Emergency Preparedness

Appendix H.4 – CYBER ATTACK

Kern Medical Emergency Preparedness

as well as MAC Filter addresses, will keep other on approved devices from access hospital devices.  Rouge Wi-Fi detection: to prevent access of electronic eavesdroppers • Wi-Fi Protected Access 2 (WPA2) • SHA (Secure Hash Algorithms) level 2 or above and/or MD5 (Merkle-Damgard) are being used to create secure Wi-Fi Connection Operating Systems Firewall  Operating systemmanufacturer firewall is enabled: Domain | Private configurations for specific systems. Public OS FW, will be set to BLOCK ALL  Macros are disabled in MS Office: All legacy Office products from 2007 version and later will not be allowed  Anti-virus installed and updated: Managed via Console, updates are applied hourly. Scans are completed nightly per machine (quick scan), and weekly (full scans). All after hours late in an automated fashion. Reports will be sent to InfoSec@kernmedical.com daily for review Remote Access  Virtual Private Network (VPN): are done via the FW  Horizon View 7: protects Remote Access to KMH management system /patient records/ diagnostic images in Open Vista |Cerner.  Access is on a case by ase basis: • No data is allowed to be copied into the domain or out of domain via policy • Dictation will be able to complete from inside an HTML access version or the Downloaded version. • Screen Capture has been blocked • File Transfer has been blocked • External users who wish to use the system must adhere to the security regime on the local machine before access is given. Printers/Copiers (Storing Data)  All leased devices containing hard drives have the hard drives removed prior to returning to vendors.  Legal counsel and vendors have been consulted regarding contractual assurances of data destruction Backup and Disaster Recovery Plan  Compromised Data • Cryptolocker: Cryptography rendering office systems data unusable • Ransomware | Phishing Attack: Data with the intent to mask as a C level staff for data extraction • Malware Attack: Unauthorized software installations, “bloatware,” Keyloggers, scripts that can provide malformed data.

Page 223

Made with FlippingBook - Online Brochure Maker