Data breaches
Data breaches can occur through vulnerabilities in software, weak passwords or even accidental insider actions, such as being captured by phishing emails or simply being tricked into handing over log-in credentials through various means. These breaches expose sensitive patient information, potentially resulting in significant financial and reputational damage for dental practices.
In December 2023, Hapy Bear Surgery Center, a paediatric dental surgery centre in Tulare in California in the US, experienced a data breach.7 Sensitive patient information, including names, Social Security numbers, health insurance information and medical records, was compromised. The centre agreed to a class action lawsuit settlement, offering affected individuals up to US$8,050 in compensation and two years of credit monitoring services. Managed Care of North America Dental, a major dental insurer, experienced a cyberattack between 26 February and 7 March 2023.8 The LockBit ransomware group stole approximately 700 GB of data, affecting nearly nine million patients. Compromised information included names, Social Security numbers, health insurance details and dental records. The company refused to pay the US$10 million ransom, and the cybercriminals released the stolen data online in early April.
Beyond compliance issues, data breaches erode patient trust and can have costly legal consequences. Cybercriminals often use stolen data for identity theft or sell it on the dark web. Health information is not like a credit card that can simply be cancelled and replaced when breached. Health histories, for example, often contain some of the most sensitive and potentially embarrassing information about an individual, such as medications, treatment and diagnoses.
Insider threats
Insider threats, whether intentional or accidental, pose a significant risk. Some examples are:
- Employees may unknowingly expose the network to malware by falling victim to phishing attacks.
- Systems and software may be configured improperly, allowing staff members access they should not have.
- Team members may surf the web or access personal email through practice systems, exposing the network.
- Lack of training about common telephone or other scams can put the practice at risk.
- A team member may act in a nefarious manner by trying to copy or steal data or manipulate systems to cover his or her tracks in cases of internal fraud.
Simple steps to strengthen cybersecurity in dental practices
It is evident from what has been explained in this article series so far that it is vital to create a budget for cybersecurity management. In many cases, a practice’s IT support providers do not have the necessary skills, certifications, and experience to monitor and maintain the many aspects of compliance and cybersecurity best practices. Rather you should work with experts who understand dental cybersecurity to implement tailored defences. Cybersecurity is a specialty requiring many years of training, a professional certification process and experience. In order to select the appropriate provider for your practice, consider the following:
- Specialisation in dental practices: Ensure that the provider understands the unique technology used in dentistry, the compliance requirements relevant to the country in which you practice and the workflows in dentistry.
- Certifications and expertise: Look for a provider with credentials like Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) and Certified Information Privacy Professional (CIPP). Experience in managing dental office security is also paramount.
- Proactive threat management: Verify the provider’s ability to provide continuous monitoring, incident response and solutions like end-point detection and response, which monitors devices such as computers, servers and digital imaging systems for threats.
- Data protection and compliance: Confirm that the provider offers robust encryption, secure data backups and tools to maintain patient privacy and compliance with legal regulations.
- Training and support: Choose a provider that offers ongoing cybersecurity training for staff and responsive technical support to address issues quickly.
Once you have found the appropriate certified cybersecurity professional for your practice, here are the main strategies you should work on together:
1.Develop a comprehensive cybersecurity programme
A strong cybersecurity programme is essential for protecting patient data and preventing cyber threats. To achieve this, you should:
- formalise a cybersecurity programme that includes clear security policies that define how data should be accessed, shared and stored, as well as regular security reviews;
- have a certified cybersecurity professional perform a professional comprehensive security risk assessment; and
- provide ongoing cybersecurity training to all staff, focusing on how to recognise phishing scams and respond to potential threats.
To post a reply please login or register