By ZACHARY AMOS
The well being care sector is not any stranger to cyberattacks. Nonetheless, giant incidents just like the February 2024 ransomware assault on Change Healthcare are sufficient to shake up the {industry}. Within the wake of such a large breach, medical organizations of every type and sizes ought to take the chance to evaluation their safety postures.
What Occurred within the Change Healthcare Cyberattack
On February 21, Change Healthcare — the most important medical clearinghouse within the U.S. — suffered a ransomware assault, forcing it to take over 100 techniques offline. Lots of its digital providers remained down for weeks, with full restoration taking till early April.
Per week after the assault, the notorious ransomware-as-a-service gang BlackCat claimed duty. BlackCat was additionally accountable for 2021’s Colonial Pipeline shutdown and a number of other assaults on well being care organizations all through 2023. This newest act in opposition to Change Healthcare, nevertheless, stands as certainly one of its most disruptive but.
As a result of Change and its dad or mum firm — UnitedHealth Group (UHG) — are such central {industry} gamers, the hack had industry-wide ripple results. A staggering 94% of U.S. hospitals suffered monetary penalties from the incident and 74% skilled a direct influence on affected person care. Change’s providers have an effect on one in each three affected person data, so the large outage created a snowball impact of disruptions, delays and losses.
Most of Change’s pharmacy and digital fee providers got here again on-line by March 15. As of early April, practically every little thing is working once more, however the monetary fallout continues for a lot of enterprises reliant on UHG, because of substantial backlogs.
What It Means for the Broader Well being Care Sector
Contemplating the Change Healthcare cyberattack affected virtually the complete medical sector, it has important implications. Even the few medical teams untouched by the hack ought to take into account what it means for the way forward for well being care safety.
1. No Group Is an Island
It’s troublesome to disregard that an assault on a single entity impacted virtually all hospitals within the U.S. This large ripple impact highlights how no enterprise on this {industry} is a self-contained unit. Third-party vulnerabilities have an effect on everybody, so due diligence and considerate entry restrictions are important.
Whereas the Change Healthcare hack is an excessive instance, it’s not the primary time the medical sector has seen giant third-party breaches. In 2021, the Crimson Cross skilled a breach of over 515,000 affected person data when attackers focused its information storage associate.
Well being care enterprises depend on a number of exterior providers and every of those connections represents one other vulnerability the corporate has little management over. In mild of that threat, it have to be extra selective about who it does enterprise with. Even with trusted companions like UHG, manufacturers should limit information entry privileges as a lot as doable and demand excessive safety requirements.
2. Centralization Makes the Business Weak
Relatedly, this assault reveals how centralized the {industry} has change into. Not solely are third-party dependencies widespread, however many organizations rely on the identical third events. That centralization makes these vulnerabilities exponentially extra harmful, as one assault can have an effect on the entire sector.
The well being care {industry} should transfer previous these single factors of failure. Some exterior dependencies are inevitable, however medical teams ought to keep away from them wherever doable. Splitting duties between a number of distributors could also be essential to scale back the influence of a single breach.
Regulatory modifications might assist this shift. Throughout a Congressional listening to on the incident, some lawmakers expressed issues over consolidation within the well being care {industry} and the cyber dangers it poses. This rising sentiment may result in a sector-wide reorganization, however within the meantime, personal firms ought to take the initiative to maneuver away from giant centralized dependencies the place they will.
3. Well being Care Companies Want Dependable Response Plans
Well being care organizations also needs to be aware of the size and price of UHG’s response timeline. It took weeks to revive the downed techniques, even after reportedly paying a $22 million ransom to recuperate the stolen information. That’s far too lengthy.
Because the ransomware menace grows, companies on this {industry} should create emergency response plans. That features preserving safe, offline backups of all delicate information and making certain information heart redundancy for mission-critical providers. Detailed communication protocols and a step-by-step information for recovering from an assault are additionally essential.
With out an in depth backup and restoration plan, enterprises will find yourself in a scenario like Change Healthcare. Ransomware is just too widespread and disruptive to imagine the worst won’t ever occur. Well being care firms want plans A, B and C to reduce the injury when these assaults happen.
4. Well being Care Cybersecurity Should Be Extra Proactive
The Change Healthcare ransomware assault additionally highlights the necessity for proactive safety. Whereas the precise reason for the breach is unclear, BlackCat sometimes targets vulnerabilities in Distant Desktop Protocol or ConnectWise ScreenConnect. Each of those have patches out there, so proactive vulnerability administration may cease many assaults.
Vulnerabilities can come up in lots of areas of well being care, so detailed penetration testing and automatic assessments are essential to cowl sufficient floor. Automating updates is equally necessary, as attackers transfer shortly on this sector.
Medical teams should additionally emphasize worker coaching. Errors are a number of the most persistent threats on this {industry}, with 36% of information breaches stemming from misdelivery alone. Automating as a lot as doable and thorough cybersecurity coaching for all workers will reduce these dangers.
5. No One Is Protected
If the well being care sector doesn’t take anything away from this incident, it ought to be taught no group is secure. UHG is likely one of the {industry}’s largest forces and nonetheless fell sufferer to an assault. Related incidents can definitely have an effect on smaller firms with tighter safety budgets if they will trigger a lot injury to UHG.
It’s not essentially a matter of cybersecurity spending. Traditionally, safety has accounted for simply 6% of medical IT budgets, however greater than half of well being care organizations deliberate to extend their cybersecurity budgets in 2023. This pattern will seemingly proceed into 2024 and past, too. That development is necessary, however the Change breach exhibits cash alone gained’t cease cybercriminals.
Investing in superior safety options is essential. Nonetheless, manufacturers should not change into complacent simply because they’ve comparatively excessive cybersecurity budgets. Fixed vigilance and emergency restoration planning are nonetheless essential.
The Change Healthcare Hack Highlights the Want for Change
As well being care digitization rises, hospitals and their associate organizations will change into more and more standard targets for ransomware gangs. This newest incident ought to function a wake-up name to this challenge. Safety approaches within the sector should change.
The highway forward is lengthy and troublesome. Nonetheless, taking up this duty now can save companies from substantial losses.
Zac Amos covers the roles of cybersecurity and AI in healthcare because the Options Editor at ReHack and a contributor at VentureBeat, The Journal of mHealth, and Healthcare Weekly.