Cybersecurity Practices for Health Care Organizations~ RJ BLANCHARD BENEFIT SERVICES

Page 25

Table 2. Basic Endpoint Controls to Mitigate Risk at Endpoints Control

Antivirus (AV)

Description

Technology capable of detec�ng known malicious malware using signatures, heuris�cs, and other techniques

Implementation Specification • Push AV packages out using endpoint management systems that interface with Windows and Apple opera�ng systems (OS). • Develop metrics to monitor the status of AV engines, signature updates and health. • Dispatch field services/desktop support for malware that is detected but not automa�cally mi�gated. • Leverage network access control (NAC) to conduct a valida�on check prior to enabling network access. • Ensure that encryp�on is enabled on new endpoints acquired by the organiza�on.

Full disk encryption

Technology capable of encryp�ng an en�re disk to make it unreadable for unauthorized individuals

• Connect encryp�on management to endpoint management systems that interface with both Windows and Apple OS. • Develop metrics to monitor the status of encryp�on. • Dispatch field services/desktop support teams to resolve encryp�on errors. • Use an�-the� cable locks to lock down any device that cannot support encryp�on. • Leverage NAC to conduct a valida�on check prior to enabling network access. • Limit usage of local administrator accounts. Enable only local administra�ve rights required by the user. Use a separate account dedicated to this purpose.

Hardened baseline images

Configure the endpoint opera�ng system in the most secure manner possible

• Enable local firewalls and limit inbound access to the endpoint to only required ports. • Disable weak authen�ca�on hashes (e.g., LANMAN, NTML Version 1.0). • Prevent so�ware from auto-running/star�ng, especially when using thumb drives. • Disable unnecessary services and programs. • Permit usage only of known hardware encrypted thumb drives for wri�ng data. • Review and consider the implementa�on of Security 25


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Appendix B: References

3min
pages 105-108

Table 13. Incident Response Plays for Attacks Against Medical Devices

8min
pages 93-96

Table 15. Acronyms and Abbreviations

0
page 100

Table 14. Example Cybersecurity Policies for Consideration

0
page 97

Cybersecurity Practice #9: Medical Device Security

10min
pages 87-91

Table 12. Timeframes for Resolving Medical Device Vulnerabilities

1min
page 92

Table 11. Roles and Responsibilities for an Organizational CIRT

17min
pages 79-86

Table 9. Factors for Consideration in Penetration Test Planning

6min
pages 69-72

Cybersecurity Practice #6: Network Management

15min
pages 57-64

Cybersecurity Practice #8: Security Operations Center and Incident Response

4min
pages 73-74

Table 10. Example Incident Response Plays for IR Playbooks

5min
pages 75-78

Cybersecurity Practice #7: Vulnerability Management

5min
pages 65-67

Cybersecurity Practice #5: IT Asset Management

8min
pages 52-56

Table 7. Expanding DLP to Other Data Channels

3min
pages 49-51

Table 6. Data Channels for Enforcing Data Policies

2min
page 48

Table 3. Example of a Data Classification Schema

1min
page 43

Table 5. Security Methods to Protect Data

6min
pages 45-47

Table 4. Suggested Procedures for Data Disclosure

1min
page 44

Cybersecurity Practice #4: Data Protection and Loss Prevention

1min
page 42

Cybersecurity Practices at Medium-Sized Health Care Organizations

4min
pages 4-6

Table 1. E-mail Protection Controls

19min
pages 15-23

Cybersecurity Practice #3: Identity and Access Management

23min
pages 31-41

Cybersecurity Practice #2: Endpoint Protection Systems

1min
page 24

Table 2. Basic Endpoint Controls to Mitigate Risk at Endpoints

9min
pages 25-30

Cybersecurity Practices at Large Health Care Organizations

3min
pages 7-8

Cybersecurity Practice #1: E-mail Protection Systems

1min
page 14

Introduction

0
page 3
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.