• About
  • Is It Safe?
  • Live Streaming
  • News
  • Radio
  • Video

@justOncology

~ Musings on health, illness & evidence based medicine

@justOncology

Tag Archives: internet security

Is It Safe?

04 Friday Jan 2013

Posted by @JustOncology in Uncategorized

≈ 1 Comment

Tags

cancer, digital media, ehr, emr, innovation, internet security, mat honan, oncology, social media

By Richard Just, MD

Richard Just, MDWhen I read William Goldman’s book “The Marathon Man” years ago, I recall the evil Nazi dentist with drill in hand (played by Sir Laurence Olivier in the subsequent movie) hovering over the un-anesthetized Dustin Hoffman strapped to a chair asking the question: “Is it safe?” Of course, Hoffman didn’t know. So when Olivier turned on the drill and Hoffman started screaming, everyone in the theater identified with his pain. I still get chills when thinking about it.

In previous blog post here, I’ve described the pain I experienced when we transitioned from paper charts to electronic medical records. Certainly not as intense as having dental work without anesthesia, but agony just the same. Well guess what! Now we’re transitioning to a new EMR. In many ways, our pain level has increased from 6/10 to 9/10.

I interviewed Casey Quinlan, of Might Casey Media, a very astute commentator on healthcare in general and cancer care specifically, on This Week in Oncology last Wednesday. The “Mighty Casey” made several cogent observations on EMR’s, but, we  really didn’t address the question of security. In the December 15-16, 2012 issue of the Wall Street Journal, Ellen E. Schultz  wrote an article entitled: “How Safe Are Your Medical Records?” Two pieces of legislation are cited:

The first is the Health Insurance Portability and Accountability Act (HIPAA) which “allows health-care providers to disclose medical records without a patient’s consent when the information used is for treatment, payment and ‘health-care operations.’ Providers are supposed to exchange only relevant information, but they commonly transfer a patient’s entire file, which is easier than separating the pertinent records.” In the same manner, protection can be lost for psychotherapy records if they are co mingled with other medical records.

Second is the American Recovery and Reinvestment Act of 2009 which “prohibits the unauthorized sale of medical records, requires that data be encrypted and mandates that individuals be notified of security breaches. It is too soon to say how effective these rules will be.”

Drilling down to the core problem is Mat Honan’s original article “How Apple and Amazon Security Flaws Led to My Epic Hacking” and follow-up video entitled “Mat Honan Hacked and Digitally Destroyed” he describes an “epic hack” that destroyed his entire digital life in 1 hour. Having been the victim of a phishing expedition, a minor nuisance compared to his experience, I know how it feels to have your identity stolen.  After researching how and why hacking has become more problematical, Honan concludes: “The age of the password has come to an end; we just haven’t realized it yet. And no one has figured out what will take its place.” He continues: “The ultimate problem with the password is that it’s a single point of failure, open to many avenues of attack. Two factors should be a bare minimum.” This creates the dilemma that if the password is too simple and obvious, it’s a no-brainer to crack; if it’s too complex and obscure, the password is hard to remember. And, we are advised never to write passwords down. Why am I not surprised that the most common password used is, in fact, “password”, and second is “123456”?

Honan provides a helpful Dos and Don’ts list to survive the “password apocalypse”:

“DON’T:

  1. REUSE PASSWORDS. If you do, a hacker who gets just one of your accounts will own them all.
  2. USE A DICTIONARY WORD AS YOUR PASSWORD. If you must, then string several together into a pass phrase.
  3. USE STANDARD NUMBER SUBSTITUTIONS. Think P455wOrd is a good password? NOp3! Cracking tools now have those built in.
  4. USE A SHORT PASSWORD-no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO:

  1. ENABLE TWO-FACTOR AUTHENTICATION WHEN OFFERED. When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  2. GIVE BOGUS ANSWERS TO SECURITY QUESTIONS. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  3. SCRUB YOUR ONLINE PRESENCE: One of the easiest ways to hack into an account is through your e-mail and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  4. USE A UNIQUE, SECURE EMAIL ADDRESS FOR PASSWORD RECOVERIES. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name-like m****n@wired.com so it can’t be easily guessed.”

So, the answer to the question: “Is it safe?” is an emphatic NO. Honan concludes that online identity verification will not be a password-based system in the future, any more than our system of personal identification will be based on photo-ID’s. But, passwords may still be involved as just one part of a multifaceted process.

Advertisement

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • Print

Like this:

Like Loading...

The ‘incident’

My life was essentially on autopilot. My oncology practice was very successful; in fact, too successful. All my time and energy was devoted to keeping pace with the increasing demands of the profession. Other pursuits, be they personal or professional, always seemed to take a back seat. My main unfulfilled passion was writing.

On January 7, 2011, everything changed. I had a new bovine aortic valve and three new coronary artery grafts. A life altering event, to say the least. Fortunately my recovery has been uneventful, and I had no evidence of muscle injury. So I’m extremely grateful for the pre-emptive surgery, and since I’m back to work on a part time basis, I now can devote some of my attention to writing.

For the past several years, a colleague, trusted advisor and friend of mine, Gregg Masters, had been prodding me to “just do it”, i.e., just start blogging, podcasting and life streaming my experiences in Medicine. He pointed out the value of my 36 years in clinical practice of hematology and medical oncology as 'elder wisdom' currency in relative short supply. In truth, there is certainly a lot to write about as the clinical knowledge base has grown enormously, to the point where management of all this information requires computers. Fortunately, technology has developed at a rapid rate also so that we can not only mine all this data to obtain meaningful information, but better disseminate it to each other, health plans (including government) and especially our patients. With the advent of social media including Twitter, Facebook and You Tube, this flow of information becomes a two way street allowing physicians to listen as well as talk. On a personal note, my wife published daily status updates during my surgery and through the post-operative period on a website called Caringbridge. She posted pictures as well as narrative. Colleagues, relatives, friends and patients had a window opened to them as to how I was doing, and they in turn wrote back notes of encouragement that touched me deeply.

When Gregg and I thought about it, his background not only in 'web 2.0' (social media) but perhaps more significantly his considerable experience in the business aspects of medicine brings value into the conversation as well. In today’s environment, physicians are constantly reminded that we not only are responsible for all aspects of caring for patients, but we are running a business as well. Years ago, I remember reading an excellent book called “The E-Myth Physician” by Michael Gerber. One of the chapters was devoted to the subject of “Money”. So Gregg’s knowledge complements my clinical background resulting in the birth of JustOncology.com.

Certainly there is no shortage of topics to discuss. Utilizing a variety of media: blogging (which addresses my passion for writing), audio and visual interviews with as many of the stakeholders in cancer care as possible, we hope to provide a forum for discussion of problems facing us. From these interactions, the desired outcome is to identify solutions that can only come from a collaborative effort.

Recent Posts

  • In Absentia
  • What Is Cancer?
  • Big Data, Government and Cancer Research: A Benefit for Patients?
  • The Advent of Cancer Immunotherapy: Addressing Unmet Needs Part 1
  • Crowds Care for Cancer Challenge: Supporting Survivors the Finalists
  • Tumor Board: Is There Value in Multidisciplinary Case Consideration?
  • ‘You Don’t Know Jack’ by Morgan Spurlock
  • @IBMwatson and the Future of Oncology Care

About

JustOncology.com is a joint publication of Richard Just, MD, aka @chemosabe1 on Twitter and Gregg Masters, MPH, aka @2healthguru on Twitter.

Enter your email address to follow this blog and receive notifications of new posts by email.

@chemosabe1 on Twitter

Error: Please make sure the Twitter account is public.

@JustOncology

  • RSS - Posts
  • RSS - Comments

Blogroll

  • @TumorBoard
  • AACR
  • ACO Watch
  • ASCO
  • NCI
  • Pacific Oncology

Blog at WordPress.com.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • @justOncology
    • Join 59 other followers
    • Already have a WordPress.com account? Log in now.
    • @justOncology
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: