Minnesota Blue Cross scrambles to boost cyberdefenses
Internal documents show that
The top cybersecurity executive at
“We certainly understand that our members expect us to protect their most sensitive data, and we want them to know that we are committed every single day to doing just that,”
“The speed and the level of sophistication at which the attackers are operating today is extraordinary,” Dixon said. “It is a foolish person who is running security at a large-scale organization with a lot of PHI, personal health information, without absolutely up-to-date, pristinely managed technology.”
Attackers have breached more health care records across the country in 2019, 40.8 million so far, than in the previous three years combined. Most exploit weaknesses that could have been repaired with available software patches, but weren’t.
At
“I am sending this e-mail because I have been unable to impact the situation within the avenues the organization provides,” Yardic wrote to the trustees and CEO Dr.
Scans of the
There were an additional 2 million vulnerabilities on Minnesota Blue Cross’ 6,000 employee workstations, in part because IT staff had deployed thousands of machines that contained hundreds of unpatched vulnerabilities apiece,
In some cases, the same security flaw may be counted hundreds of times because it’s on hundreds of machines.
Eklund declined to reveal exactly where the “managed volume” of vulnerabilities stands today. Responding to written questions, she also said it would be “misleading” to suggest that the raw number of vulnerabilities provides a full picture of overall risk.
“Protecting our members’ information is our top priority, and our efforts are ongoing,”
Patching is important
There are many ways to protect vulnerable computers connected to the internet, and
“I don’t know of anyone who would say that patching isn’t important,” said
A software patch is a piece of computer code that rewrites part of an older program to fix a security vulnerability or improve performance. Since new vulnerabilities are constantly discovered, installing patches is an ongoing job at large companies. Last year companies took an average 34 days to install the most serious ones, classified “critical” patches, and 38 days for less-severe patches, according to an analysis by cybersecurity firm
Unpatched computers can be vulnerable to “ransomware” attacks, in which a hacker turns an organization’s information into gibberish until the victim pays a ransom. Unpatched systems can also leak sensitive data to the dark web, by allowing identity thieves to create fake user accounts on a network and export sensitive data. Attacks may compromise a single employee’s workstation or can spread “laterally” across an entire network, even reaching into servers containing massive databases.
Such risks are not abstract --
The largest-ever health data breach happened at the Blues plan in
In September, Yardic told trustees that
“Today we have approximately 2,000 servers containing confidential information that are missing a large number of critical security updates, many for several years,” he wrote. “Like Premera Blue Cross, who was recently penalized for not protecting member data, we have not ‘installed software updates and security patches on a timely basis’ or in many cases, at all.”
“It takes a lot of effort. So companies just don’t patch,” Ponemon said. “It happens all the time.”
Yet most data breaches are preventable with patches. In a survey of 2,900 IT professionals by
Blues plans nationally are licensed by the
“Health organizations should work to minimize vulnerabilities by keeping software up to date, constantly scanning for weaknesses across their entire IT infrastructure, and patching vulnerabilities as soon as they are detected,” Warner said in a statement to the
A push from the top
Insurers such as
The law does not require organizations to install every software patch. However, it does require HIPAA-covered organizations to mitigate risks from unpatched vulnerabilities, either by installing the patch or establishing other compensating controls, like restricting network access or disabling network services that could be exploited remotely, federal officials said last year.
“We have invested heavily in our security program, which comprises both prevention and detection capabilities,” a company statement said. “These capabilities are supported by advanced detection [tools], third party testing, and 24/7 monitoring.”
Yardic’s
“It will take a sustained push from the top to permanently change this culture,” he wrote.
Three months later, Eklund, the top IT security officer at
“Through ongoing focus, collaborative efforts and opportunity afforded by migration and upgrade projects, our managed volume continues to decrease and should be considerably reduced by the end of the year.”
___
(c)2019 the Star Tribune (Minneapolis)
Visit the Star Tribune (Minneapolis) at www.startribune.com
Distributed by Tribune Content Agency, LLC.
Five Tips To Help Your Clients Have Healthier Finances In 2020
Insurance Discount On The Way For Palm Beach Residents In Flood-Prone Areas
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News