The COVID-19 pandemic has led to a welcome increase in virtual care across Canada, with the unfortunate side effect being the healthcare sector is now even more vulnerable to cybersecurity threats. Recently, UK, US and Canadian cybersecurity intelligence services identified Russian intelligence services as responsible for targeting organizations conducting vaccine research. All national cybersecurity agencies are continuing to ring the alarm that pandemic related intelligence is a high priority target. HealthCareCAN has examined the implications for our members to provide a roadmap that can mitigate this emerging risk and identify crucial next steps.
The COVID-19 pandemic changed the world as we know it. The pandemic resulted in a massive expansion of virtual primary care Canada-wide1 and more than half of patient visits with health care providers shifted to virtual care2. The Canadian Medical Association recently released a poll that showed of the 1,800 Canadians interviewed, 91% stated there were very satisfied with virtual care services and 42% would prefer to continue using them3 after the pandemic crisis has passed.
HealthCareCAN conducted a poll of our members in April 2020 about their immediate needs regarding virtual care during COVID-19 and their responses stressed the importance of increasing support structures. They identified many gaps and some of their main suggestions were:
As our healthcare system continues to increase virtual care services, healthcare organizations must improve their cybersecurity capabilities. It is also vitally important that the healthcare sector realize that cybersecurity is not simply an IT issue. A breach of healthcare facilities can impact the integrity, confidentiality, and availability of vital information (e.g. patient records, appointments, doctor call schedules, procedure room bookings, etc.), which makes securing critical infrastructure a pressing business issue.
Healthcare providers have access to enormous amounts of sensitive data that are attractive to malicious actors. Some of the most common cyber attacks involve:
HealthCareCAN recognizes the importance of promoting resilient critical infrastructure and cybersecurity. The pandemic has caused a sudden increase in people working remotely without their organization’s IT security net (e.g. infrastructure, firewalls, policies, etc.), making the potential of cybersecurity breaches even more likely. The healthcare sector has the added challenges of using legacy technology, lack of funding and resources, and lack of guidance and support from both government and industry. We are involved with several organizations to stay aware of the current situation and mitigate risk for our members.
In October 2019, along with our member Eastern Health in Newfoundland and Labrador, and our partner the Canada-Israel Industrial Research and Development Foundation (CIIRDF), we co-hosted the Canada-Israel Exchange on Cybersecurity in Health in St. John’s. The Exchange was created as a tool to mitigate cybersecurity gaps by developing collaboration between Israeli technical experts, Canadian innovation partners (e.g. Telus, Becton, Dickinson and Company (commonly known as BD) or GE Health), health system leaders, and provincial/territorial governments. The agenda for the event centred on two goals:
The Exchange shed light on many of our cybersecurity vulnerabilities and some experts estimated that while the optimal investment in cyber security is between 9 – 14% of the overall IT budget, actual investment averages closer to 6%. Experts also shared that globally, the growth in the number and costs of cyber attacks is large and growing. Across industries, healthcare is consistently in first, second, or third place in terms of volume of attacks. The costs of attacks in aggregate grows by double digits every year but the security budget has tended to remain the sameData gathered from an expert at the Canada-Israel Exchange for Cybersecurity in Health.
We are the health sector’s representative on the National Cross Sector Forum on Critical Infrastructure (NCSF). As a part of the NCSF, we work to maintain a comprehensive and collaborative Canadian approach to critical infrastructure by providing a standing mechanism for discussion and information exchange within and between the federal, provincial and territorial governments and the critical infrastructure sectors.
We also work closely with the Canadian Centre for Cyber Security (CCCS) to stay abreast of the current cybersecurity threats and attend a weekly health sector COVID-19 call with pan-Canadian health organizations. CCCS warns that network penetration attempts (phishing, hacking, password spraying etc.) have increased. They also warn that criminals may take advantage of increased pressure on Canadian health organizations in response to the pandemic to extract ransom payments or hide other compromises. In a testament to how quickly cyber criminals take advantage of a quickly moving situation, as the Canadian federal government announced the introduction of a contact tracing app, CCCS almost immediately identified a ransomware “CryCrypter”, masquerading as the purported app.
In May 2020, CCCS highlighted intelligence received from the Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC) about continued efforts of advanced persistent threat (APT) groups to target organizations involved in the response to COVID-19. The CCCS has assessed that sophisticated threat actors may attempt to steal the intellectual property of organizations engaged in research and development related to COVID-19, or sensitive data related to Canada’s response to COVID-19. Targets have included vaccine and medicine research and development by pharmaceutical bodies and gathering bulk personal information from healthcare bodies. In a recent stunning development, the group APT29 has been linked to Russian intelligence agencies and was previously responsible for hacking political parties in the US and Norway. They are using a variety of tactics such as spear-phishing and exploiting software flaws but are highly adaptable, making cybersecurity vigilance all the more important5.
HealthCareCAN advocates for improved awareness and attention to cybersecurity gaps in healthcare, both among our membership and through our strong working relationships with Public Safety Canada, Health Canada, and the Public Health Agency of Canada. We also strive to provide information and share best practices on enhancing cybersecurity in health. To improve the protection of sensitive and private information and provide essential services unencumbered of cyber attacks, we urgently require:
HealthCareCAN continues to closely monitor this rapidly evolving threat to our sector and has identified key questions for healthcare organizations to use as a starting point when initiating conversations around cybersecurity with senior management teams:
PUBLISHED
August 3, 2020
FOR FURTHER INFORMATION
Siri Chunduri
Policy and Research Analyst
schunduri@healthcarecan.ca
Jonathan Mitchell
Vice President – Research and Policy
jmitchell@healthcarecan.ca