Birmingham Medical News: Training Against Cyber-Attacks

Articles / Publications

Reprinted with permission from the Birmingham Medical News. This article originally appeared in the September 2021 issue of the Birmingham Medical News. The article may be accessed online here.

The COVID-19 pandemic over the past 18 months has impacted almost every area of our pre-COVID, “normal’’ lives---working from home, a demand on toilet paper, and a decline in the workforce, just to name a few. Almost no industry has been spared when it comes to the impact of the pandemic.

As a result of the pandemic, cyber-attacks are on the rise in almost every industry, reaching unprecedented numbers following the 2020 lock-down. As workers suddenly transitioned to a remote environment and management became more focused on merely surviving day-to-day than spending dollars on IT security, the doors opened for perpetrators to seize new opportunities. One report I read indicates that, with regard to the frequency of ransomware attacks, there were 93% more attacks in the first half of 2021 than in the first half of 2020, while the number of global cyber-attacks increased by 29%. Unfortunately, this “perfect storm” has resulted in massive amounts of personal information being breached, as well as millions of dollars being spent on mitigation, response, and recovery efforts.

For healthcare providers, the situation becomes even more dire, as a ransomware attack can not only disrupt business operations and impact the bottom law, but can also have a negative impact on direct patient care. Even with up-to-date backups, it can take several hours or days to get a system back up and running following a ransomware attack, and most providers, and the patients they serve, will feel a negative impact as a result of such delay.

One of the easiest and cheapest ways to prevent cyber-attacks is to train your employees. Yes, implementing two-factor authentication and investing in computer security and protection measures are important, but supplementing those measures with effective employee training will drastically reduce the likelihood of an attack. We are seeing more and more attacks that could have been prevented had an employee been properly trained and known what to look out for. For example, phishing scams where perpetrators send e-mails with attached malware to individuals, appearing as if they came from a legitimate sender, are on the rise. Cyber-security training can help employees identify suspicious e-mails and protect against these types of scams, among others.

Cyber-security training should not take a “one and done” approach, but rather should be ongoing and periodic. Cyber-security training can be conducted internally by someone within the IT department, or externally by a contracted third-party. I recommend a combination of both, utilizing the expertise and training programs of a third-party in conjunction with the institutional and operational knowledge of someone in-house.

While employees should always be trained upon hire, they should also be trained periodically thereafter. I recommend cyber-security training at least one a year. If there is a significant shift in technology, a change in policy/procedure, or an increased threat, additional, more frequent training may also be warranted.

Whenever training is conducted, whether internally or externally, the training should be documented. The documentation should include the date the training was conducted, the employees that were trained, the topics discussed, and a copy of any training materials that were utilized. If a breach incident occurs, this training documentation will become extremely important in the course of the investigation.

In light of the current environment, all healthcare providers should be conducting appropriate, periodic cyber-security training as a first line of defense against attacks.

Burr
Jump to Page

Contact Us

About Burr & Forman Cybersecurity & Data Privacy Law

Burr & Forman's experienced team helps clients navigate the complex cybersecurity and data privacy landscape with strategies designed to assess current risks, develop a corrective action plan, implement best practices, and provide immediate and appropriate responses to a cybersecurity breach.

We use cookies to improve your website experience, provide additional security, and remember you when you return to the website. This website does not respond to "Do Not Track" signals. By clicking "Accept," you agree to our use of cookies. To learn more about how we use cookies, please see our Privacy Policy.

Necessary Cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. These cookies may only be disabled by changing your browser settings, but this may affect how the website functions.


Analytical Cookies

Analytical cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.