Page 20 - Layout 1
P. 20

HEALTHCARE
            COVERAGE



        Proving Identity–                                              “ What I tell you three times is true   “
                                                                              - Lewis Carroll, the Hunting of the Snark


        Ancient Problem Needs New Solution



        By David Schulz

        I   dentity Theft is as old as the Bible: in Genesis, Jacob

            purloins his brother Esau’s identity to steal his
            birthright. You may recall that Rachel encouraged
        her son to use two proofs of identity: to bring the nearly
        blind patriarch Isaac food appropriate from a hunter, and
        to wear animal hide on this arm to imitate his brother’s
        hairiness. Today’s cybersecurity experts would suggest
        that Rachel defeated “two-factor security,” and explains
        why your phone and password may soon be insufficient
        to authenticate your identity.
          The Healthcare Industry, with ever-growing use of re-
        mote medicine and Internet connectivity for devices ac-
        cessing Protective Health Information (PHI), and facing
        Health Insurance Portability and Accountability Act
        (HIPAA) obligations, is woefully behind in implement-
        ing Multi-factor Authentication (MFA). MFA is a lay-
        ered approach to proving identity, already prevalent in
        banking, shopping and some healthcare applications;
        but most ‘patient portals’ still rely on only passwords. A
        frightening concept when the most common passwords       Isaac Blessing Jacob, Govert Flinck, c.1638. Oil paint on canvas.
        in 2022 remain “12345678” and “PASSWORD.”
          Why implement MFA? Because even if one factor (like your pass-  tor authentication (2FA) has become necessary to other healthcare en-
        word) becomes compromised (and almost all are available on the deep   terprise compliance as well, including the Drug Enforcement Admin-
        web for a pittance), unauthorized users will be unable to meet the sec-  istration's Electronic Prescription for Controlled Substances Rules and
        ond authentication requirement, ultimately stopping them from gain-  the Payment Card Industry Data Security Standard (PCI DSS).
        ing access to your accounts. Today, two-factor security generally   According to a report released by Microsoft, by implementing
        involves accessing a second device, primarily a phone, to authenticate   HIPAA MFA, organizations reduce their cybersecurity risk by 99.9%.
        identity but even Rachel beat 2FA four millennia ago. For PHI in a   This is because the most common cause of cyberattacks stem from the
        world of IoT (Internet of Things), three factor will become common   use of stolen login credentials, with 81% of breaches caused by stolen
        in the near future.                                    credentials.
          Three Factor Security is defined by the National Institute of Stan-  What’s even more concerning is that 55% of organizations in the
        dards and Technology (NIST), “something you know” (password);   U.S. suffered from at least one successful phishing attack last year. With
        “something you have” (phone, pad, dongle); and “something you are”   only 11% of organizations utilizing MFA or 2FA, these attacks have
        (fingerprint, retina scan, facial recognition).        left many organizations vulnerable to data theft.
          At the moment, although two-factor authentication is not required   According to HHS, “It’s more important in the post-pandemic era
        for HIPAA, it can help pave the way to HIPAA compliance and is   for covered entities to develop and implement tighter policies and pro-
        urged by the U.S. Department of Health and Human Services (HHS).   cedures for authorizing EPHI access.  It is crucial that only those work-
        The traditional login process with a username and password is insuffi-  force members who have been trained and have proper authorization
        cient in an increasingly hostile healthcare data environment. Two-fac-  are granted access to EPHI.” It recommends two strategies to for risk



         20     SAN ANTONIO MEDICINE  • September 2022
   15   16   17   18   19   20   21   22   23   24   25