security rule does not specifically cite them, other essential security topics include fire- walls, remote access and telework security, mobile code security, and patch and vulnerability management. Government reports of audits and investigations show that these are important areas to secure, regardless of whether they are regulatory specifications. Many Special Publications relate directly to HIPAA require- ments, and, when followed, can provide strong evidence of compliance with Volume 45 of the Code of Federal Regulations (CFR) Part 164. In fact, the Special Publication 800-66, “An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule,” describes each standard, gives advice on compliance and identifies other NIST publications with in-depth guidance on a particular security rule topic. For example, to meet the Security and Awareness Train- ing standard, SP 800-83 Rev. 1 DRAFT “Guide to Malware Incident Prevention and Handling for Desktops and Laptops,” released in June 2012, lists specific training points. To meet the Workstation Security standard, SP 800-66 suggests asking “What safeguards are in place, e.g., locked doors, screen barriers, cam- eras, guards?” And in response, “Implement physical safeguards … to minimize the possibility of inappropriate access to EPHI …” which might include installing privacy screen protectors to avoid exposing information. While the questions and responses may seem obvious, following NIST guides helps ensure that an organization’s security and privacy programs are comprehensive and meet government expectations. NIST’s CSRC Special Publications are very readable, even for less technical individuals, and typically include a glossary of terms, explanations of security risks and practical advice for mitigating those risks, whether through local controls or in negotiating with a vendor or business associate. Lack of knowledge on the part of IT professionals is no longer an acceptable excuse for weak security controls. Every healthcare organization should read and apply these free and easy-to-use NIST Computer Security Resource Center documents. HMT


Previous arrowPrevious Page     Next PageNext arrow        Smaller fonts | Larger fonts     Go back to the flash version
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  30  |  31  |  32  |  33  |  34  |  35  |  36