Hospitals Must Develop IT Security Plans To Avoid Target’s Fate

In a recent study examining data from 243 hospitals, THaW researcher Eric Johnson found that while compliance with state and federal IT security mandates like HIPAA helps the worst hospitals protect patient information better, organizations that maintain and regularly update a security plan get far more from their security investments. Eric defines these organizations as “operationally mature.” These strategic plans — along with periodic reviews — enable organizations to learn of potential new risks and evaluate their own security posture. As a consequence, organizations’ security resources are better targeted to address their specific needs and the environments in which they operate. Eric’s results show that the impact of security investments varies depending on the operational maturity of the organization.

Read more about this study and its results in Eric’s blog. The study was funded by an earlier NSF grant on Trustworthy Information Systems for Healthcare.

THaW kick-off meeting

THaW participants (and a few invited guests) at Johns Hopkins University, December 2013

THaW participants (and a few invited guests) at Johns Hopkins University, December 2013

The THaW research group held its first all-hands meeting at the Johns Hopkins University on December 11, 2013. About thirty researchers from five universities and affiliated medical centers were in attendance, along with several experts from the field of healthcare information technology. It was a great opportunity for the team to build rapport and begin collaborative projects.  Many thanks to Avi Rubin and Wendy Phillips and their team for hosting us.

Kotz appointed to GAO’s Health IT Policy Committee

The Comptroller General of the Government Accountability Office (GAO) announced the appointment of THaW PI David Kotz to the organization’s Health IT (HIT) Policy Committee. In his announcement, Gene Dodaro noted, “In developing policy for health information technology, it’s important to take into account expertise related to privacy and security and to health care research as well as the views of health care workers who are the users of HIT.”

The Comptroller General is responsible for appointing 13 of the 20 members of the HIT Policy Committee. David will fill the role of expert in privacy and security.

Read more in the full GAO press release and an article on HispanicBusiness.com

Hacking Medical Devices: Fact and Fiction (NY Times)

THaW PI Kevin Fu was quoted in an article published this weekend in the New York Times. Describing a scene from an episode of the Showtime Network’s series Homeland, the Times story questions how realistic it is that a person’s computerized defibrillator could be hacked. In a recent 60 Minutes episode, former Vice President Dick Cheney and his cardiologist thought the threat was credible enough to shut off the wireless programming functionality of his own defibrillator.

In the article, Kevin describes some of his research on the topic, including a 2008 paper that he co-authored warning of just such a scenario. According to Kevin “security was not on the radar yet for the medical device community…But there was a rapid trend toward wireless communication and Internet connectivity. We definitely raised awareness.”

Read the full New York Times article published on 10/27/13.

How Far Does Prevention Go When Securing Health Care Data?

Here we copy a post from THaW team member Eric Johnson, Dean of the Owen Graduate School of Management at Vanderbilt.  (Originally posted here.)

In most areas of health care the adage that “an ounce of prevention is worth a pound of cure” holds true. But for information security professionals in the field, the answer has not been so clear. Debate continues between two camps of researchers: one group maintains that it’s far more efficient to learn from the past and use that information to thwart future attacks; others advocate investing in preventive measures, saying that proactive organizations build a deeper understanding of both their own weaknesses and future threats. Continue reading

Amulet project launched

We are pleased to announce that NSF CNS has awarded three years of funding for the Computational Jewelry for Mobile Health project, which complements many of the projects in the Trustworthy Health and Wellness program and involves several of the same Dartmouth researchers.

The project’s vision is that computational jewelry, in a form like a bracelet or pendant, will provide the properties essential for successful body-area mHealth networks. These devices coordinate the activity of the body-area network and provide a discreet means for communicating with their wearer. Such devices complement the capabilities of a smartphone, bridging the gap between the type of pervasive computing possible with a mobile phone and that enabled by wearable computing.

The interdisciplinary team of investigators from Dartmouth and Clemson is designing and developing ‘Amulet’, an electronic bracelet and a software framework that enables developers to create (and users to easily use) safe, secure, and efficient mHealth applications that fit seamlessly into everyday life. The research is determining the degree to which computational jewelry offers advantages in availability, reliability, security, privacy, and usability, and developing techniques that provide these properties in spite of the severely-constrained power resources of wearable jewelry.

Learn more about the Amulet project at amulet-project.org.

THaW welcomes Vanderbilt

 

portrait of Eric Johnson

Professor M. Eric Johnson, Dean of the Owen School of Management at Vanderbilt University

Vanderbilt University‘s Owen School of Management is now part of the Trustworthy Health and Wellness research team. Eric Johnson is one of our earliest collaborators and co-authored the NSF SaTC proposal; until recently he was a professor at Dartmouth’s Tuck School of Business. Last month, he joined Vanderbilt as Dean of the Owen School of Management. We are pleased that Eric will be able to continue his collaboration on THaW from Vanderbilt. He brings a great deal of experience in the economics and business of healthcare information technology, from his prior work in the Trustworthy Information Systems for Healthcare (TISH) project, Securing Information Technology in Healthcare (SITH) workshops, and other ISTS and I3P projects related to security and privacy in healthcare information technology. Read more about Eric, and his research, at his home page.

Five trends in healthcare IT – and their implications for security

In the previous post we described the current landscape for healthcare information technology. In this post, we note how healthcare information systems increasingly face daunting security challenges due to five economic and technological trends. First, the locus of care is shifting, as the healthcare system seeks more efficient and less-expensive ways to care for patients, particularly outpatients with chronic conditions. Second, strong economic incentives are pushing health providers to innovate by rewarding providers for keeping their patient population healthy, rather than paying only to fix patients when they are ill. Third, the treatment of chronic conditions and the implementation of prevention plans entail more continuous patient monitoring, outside of the clinical setting. Fourth, mobile consumer devices (smartphones and tablets) are quickly being adopted for health & wellness applications, both by caregivers and patients, in addition to their many other uses – making it difficult to protect sensitive health-related data and functions from the risks posed by a general-purpose Internet device. Finally, significant emerging threats are targeting healthcare information systems, while new regulations strive to protect medical integrity and patient privacy. Let’s look at each of these five trends in more detail.

Continue reading

The healthcare IT landscape

The United States spends over $2.6 trillion annually on healthcare. This amount represents approximately 18% of the gross domestic product (GDP), a percentage that has doubled in the last 30 years and is the highest of any country in the world [11]. Over 75% of these costs are due to the management of chronic diseases, which currently affects 45% of the U.S. population. By 2023, it is expected that costs to manage chronic diseases alone will rise to $4.2 trillion [3]. Many look to information technology to help reduce costs, increase efficiency, broaden access to healthcare, and improve the health of the population.

Meanwhile, recent years have seen a dramatic shift in the nature of computing with the advent of smartphones and tablet computers; the latest surveys estimate that over 50% of Americans have smartphones [10]. This wide-spread availability of a powerful mobile computing platform, with a rich interface and a variety of built-in sensors, has created a boom in mobile health (mHealth) applications like RunKeeper and Fooducate [9]; mHealth application downloads increased from 124 million in 2011 to 247 million in 2012 [8]. These mHealth apps and devices are becoming more prevalent due in part to the rising cost of healthcare and their suitability for managing chronic diseases, particularly in the aging population [5, 6], and in prevention and wellness programs [1].

Smartphones and tablets are rapidly moving into the clinical workplace as well. A recent estimate indicates that as many as 62% of doctors use mobile tablets [4]. Although some hospitals embrace smartphones and tablets by distributing them to their staff [7], a 2012 survey found that 85% of hospitals allow their clinicians to bring their own device to work [2].

Furthermore, universal connectivity (cellular, wireless, and home broadband) has enabled a tremendous variety of services to move to the “cloud.” Services like Dropbox and Google Drive make it easy for individuals to store, manipulate, and share content on cloud servers located in distant data centers. Services like Amazon S3 and Google App Engine make it easy for developers to build scalable computational backends without installing or managing their own infrastructure. These trends are pushing more individuals and enterprises to push an increasing fraction of their computing into Internet-connected servers run by other organizations – raising important questions about security and privacy.

Finally, recent years have seen rapid developments in smart, miniaturized, low-power, adaptive and self-calibrating instrumentation, enabling the emergence of mobile devices for monitoring and managing individual health conditions; examples range from wearable devices that measure physical activity (such as the BodyMedia armband) to Wi-Fi enabled bathroom scales (such as those from Withings or Fitbit) to stick-on ECG patches to monitor heart conditions (such as those from Corventis) to implanted insulin pumps (such as one from Medtronic). Most are wireless, able to upload data to a smartphone or to a cloud server for analysis and access by both the individual and caregivers.

The dynamic healthcare ecosystem and rapid technology evolution lead to new challenges in securing tomorrow’s healthcare information infrastructure. More on that in the next post!

Continue reading

Our interdisciplinary team

The scale and scope of this problem space requires an interdisciplinary team with expertise in both computer security and healthcare information technology. We assembled an outstanding multi-disciplinary team from four universities (Dartmouth College, Johns Hopkins University, University of Illinois, and University of Michigan), comprised of senior researchers with deep expertise in security, mobile computing, cloud computing, and the application of these technologies to healthcare. Our team includes professors of computer science, business, health policy, and behavioral health, as well as the CISO of a major hospital and a leading cybersecurity research leader now at GWU. The four site PIs are, alphabetically,

  • Kevin Fu (UM): Associate Professor of Electrical Engineering and Computer Science, member of the NIST Information Security and Privacy Advisory Board, ORISE Fellow at the FDA, and director of the Ann Arbor Research Center for Medical Device Security (Archimedes).
  • Carl Gunter (UIUC): Professor of Computer Science, Professor in the College of Medicine, Director of the Illinois Security Lab and the Health Information Technology Center, and PI of the HHS-ONC funded Strategic Healthcare IT Advanced Research Projects on Security (SHARPS).
  • David Kotz (Dartmouth): Professor of Computer Science, PI of the NSF-funded Trustworthy Information Systems for Healthcare (TISH) project, and former director of the Institute for Security, Technology, and Society (ISTS).
  • Avi Rubin (JHU): Professor of Computer Science, Technical Director of the Information Security Institute, and PI of one of the first NSF CyberTrust centers (on e-voting).

Rounding out the team are a broad group of faculty with deep expertise:

  • Michael Bailey (UM): Research Associate Professor of Electrical Engineering and Computer Science, with expertise in availability and security of complex distributed systems.
  • Roy Campbell (UIUC): Professor of Computer Science, with expertise in security, cloud computing, and ubiquitous computing.
  • Steve Checkoway (JHU): Research Assistant Professor of Computer Science, with expertise in embedded systems security.
  • Eric Johnson (Vanderbilt): Dean of the Owen School of Management, and author of the book The Economics of Financial and Medical Identity Theft.
  • Darren Lacey (JHU): Chief Information Security Officer and Director of IT Compliance for the Johns Hopkins University and Johns Hopkins Medicine.
  • Carl Landwehr (GWU): Lead Research Scientist at the Cyber Security Policy and Research Institute (George Washington University), and previously managed cybersecurity research programs at NSF, IARPA, and DARPA.
  • Lisa Marsch (Dartmouth): Director of the NIH-funded Center for Technology and Behavioral Health and on the faculty of the Department of Psychiatry.
  • Klara Nahrstedt (UIUC): Professor of Computer Science, with expertise in security, cloud computing, and multimedia.
  • Jonathan Weiner (JHU): Professor of health policy and management at Bloomberg School of Public Health, Professor of Health Informatics, and Director of the Center for Population Health IT (CPHIT).