Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Freedom 250 banner logo Join HHS in Celebrating Freedom 250
    • About HHS

      HHS is a U.S. executive department that touches the lives of nearly all Americans by protecting your rights, research, food safety, health care, aging, and much more.

      Explore About HHS
    • About the Department
      • Leadership
      • HHS Divisions
      • Organizational Chart
      • Priorities
      • Budget in Brief
      • Contact Us
    • Press Room
      • Press Releases
      • Request for Comment
      • Request for Interview
      • Connect on Social Media
      • HHS Live
      • Podcasts
    • Careers
      • Working at HHS
      • Opportunities for Attorneys
      • Join the Health Workforce
      • I am HHS
      • New Employee Orientation
      • Transportation Services
    • Standards and Compliance
      • Gold Standard Science
      • Accessibility
      • Plain Writing
      • Digital Communications Standards
      • Records Management
    • Accountability and Transparency
      • Freedom of Information Act (FOIA)
      • Open Government
      • No Fear Act
      • Privacy at HHS
  • RealFood.gov
  • MAHA
    • Programs & Services

      HHS is responsible for public health, health care, and human/social services for the United States of America. This includes administering over 100 programs and services.

      Explore Programs & Services
    • Health Care
      • Find a Health Center
      • Find an Indian Health Service Facility
      • Find Support for Mental Health, Drugs, or Alcohol
      • Find a Cancer Center
      • Dental Care Options
      • Telehealth
    • Health Insurance
      • Medicare – 65+ or With Disability
      • Medicaid - Low-Income, With Disability, or Pregnant
      • Children’s Health Insurance Programs (CHIP)
      • Find Health Insurance Coverage
      • Insurance Help for Mental Health and Substance Use
      • No Surprise Medicals Bills
    • Social Services
      • Programs for Children and Families
      • Programs for People with Disabilities
      • Programs for Older Adults
      • Resources for Caregivers
    • Public Health and Prevention
      • Emergency Preparedness and Response
      • Healthy Lifestyle
      • Mental Health and Substance Use
      • Food Safety and Nutrition
      • Drug and Product Safety
    • Health Research and Information
      • National Library of Medicine
      • Surgeon General Reports
      • Health Data
      • National Center for Health Statistics
      • Medline Plus
      • Clinical Research Studies
      • Volunteering to Participate in Research
    • Laws & Regulations

      HHS protects and helps you understand the laws and regulations, also known as "rules," that govern the nation. You also have the power to voice your opinion on these laws and regulations.

      Explore Laws & Regulations
    • Regulatory Information
      • What is a Rule?
      • Find Rules by Division
      • Comment on Open Rules
      • Suggest Deregulatory Actions
      • Understand Key Federal Laws
    • Civil Rights
      • Your Civil Rights
      • Civil Rights Laws Enforced by HHS
      • Health Information Privacy
      • Substance Use Disorder Patient Confidentiality
      • Conscience and Religious Freedom
    • Laws and Regulations by Topic
      • HIPAA Privacy Rule
      • Health Insurance Protections
      • Health IT Legislation
      • Food and Drug Safety
      • Public Health Emergencies
    • Human Research Protections
      • The Belmont Report
      • Regulations, Policy, and Guidance
      • Human Subjects Regulations (45 CFR 46)
      • Register IRBs and Obtain FWAs
      • Trainings, Tutorials, and Workshops
      • International Research
    • Complaints and Appeals
      • File a Medicare Complaint
      • File a HIPAA Complaint
      • File a Civil Rights Complaint
      • Appeal an Insurance Company Decision
      • Report Fraud, Waste, and Abuse to OIG
      • Report a Problem to the FDA
      • Report a Tip on the Chemical and Surgical Mutilation of Children
    • Grants & Contracts

      HHS gives the most money in grants of any federal agency in the U.S. Find out about our grants and how your organization can apply for them. We also provide information on how you can work with us and our support of small businesses.

      Explore Grants & Contracts
    • Grants
      • Get Ready for Grants Management
      • Grant Policies and Regulations
      • Research Grants and Funding from NIH
      • Search Grants.gov
      • Avoid Grant Scams
      • Contact HHS Grant Officials
    • Contracts
      • Get Ready to Do Business with HHS
      • Programs for Businesses
      • Contract Policies and Regulations
      • Search Opportunities on SAM.gov
      • Contact HHS Contracting Managers
    • Small Business
      • Contract Opportunities
      • Small Business Programs
      • Small Business Resources
      • Contact Small Business Staff
    • Radical Transparency

      HHS protects and helps you understand the laws and regulations, also known as "rules," that govern the nation. You also have the power to voice your opinion on these laws and regulations.

      Explore Radical Transparency
    • CDC’s ACIP Conflicts of Interest
    • Ending Anti-Semitism on College Campuses
    • Ending Wasteful Spending
    • Keeping Food Ingredients Safe
    • Chemical Contaminants Transparency Tool
  • HIPAA for Individuals
  • Filing a Complaint
  • HIPAA for Professionals
  • Newsroom
Breadcrumb
  1. HHS
  2. HIPAA Home
  3. For Professionals
  4. The Security Rule
  5. Security Rule Guidance Material
  6. Spring 2019 OCR Cybersecurity Newsletter
  • HIPAA for Professionals
  • Regulatory Initiatives
  • Privacy
    • Summary of the Privacy Rule
    • Guidance
    • Combined Text of All Rules
    • HIPAA Related Links
  • Security
    • Security Rule NPRM
    • Summary of the Security Rule
    • Security Guidance
    • Cyber Security Guidance
  • Breach Notification
    • Breach Reporting
    • Guidance
    • Reports to Congress
    • Regulation History
  • Compliance & Enforcement
    • Enforcement Rule
    • Enforcement Process
    • Enforcement Data
    • Resolution Agreements
    • Case Examples
    • Audit
    • Reports to Congress
    • State Attorneys General
  • Special Topics
    • Parental Access
    • Mental and Behavioral Health
    • Change Healthcare Cybersecurity Incident FAQs
    • HIPAA and COVID-19
    • HIPAA and Reproductive Health
      • HIPAA and Final Rule Notice
    • HIPAA and Telehealth
    • HIPAA and FERPA
    • Research
    • Public Health
    • Emergency Response
    • Health Information Technology
    • Health Apps
  • Patient Safety
  • Covered Entities & Business Associates
    • Business Associate Contracts
    • Business Associates
  • Training & Resources
  • FAQs for Professionals
  • Other Administrative Simplification Rules
  • Substance Use Disorder Confidentiality

Spring 2019 OCR Cybersecurity Newsletter

In 2019, OCR moved to quarterly cybersecurity newsletters.  The purpose of the newsletters remains unchanged: to help HIPAA covered entities and business associates remain in compliance with the HIPAA Security Rule by identifying emerging or prevalent issues, and highlighting best practices to safeguard PHI.  

Spring 2019 OCR Cybersecurity Newsletter

Advanced Persistent Threats and Zero Day Vulnerabilities

An advanced persistent threat (APT) is a long-term cybersecurity attack that continuously attempts to find and exploit vulnerabilities in a target’s information systems to steal information or disrupt the target’s operations.1  Although individual APT attacks need not be technologically sophisticated, the persistent nature of the attack, as well as the attacker’s ability to change tactics to avoid detection, make APTs a formidable threat.

APTs are a serious threat to any information technology (IT) system, but especially those that are part of the health care field.  Healthcare services are part of a multibillion dollar industry that utilizes data to develop new drugs and treatments.  Medical research information, experimental treatment testing results, and even genetic data are valuable targets for theft because of their value in driving innovation.  Further, health information is used by healthcare providers and insurers to provide and pay for healthcare services for individuals.  If compromised, health information can be used for identify theft that could lead to financial fraud including theft of health insurance coverage benefits.  Also, because an individual’s health information can contain details concerning the most private and personal aspects of one’s life, the compromise of one’s health information could also lead to an ability to blackmail an individual based on their sensitive health information. Any security incident impacting the confidentiality, integrity, or availability of protected health information (PHI), can directly affect the health and safety of citizens.  APTs have already been implicated in several cyberattacks on the healthcare sector in the U.S. and around the world. 

Zero Day Exploits
One of the most dangerous tools in a hacker’s arsenal is the “zero day” exploit or attack which takes advantage of a previously unknown hardware, firmware, or software vulnerability.  Hackers may discover zero day exploits by their own research or probing or may take advantage of the lag between when an exploit is discovered and when a relevant patch or anti-virus update is made available to the public.

These exploits are especially dangerous because their novel nature makes them more difficult to detect and contain than standard hacking attacks.  The possibility of such an attack emphasizes the importance of an organization’s overall security management process which includes monitoring of anti-virus or cybersecurity software for detection of suspicious files or activity.  Though hackers may exploit zero day vulnerabilities to gain unauthorized access to an organization’s computer system, appropriate safeguards, including encryption and access controls, may mitigate or even prevent unauthorized access to, or loss of, protected information.  Once zero day vulnerabilities are made public, this information becomes accessible to both good and bad actors alike which means entities should have measures in place to be aware of new patches and for assessing the need to apply them.  In the event a timely patch is not available, or cannot be immediately implemented (such as when testing is needed to ensure that the patch works with components of an entity’s information systems), an entity  may consider adopting other protective measures such as additional access controls or network access limitations to mitigate the impact of the zero day vulnerability until a patch is available.

A Dangerous Combination
APTs and zero day threats are dangerous enough by themselves. An APT using a zero day exploit can threaten computers and data all over the world. One such example is the EternalBlue exploit.  EternalBlue targeted vulnerabilities in several of Microsoft’s Windows operating systems. Soon after the EternalBlue exploit became publically known, the WannaCry ransomware was released and began spreading, eventually infecting hundreds of thousands of computers around the world. The damages due to WannaCry infections are estimated to be in the billions of dollars. Analysis of WannaCry found that it used EternalBlue to spread and infect other systems. One of the organizations most impacted was the United Kingdom’s National Health Service (NHS) which had up to 70,000 devices infected, forcing healthcare providers to turn away patients and shut down certain services. Several HIPAA covered entities and business associates in the United States were also affected by this cyberattack.

What Can HIPAA Covered Entities and Business Associates Do?
There are many security measures that organizations can proactively implement to help mitigate or prevent the damage that an APT or zero day attack may cause. The HIPAA Security Rule requires security measures that can be helpful in preventing, detecting and responding to cyberattacks such as those perpetrated by APTs or hackers leveraging zero day exploits. The HIPAA Security Rule includes the following security measures that can reduce the impact of an APT or zero day attack:

  • Conducting risk analyses to identify  risks and vulnerabilities (See 45 CFR § 164.308(a)(1)(ii)(A));
  • Implementing a risk management process to mitigate identified risks and vulnerabilities (See 45 CFR § 164.308(a)(1)(ii)(B));
  • Regularly reviewing audit and system activity logs to identify abnormal or suspicious activity (See 45 CFR § 164.308(a)(1)(ii)(D));
  • Implementing procedures to identify and respond to security incidents (See 45 CFR § 164.308(a)(6));
  • Establishing and periodically testing contingency plans including data backup and disaster recovery plans to ensure data is backed up and recoverable (See 45 CFR § 164.308(a)(7));
  • Implementing access controls to limit access to ePHI (See 45 CFR § 164.312(a));
  • Encrypting ePHI, as appropriate, for data-at-rest and data-in-motion (See 45 CFR §§ 164.312(a)(2)(iv), (e)(2)(ii)); and
  • Implementing a security awareness and training program, including periodic security reminders and education and awareness of implemented procedures concerning malicious software protection, for all workforce members (See 45 CFR § 164.308(a)(5)).

Additional Resources:

  • Guidance on Software Vulnerabilities and Patching
    https://www.hhs.gov/sites/default/files/june-2018-newsletter-software-patches.pdf
  • HHS Update: International Cyber Threat to Healthcare Organization
    https://files.asprtracie.hhs.gov/documents/hhs-update-4-international-cyber-threat-to-healthcare-orgs.pdf
  • An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
    https://www.nist.gov/publications/efficient-approach-assessing-risk-zero-day-vulnerabilities
  • Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems
    https://csrc.nist.gov/publications/detail/sp/800-160/vol-1/final
  • OCR's Spring 2019 Cybersecurity Newsletter

* In general, OCR’s newsletters do not establish legally enforceable responsibilities. Instead, these newsletters should be viewed only as recommendations, unless specific regulatory or statutory requirements are cited.

  • 1https://csrc.nist.gov/publications/detail/sp/800-39/final
Content last reviewed April 9, 2019
Back to top
Secretary Robert F. Kennedy Jr.

Follow @SecKennedy

HHS icon

Follow @HHSGov

HHS Email updates

Receive email updates from HHS.

Subscribe

HHS Logo

HHS Headquarters

200 Independence Avenue, S.W.
Washington, D.C. 20201
Toll Free Call Center: 1-877-696-6775​

  • Contact HHS
  • Careers
  • HHS FAQs
  • Nondiscrimination Notice
  • Press Room
  • HHS Archive
  • Accessibility Statement
  • Budget/Performance
  • Inspector General
  • Web Site Disclaimers
  • EEO/No Fear Act
  • FOIA
  • The White House
  • USA.gov
  • Vulnerability Disclosure Policy