21
BYOD in Hospitals Security Issues and Mitigation Strategies Tafheem Ahmad Wani [email protected] Dr. Antonette Mendoza [email protected] A/Prof. Kathleen Gray [email protected]

BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

  • Upload
    others

  • View
    24

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

BYOD in Hospitals

Security Issues and Mitigation Strategies

Tafheem Ahmad Wani [email protected]

Dr. Antonette Mendoza [email protected]

A/Prof. Kathleen Gray [email protected]

Page 2: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Outline

Background (Research Context)

Research questions

Research methodology

Findings DiscussionConclusion & Future work

Important references

Page 3: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Background

• BYOD= Personal devices at work for professional purposes.

• Increased demands-cost, time and productivity.

• Communication,photography, documentation, clinical reference.

SPOK. (2017). SPOK’S FIFTH ANNUAL MOBILITY STRATEGIES IN HEALTHCARE SURVEY: RESULTS REVEALED.

Retrieved from http://www.spok.com/infographic-byod-2017

Page 4: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Background

Skycure. (2016). Mobile Security Trends in Healthcare. Retrieved from https://www.skycure.com/blog/mobile-security-trends-in-healthcare/

Page 5: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Challenges in health

Among biggest health IT headaches (CIO)

Continuous proliferation of IoT devices

Continuous BYOD

market growth

Lack of peer-

reviewed literature

Strict legal

requirements

Increased risk of

security breaches

Page 6: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Research question

What mitigation strategiescan overcome the security issuesof employee BYOD in hospitals?

Page 7: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Methodology

2 step process:

• Comprehensive literature review of proposed solutions.

• Using two generic security frameworks to organise the solutions

into a stepwise mitigation strategy.

Page 8: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Literature review - PRISMA

Diagram

Total records retrieved through database searching+ First 200 google scholar articles retrievedYear 2013-present, peer reviewed, English

(n = 5256)(EBSCO-Host: n=171, Pubmed: n=609, Medline: n=631, IEEE Explorer: n=639, ProQuest central:

n=512, Science Direct: n=1325, Springer: n=1169, Google Scholar: n=200)

Scre

enin

gIn

clu

ded

Elig

ibili

tyId

enti

fica

tio

n

Records after duplicates removed (Titles screened)(n = 3821)

Abstract screening(n =527)

Records excluded(n = 431)

Full-text articles assessed for eligibility

(n = 96)

Full-text articles excluded, with reasons(n = 64)

Exclusions:BYOD for clinical trials/education.BYOD for practices.Only security concerns, infections,interference or bandwidthrequirements excluded.Papers with BYOD focus- clinicalphotography or secure messagingexcluded.

Total studies included in research

(n = 32+5=37)

Additional articles through citation search

(n = 5)37

Page 9: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Mitigation strategy frameworks

People

TechnologyPolicy

7. Assess and

Monitor

1. Plan

2. Identify

3. Protect

4. Detect

5. Respond

6. Recover

Schlarman’s PPT Model (2006) Zahadat et al.’s BYOD Security Framework (2015)

Page 10: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

54%

13%

14%

5%

11% 3%

Distribution of studies by country

USA

Canada

UK

Australia

Other

Transnational

Review results - distribution by country

Page 11: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Review results - distribution by method

38%

11%13%

35%

3%

Distribution of studies by method

Expert commentary

Literature review

Survey

Mixed method

Systematic literaturereview

Page 12: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Review results - distribution by theme

16%

43%14%

8%

6%5%

8%

Distribution of studies by theme

Usage behaviour

General issues/solutions

Awareness

Legal issues

Network security issues

People issues (Excludingawareness)

Other

Page 13: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Key Issues

Recommendations

Network Security03● Using infected devices in PAN or LAN

● Devices infected through insecure networks

like hotspots in WAN

Device, Application and

Data Security02

● Using malicious applications like mhealth

apps

● Poorly designed insecure applications

● Unauthorised Access by friends or family

● Jailbroken or outdated devices

● Lost devices

Identity, Authentication and

Access Control1● No or weak authentication mechanisms

● Access privilege abuse

● Medical Identity Theft

.

.

Management and People.04

● Lack of clear guidelines on BYOD usage

● Burden of managing multiple device types and OS

● Usability issues

● Lack of trust between employees & management

to manage personal devices

Legal (Compliance)05● Strict regulatory requirements for health data

● Heavy fines for PHI breaches

.

.

Page 14: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

7 Steps in Mitigation Strategies

1.Plan

• Develop a comprehensive BYOD policy in alignment with hospital needs.

• Establish strong governance for the BYOD program with clear division of roles.

• Sign a legal user agreement with employees using BYOD.

• Choose the right technology, especially MDM/Mobility management solution.

• Design an awareness program for employees.

2.Identify

• Registration and installation of security settings for BYOD devices.

• Use user group list to grant access privilege according to data need.

• Train employees through workshops, LMS, or programs to increase security awareness.

3.Protect

• Strict/secure authentication methods like complex passwords or 2 factor authentication.

• Single sign-on for better usability.

• Use enterprise applications with a secure design such as for safe photo sharing and communication.

• Use MDM for automatic enforcement of security controls.

• Use strong encryption methods to protect hospital data in rest and motion.

• Use VPN with virtualisation for transmission security and keeping hospital data within its infrastructure.

• Use containerisation/sandboxing to separate personal and hospital data.

Page 15: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

7 Steps in Mitigation Strategies

4.Detect

• Develop awareness among employees about how to report security incidents.

• Encourage employees to use software such as anti-malwares, anti-virus to detect device vulnerabilities.

• Use visualisation software to understand abnormal behavior of data in order to pinpoint the source of the problem.

• Track location during work hours using MDM.

5.Respond

• Blacklist applications known to cause security issues.

• Selectively wipe hospital data in case of theft using containerisation.

• Train employees about standard operating procedure to respond to common security threats.

6.Recover

• Use hospital owned private cloud to backup patient data.

• Develop SLAs in case of lack of funding to own private data.

• Use virtualisation and containerisation o minimise hospital data processing on personal devices.

• Employees and management should access each other’s data only when required.

7.Assess & Monitor

• Periodically review BYOD policy in view of changing security requirements.

• Continuously monitor vendors against designed SLA’s.

• Periodically test and approve new devices and communicate to the relevantparties.

• Deprovision repeatably violating devices or devices of employees leavingorganisation.

Page 16: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Discussion

• Overall, the success of a BYOD security program in

hospitals is likely to be dependent on how well the

balance between security and usability is achieved,

given the time-sensitive nature of the work which

hospital employees perform.

• A combination of policy control measures,

technological solutions, and better people

management in a highly regulated hospital industry is

likely to be the ideal solution to mitigate BYOD

security concerns in hospitals.

Page 17: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Limitations

BYOD term in research vocabulary

addressed in different ways.

Most studies found were expert

commentaries.

Clinical photography and secure

messaging excluded from the study.

Non-English, grey literature, and peer reviewed literature before 2013 has

been omitted.

Limitations

Page 18: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Conclusion

• The paper took a broad perspective and tried to highlight the technical,

managerial and social issues of BYOD security in hospitals and

corresponding mitigation strategies using two frameworks.

• This research needs to be validated through real-life studies in

hospitals.

• This research can be beneficial for- hospital senior management/policy

developers, hospital IT department, healthcare professionals,

informatics researchers.

Page 19: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

More studies in real hospital settings

BYOD in resource-constrained settings

BYOD in Australian hospitals

Future Work

Page 20: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Important References

• Al Ayubi, S. U., Pelletier, A., Sunthara, G., Gujral, N., Mittal, V., & Bourgeois, F. C. (2016). A Mobile App

Development Guideline for Hospital Settings: Maximizing the Use of and Minimizing the Security Risks of

“Bring Your Own Devices” Policies. JMIR MHealth and UHealth, 4(2). https://doi.org/10.2196/mhealth.4424

• Burns, A. J., & Johnson, M. E. (2015). Securing Health Information. IT Professional, IT Prof., (1), 23.

https://doi.org/10.1109/MITP.2015.13

• Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., … Steinhubl, S. R. (2016).

Privacy and security in the era of digital health: what should translational researchers know and do about it?

American Journal of Translational Research, 8(3), 1560–1580.

• Johnson, K. (2014). An IT CEO talks about the BYOD trend. Biomedical Instrumentation & Technology, 54–

56. https://doi.org/10.2345/0899-8205-48.s1.54

• Marshall, S. (2014). IT Consumerization: A Case Study of BYOD in a Healthcare Setting. Technology

Innovation Management Review, 14.

• Martinez, K., Borycki, E., & Courtney, K. L. (2017). Bring Your Own Device and Nurse Managers’ Decision

Making. CIN: Computers, Informatics, Nursing, 35(2), 69. https://doi.org/10.1097/CIN.0000000000000286

• Moyer, J. e. (2013). Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and

Usage. JOURNAL OF HOSPITAL LIBRARIANSHIP, (3), 197.

• Sansurooh, K., & Williams, P. (2014). BYOD in ehealth: Herding cats and stable doors, or a catastrophe

waiting to happen? Australian EHealth Informatics and Security Conference.

https://doi.org/10.4225/75/5798284331b46

• Smith, K. A., Zhou, L., & Watzlaf, V. J. M. (2017). User Authentication in Smartphones for Telehealth.

International Journal Of Telerehabilitation, 9(2), 3–12. https://doi.org/10.5195/ijt.2017.6226

• Stephens, K., Zhu, Y., Harrison, M., Iyer, M., Hairston, T., & Luk, J. (2017). Bring Your Own Mobile Device

(BYOD) to the Hospital: Layered Boundary Barriers and Divergent Boundary Management Strategies.

https://doi.org/10.24251/HICSS.2017.426

• Williams, J. (2014). Left to their own devices how healthcare organizations are tackling the BYOD trend.

Biomedical Instrumentation & Technology, 48(5), 327–339. https://doi.org/10.2345/0899-8205-48.5.327

Page 21: BYOD in hospitals- Security Issues and Mitigating Strategies · •Establish strong governance for the BYOD program with clear division of roles. •Sign a legal user agreement with

Contact

• https://dl.acm.org/citation.cfm?id=32907

29

• Email: [email protected]