<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tejas Nair, Author at Colocation America</title>
	<atom:link href="https://www.colocationamerica.com/blog/author/tejasnair/feed" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Dedicated Servers and Colocation Services &#124; Colocation America</description>
	<lastBuildDate>Tue, 22 Oct 2024 18:21:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>How Strong Authentication Can Inspire Better PHI Security</title>
		<link>https://www.colocationamerica.com/blog/better-phi-security</link>
					<comments>https://www.colocationamerica.com/blog/better-phi-security#respond</comments>
		
		<dc:creator><![CDATA[Tejas Nair]]></dc:creator>
		<pubDate>Tue, 03 Dec 2019 15:07:09 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=21372</guid>

					<description><![CDATA[<p>Debates concerning online privacy and data security have been active across the globe. Some of these, favorably, has resulted in far-reaching changes on how things are governed on the internet, with the European Union’s General Data Protection Regulation (GDPR) being<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/better-phi-security">How Strong Authentication Can Inspire Better PHI Security</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Debates concerning online privacy and data security have been active across the globe. Some of these, favorably, has resulted in far-reaching changes on how things are governed on the internet, with the European Union’s </span><a href="https://gdpr-info.eu/issues/encryption/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">General Data Protection Regulation</span></a><span style="font-weight: 400;"> (GDPR) being just one example of a significant measure taken by an international, governmental body. Yet, there is one subject close to home that is not up for debate: The American healthcare brigade’s casual treatment of protected healthcare information (PHI), which are collectively one of the most vulnerable resources for exploitation today.</span></p>
<p><span style="font-weight: 400;">Outdated security systems and authentication protocols adopted by healthcare organizations and a sheer lack of knowledge in handling PHI is the root cause of modern-day medical data breaches. What further makes this situation problematic is that most users – whose private data such as medical history and payment details are on the line – do not have much idea about this vulnerability. This eventually forms a loop and turns into a gold mine for hackers and cyberpunks looking to extract private data from vulnerable platforms and selling them on the nether side of the web, or worse, for drug diversion and claims fraud. The consequences of such a multitudinous event in cyberspace can be catastrophic. </span></p>
<p><center><iframe src="https://www.youtube.com/embed/d_kMo9eLvyQ" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></center><span style="font-weight: 400;">Which points to the need for better, stronger authentication protocols. Methods that can help get rid of this deadly combination of obsolete technology used by the healthcare industry and user unawareness. The good thing is that this approach of implementing ‘strong authentication’ has already rewarded with higher-level privacy and general peace of mind regarding data to its participants who have been pragmatic enough to understand the perils of susceptible authentication and security practices.</span></p>
<p><span style="font-weight: 400;">It is high time that the status quo of data security techniques in PHI is questioned, and safer and more secure means to collect, maintain, and manage our data on the cloud are adopted. The world is already well-equipped with the infrastructure needed to get the ball rolling, but there’s still a long way to go! Here’s how…</span></p>
<p><span style="font-weight: 400;">A more in-depth look into this looming threat of PHI vulnerability and exploitation, outdated authentication protocols prevalent in the industry today, and a strong, permanent solution to it all. Read on…</span></p>
<h2>The Other Cost of Healthcare</h2>
<p><span style="font-weight: 400;">Even as the medical industry in the United States scrambles to provide the best healthcare to its people despite the burgeoning cost, there is a much higher, extra toll that people pay to get aid. An average American citizen has at least some of her information in some form recorded in the hospitals she has visited over her lifetime. This data collectively called PHI under the federal law and, </span><a href="https://www.colocationamerica.com/data-center-certifications/hipaa-compliance"><span style="font-weight: 400;">as stated under</span></a><span style="font-weight: 400;"> its Health Insurance Portability and Accountability Act (HIPAA), is lawfully collected by the hospitals as part of their patient data entry. The problem enters the equation with a closer look into this data, its entry, and its retrieval.</span></p>
<p><span style="font-weight: 400;">How poorly hospitals and healthcare organizations at large handle, attempt to anonymize and de-identify, and store this particular set of data is what adds to the extra cost that users pay. To have personal information such as one’s medical history and insurance details, social security number, and other private identifiers out in the open in a hospital’s network available for hackers to extract through brute-force is not only a serious issue but also a case that needs to be discussed and acknowledged by the people who are most affected by it. </span></p>
<p><span style="font-weight: 400;">According to </span><span style="font-weight: 400;">a recent survey report released in 2015</span><span style="font-weight: 400;"> by a security software provider, almost 22% of US healthcare workers do not require credentials to access data from their hospital’s network. What’s even more surprising is that data access limitations based on time and place are rarely applicable, which is not so worse than the high number of workers having direct, no-holds-barred access to PHI. But, the most concerning part is how this data is stored and protected: using passwords.</span></p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-21374" src="https://coloam.hostadillo.com/wp-content/uploads/2019/12/security-rule-phi.jpg" alt="number of reported hackings" width="600" height="364" srcset="https://www.colocationamerica.com/wp-content/uploads/2019/12/security-rule-phi.jpg 600w, https://www.colocationamerica.com/wp-content/uploads/2019/12/security-rule-phi-300x182.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2019/12/security-rule-phi-241x146.jpg 241w, https://www.colocationamerica.com/wp-content/uploads/2019/12/security-rule-phi-50x30.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2019/12/security-rule-phi-124x75.jpg 124w" sizes="(max-width:767px) 480px, 600px" /></p>
<p><span style="font-weight: 400;">To further understand how this infant system provides easy access to a healthcare worker without credentials or multi-factor authentication, let’s take a look at the necessary security standards used by these very organizations. It should be noted that this is, in no way, meant to undermine the efforts taken by hospitals to solve this issue. Instead, this is intended as an exercise in creating awareness about it.</span></p>
<h2>The Limitations of OAuth</h2>
<p><span style="font-weight: 400;">Most healthcare organizations’ security systems use an open authorization standard called OAuth for access delegation. Here a healthcare worker can access resources from a PHI database with the help of an access token through an authorization server. This is effectively implemented with the approval of the resource owner, i.e. the patient.</span></p>
<p><span style="font-weight: 400;">In such a system, a mother-to-be knows that her hospital has an entire record of her private information, including her health report, but does not have a definite assurance about its security. She assumes that this data will be scrupulously used by her attending physicians and medical experts to help her get medically better and ease her and her newborn into their new life. But she does not know that this same data is held insecurity in the hospital’s first cloud network using a weak password </span><a href="https://www.cnbc.com/2016/10/06/passwords-are-the-weakest-link-in-cybersecurity-today-michael-chertoff-commentary.html" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">that could very well be “Password1”</span></a><span style="font-weight: 400;"> and which is known to not just the head gynecologist but also her entire team of twelve members. </span></p>
<p><span style="font-weight: 400;">The same password may also be the magic phrase of other applications, say the Gmail account, of the person who initially set it. Of course, there may be additional authentication factors involved, like the popular one-time password (OTP). Yet outside of a layman’s perspective, such considerations are as vulnerable as passwords to a hacker’s attacking lines of codes. A phisher can effectively steal passwords and all other “shared elements” (also known as shared secret authentication) as long as they are tied to the network and the platform. And that is where OAuth loses its competence.</span></p>
<p><span style="font-weight: 400;">Additionally, the problem with such a standard for authorization lies in its implicit flow, which authorizes the user, say a nurse on duty, but does not authenticate her, which can lead to user impersonation. A very advanced form of this example is what recently led to a </span><a href="https://www.technologyreview.com/2019/02/19/239592/once-hailed-as-unhackable-blockchains-are-now-getting-hacked/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">so-called 51% attack</span></a><span style="font-weight: 400;"> against Ethereum Classic, one of the world’s top 20 cryptocurrencies. In January 2019, an unknown attacker took hold of more than half of the cryptocurrency’s computing power through the exchange platform Coinbase and used it to allegedly siphon virtual money to the tune of $1.1 million. </span></p>
<p><span style="font-weight: 400;">Sure, such cyber heists executed on complex networks like blockchains are blamed on more than just the exchange platforms’ basic security systems, but what needs to be deduced from this example is the vulnerability of a system that does not make the case for strong authentication, a protocol that depends not on passwords and digital tokens but on data that depends on retrieval of information that </span><i><span style="font-weight: 400;">only the end-user owns</span></i><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">Passwords have been passé for a long time. Yet, healthcare organizations still depend on them to secure essential patient data online because it’s cheap and universally accepted. The biggest issue with OAuth – which is also present in its 2.0 version, still used and widely accessible – is that it does not support encryption or client verification. It also does not support biometrics, a key authentication element in protocols that is the best possible solution to this menace in this twenty-first century.</span></p>
<h2>Embrace the FIDO Alliance</h2>
<p><span style="font-weight: 400;">The concept of ‘strong authentication’ was mentioned above while noting its different powers to not only protect sensitive PHI but also act as a way to end the problems that arise from the usage of passwords as a security trick.</span></p>
<p><span style="font-weight: 400;">The </span><a href="https://fidoalliance.org/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">FIDO Alliance</span></a><span style="font-weight: 400;">, which stands for ‘Fast IDentity Online,’ is a global consortium of several private and not-for-profit organizations that makes use of cryptographic protocols to provide security to online information. A complex system that impugns the use of passwords as a way to secure data, defining FIDO in simple words would mean comparing it with the very notion of strong authentication.</span></p>
<p><img decoding="async" class="aligncenter size-full wp-image-21375" src="https://coloam.hostadillo.com/wp-content/uploads/2019/12/fido-alliance.png" alt="fido alliance" width="600" height="369" srcset="https://www.colocationamerica.com/wp-content/uploads/2019/12/fido-alliance.png 600w, https://www.colocationamerica.com/wp-content/uploads/2019/12/fido-alliance-300x185.png 300w, https://www.colocationamerica.com/wp-content/uploads/2019/12/fido-alliance-237x146.png 237w, https://www.colocationamerica.com/wp-content/uploads/2019/12/fido-alliance-50x31.png 50w, https://www.colocationamerica.com/wp-content/uploads/2019/12/fido-alliance-122x75.png 122w" sizes="(max-width:767px) 480px, 600px" /></p>
<p><span style="font-weight: 400;">In such a system, the protocol does not depend on passwords but elements that are permanently linked to a person. For example, a secret that only the user knows, or simply, a scan of the user’s iris. Think of it not as a password that you have to remember all the time to access your account on a social networking website or as an OTP that is shared on your mobile number that can be easily intercepted by following a video on YouTube. </span></p>
<p><span style="font-weight: 400;">Instead, think of FIDO as a protocol that will require multiple forms of verification (an authenticated device like a smartphone embedded with the Universal Authentication Framework (UFA) protocol; a fingerprint or iris scan; or any other private information that establishes the user ‘as is’), selected randomly by an uncompromising server (the FIDO server), and matched with a previously-generated public key to provide access. </span></p>
<p><span style="font-weight: 400;">Going through that previous statement and decoding each word may result in more questions, but suffice to say that the protocol promises a stronger, more secure way to deal with PHI. But how? Let’s find out quickly…</span></p>
<h2>Why FIDO? Why Strong Authentication? How Safe is PHI Then?</h2>
<p><span style="font-weight: 400;">Embracing the FIDO Alliance, which has already been done by internet behemoths like Google and Microsoft (it should be added that the popular browser from the former already supports FIDO), definitely has its own set of benefits and improvements over existing data security practices. How it can </span><a href="https://fidoalliance.org/adoption/market-solutions/healthcare-and-insurance/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">inspire better PHI security</span></a><span style="font-weight: 400;"> lies in these quick pointers:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Public-key cryptography – the core system in FIDO – makes use of two keys (a public key that is shared across websites and platforms; and a private key that is </span><i><span style="font-weight: 400;">known only to the user</span></i><span style="font-weight: 400;">) – to facilitate an interaction where anyone can encrypt the data but decryption will require the key that the user owns</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Apart from reducing users’ reliance on passcodes, it makes use of convenient methods like </span><a href="https://www.colocationamerica.com/blog/benefits-of-biometric-passwords"><span style="font-weight: 400;">biometrics</span></a><span style="font-weight: 400;"> and behavioral authentication (popularly </span><a href="https://fidoalliance.org/aetna-deploys-fido-authentication/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">adopted by American healthcare giant Aetna</span></a><span style="font-weight: 400;">), a single login for multiple devices, and one-touch control – all without the risk of a 3</span><span style="font-weight: 400;">rd</span><span style="font-weight: 400;">-party or middleman</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">There is no server-side information (passwords, security question, and answer) that an attacker would take the pains to steal. The data (which is encrypted) is retrieved from the server only when the private key is provided</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong authentication protocols also provide patients with the much-needed confidence to freely supply their health information as well as the consent to use them that will help them in their own health’s upkeep, this time with a renewed assurance that everything is done with the highest trustworthiness</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">FIDO is cost-efficient and future-proof because of its more straightforward setup, lower risk of breaches, and cleanup thereof and because it’s the highest level of security technology currently available.</span></li>
</ul>
<p><span style="font-weight: 400;">This is the basic premise of the FIDO Alliance and why it is touted as the future of data security in PHI. In a few years, FIDO’s advanced security protocols will be so strong that people will be using their smartphones as primary authenticators. All the more reason to embrace it and spread awareness about the canons of power that it holds over existing, meeker approaches when it comes to data security.</span></p>
<p><span style="font-weight: 400;">If blockchains – known widely for being unhackable – can now get hacked due to poor security practices on the part of organizations, then there is enough cause for concern to shift the focus on PHI security. The healthcare industry may have been lucky so far if the total number of </span><a href="https://www.cyberscoop.com/verizon-annual-data-breach-investigations-report-depressing-dbir/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">breaches that have been reported</span></a><span style="font-weight: 400;"> in general so far is measured. However, it’s time not to wait for a tragedy to strike and act before precious data is compromised.</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/better-phi-security">How Strong Authentication Can Inspire Better PHI Security</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/better-phi-security/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 37/58 objects using Redis
Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: colocationamerica.com @ 2026-04-04 13:44:04 by W3 Total Cache
-->