Login


Notice: Passwords are now case-sensitive

Remember Me
Register a new account
Forgot your password?

Keefe: Hacking May Change Workers' Comp Record-Keeping, Billing

By Eugene Keefe

Wednesday, April 12, 2017 | 0

If your financial stuff has ever been hacked, consider a challenging new statistic: By 2024, everyone in the U.S. may have had health care and workers’ comp data compromised if online theft keeps accelerating at the current pace.

Eugene Keefe

Eugene Keefe

As our health records have been going digital in the past several years, they've become far more vulnerable to poaching — and far more interesting to online thieves, who may sell a complete medical record for more than $1,000 on the darknet. That is because the records contain not just your insurance info, which can be used for fraudulent billing and prescriptions, but also they include your Social Security, driver's license and credit card numbers. As a result, the health care and work comp industry is scrambling to play catch-up to secure patient and hospital data.

Always remember: Workers' comp benefits are about 45% of health care costs in the U.S. and other countries. Health care has lagged far behind banking, financial services and retail when it comes to implementing security protocols.

Until Obamacare mandated electronic records, many medical providers still operated with ancient concepts like paper, faxes and handwritten charts. Once electronic systems were finally implemented, the industry struggled to attract and retain top information technology talent to protect us.

The access issues are industry-specific.

"Security in health care has some unique challenges because we have to share data in order to save lives while also protecting patient information," says Steven Smith, chief information officer at Evanston, Illinois-based NorthShore University HealthSystems. "If you think of a bank, your financial information is locked up and not shared. But we need to share our data with all doctors, nurses and outside payers, as well as with the patients themselves."

IT security experts say it's tough to overstate the enormity and frequency of the threats, which have skyrocketed in the past decade as everything has become exponentially more networked. 

So far in 2017, 79 security breaches, each affecting at least 500 patients, have been reported to the U.S. Health & Human Services Department. That's more than five incidents a week. Only one, involving Walgreens Boots Alliance and 4,500 records, took place in Illinois. Still, our state has experienced nearly 100 incidents since 2010, according to the HHS breach portal, known as the "Wall of Shame" to security professionals.

Major hospital systems here are beginning to pay the price as HHS levies fines on providers who have lost sensitive patient data. In January, Chicago's Presence Health agreed to pay $475,000 to HHS for failing to report in a timely manner a 2013 breach involving missing paper schedules containing patient information. Presence is "working diligently" on a corrective plan, including additional security training for staff, a spokesman says.

That figure pales in comparison to the $5.5 million shelled out by Advocate Health Care in August. The Downers Grove-based hospital network agreed to pay HHS the largest settlement ever by a single entity for potential violations of federal patient privacy law related to three separate 2013 breaches that compromised the data of at least 4 million people. Two of the incidents involved stolen employee laptops, while a third involved a consultant's potentially unauthorized access to patient records.

Since then, Advocate has "enhanced (its) data encryption measures," says a spokeswoman, adding that there's been no indication the information was misused.

Nationwide, IT breaches cost the medical and workers' comp industry more than $6 billion annually — a number that grows each year.

Hospitals and physicians' practices make enticing targets. For starters, the protections are lax.

"Based on our testing, health care applications performed more poorly on just about every (security) measure than applications in any other industry," says Tim Jarrett, a senior director of product marketing at Veracode, a Boston software security firm.

Then there's the industry's personnel problem.

"The U.S. has a huge shortage of highly qualified cybersecurity people across all industries," says Rod Piechowski, a senior director at the Healthcare Information & Management Systems Society, or HIMSS, a Chicago-based nonprofit with more than 50,000 members. "Being late to the game, health care just can't compete."

Although they're in high demand, IT professionals in health care and workers’ comp historically have not had a major say in their employers' procurement process, unlike in other industries, according to Jarrett.

Until recently, security wasn't prioritized the way it was in finance or banking, and, as a result, network administrators couldn't effectively lobby manufacturers to increase software security standards, so they often ended up overseeing systems that are tough to keep safe.

Plus, it's not just computer and billing systems that are vulnerable. Medical devices from insulin pumps to pacemakers store information wirelessly. Several years ago, former Vice President Dick Cheney revealed that, while he was in office, his doctors had disabled his heart implant's wireless connection because of a fear of assassination attempts. More recently, Johnson & Johnson warned customers about a security problem with one of its insulin pumps.

Some medical devices aren't made to allow any remote management, which prevents IT people from detecting problems and installing updates efficiently. Once tech teams are saddled with subpar systems, they're really stuck, because medical equipment tends to have a much longer lifecycle than consumer electronics. Jarrett says he knows of one Midwestern drug company where computers that prepare prescriptions for patients use Windows XP, a 16-year-old operating system that stopped being supported in 2014.

"That's horrifying," he says.

'Shadow IT' systems

Compounding the issue, some physicians, frustrated by clunky systems and compelled to find quick workarounds in the name of patient care, have created ad hoc "shadow IT" systems that rely on insecure methods like texts or unencrypted personal email, according to Coady.

As health care systems struggle to secure their data, increasingly sophisticated thieves have more reasons to steal it. Because the records include so much information, thieves can falsify insurance claims and collect checks, get tens or hundreds of thousands of dollars of free care on someone else's insurance (which might affect the real policyholder's coverage limits), and falsify driver's licenses to illegally get prescriptions.

"The fraud that can be executed against payers is incredible," Coady says.

Medical hackers have also been known to attempt extortion. In late 2014, Clay County Hospital, an 18-bed facility in downstate Flora, Illinois, received an anonymous message saying that more than 12,000 patient files would be released unless the hospital paid thousands of dollars. Administrators instead contacted the FBI, but other hospitals, including Hollywood Presbyterian Medical Center in Los Angeles, have paid thousands in similar situations.

Most Chicago hospital systems are reluctant to discuss their security efforts beyond confirming that they've invested lots of time and money. But they acknowledge the pressing issue.

"The Cook County Health & Hospitals System has invested considerable financial and human resources into ensuring the highest level of security possible," Donna Hart, the system's chief information officer, says in a statement. "The security of our systems is one of our highest priorities."

Eugene Keefe is a founding partner of Keefe, Campbell, Biery and Associates, a Chicago-based workers' compensation defense firm. This column was reprinted with his permission from the firm's client newsletter.

Comments

Related Articles