According to Andrew Jahnke, founder and chief technologist for managed IT and custom cloud service provider RainTech, there is no such thing as being “too small” to be a target for hackers.
All healthcare organizations are susceptible to cyberattackers seeking to exploit weaknesses in the security of a computer network.
Ultimately, preventing a cyberattack is much less expensive than reacting to a hack or breach, which is why Jahnke recommends a thorough assessment of your organization’s cybersecurity to get a baseline for the current level of readiness and identify areas for improvement.
This list offers a detailed collection of key areas that medical practice leaders should examine to be prepared for a possible cyberattack.
Cybersecurity assessment
Number of users _________________________________
Number of workstations ___________________________
Number of physical servers ________________________
Number of virtual servers _________________________
Number of locations ______________________________
Endpoint protection
Antivirus Brand: _________________________________
- Installed on all workstations?
- Installed on all servers?
- Are definitions monitored for automatic updates?
- Do infections automatically produce alerts?
- Does someone respond automatically?
- Does it have a web browser plug-in and classify search results?
- Does it provide sandboxing for executables?
- Can IT provide a recent status and threat report?
What is the next renewal date? ____________________
Network protection
Firewall make/model: ____________________________
- Is the firmware up-to-date?
- Is packet inspection enabled?
- Does it have intrusion prevention enabled?
- Does it use a sandbox solution for downloaded files?
- Does it have antivirus scanning enabled?
- Does it have anti-spyware scanning enabled?
- Does it have flood protection enabled?
- Does it have Geo-IP blocking enabled?
- Does it look for and filter botnet traffic?
- Does it have a web content filter enabled?
- Are internet-facing servers protected from brute force attacks?
- Can IT provide a recent status and threat report?
- Are guest networks completely isolated from the business network?
- Is internet usage monitored?
What is the next renewal date? ____________________
Email protection
Email filtration product: ___________________________
- Is email encryption available?
- Are filtration rules administered by IT?
- Are executable attachments blocked by default?
- Are links re-written and scanned when accessed?
- Are artificial intelligence (AI) and heuristics used to stop spoofed email?
- Is outbound mail scanned, or only inbound?
- Are data loss prevention filters in place for outbound email?
How is the SPF record configured? ____________________________________________________
Network administration/management
List any users who have local administrative permissions on their computers: ___________________
- Is user account control enabled on all workstations?
- Are all users’ passwords set to expire automatically?
- Are password length and complexity required?
- Are accounts locked out after multiple unsuccessful login attempts?
- Are screensavers engaged automatically after inactivity?
- Is multifactor authentication used?
- Is patching managed and monitored on all workstations and servers?
- Are non-user account passwords stored in a secure location?
- Are non-user accounts documented for use?
- Do all accounts follow principle of least privilege?
User instruction/policies and procedures
- Do you have an acceptable use policy for organizational computers?
- Are users given security awareness training?
- Are users sent phishing messages to find out who needs additional training?
- Are risk assessments conducted at least annually?
- Has a remediation plan been produced?
Backup/disaster recovery
How often are backups taken? ___________________________
How long are backups retained? _________________________
- Is there a written policy for disaster recovery/mitigation?
- Are backups “air gapped” from potentially infected workstations?
- Do backups go offsite automatically?
- Do failed backups produce alerts?
- Are backups tested periodically?
Advanced security measures
- Do you have/utilize a security operations center (SOC) that monitors 24/7?
- Do you utilize a security information event management (SIEM) system?
- Is host-based intrusion detection in place?
- Is network-based intrusion detection in place?
- Are servers monitored for ransomware-like activity?
- Are monitors in place for administrative changes (e.g., domain admins)?
- Are independent penetration tests performed periodically?