GAO: Ten Critical Actions Needed to Address Cybersecurity Challenges (Part 2 of 2)
By Katherine Downing, MA, RHIA, CHPS, CPHI, PMP
The July 2018 report issued from the Government Accountability Office (GAO), described in the first part of this article series, identified ten critical actions needed to address the major cybersecurity challenges facing federal agencies and the nation’s critical infrastructures.
The challenges and actions are listed in a graphic on p. 13 of the report titled “Figure 4: Ten Critical Actions Needed to Address Four Major Cybersecurity Challenges.” The list includes such actions as:
- Develop and execute a more comprehensive federal strategy for national cybersecurity and global cyberspace
- Address cybersecurity workforce management challenges
- Ensure the security of emerging technologies
- Improve implementation of government-wide cybersecurity initiatives
- Enhance the federal response to cyber incidents
- Improve federal efforts to protect privacy and sensitive data
- Appropriately limit the collection and use of personal information and ensure that it is obtained with appropriate knowledge or consent
- Develop and execute a comprehensive organizational strategy for privacy threats, cyberthreats, and information threats via an enterprise-wide information governance strategy (IGAM competency: IG Structure).
- Mitigate malware threats with a robust IT Governance program within the IG program (IGAM competency: IT Governance).
- Address insider threat through IG Awareness and Adherence programs (IGAM competency: IG Awareness and Adherence).
- Ensure the security of emerging technologies in healthcare such as wearables and telemedicine (a Telemedicine Toolkit is available from AHIMA as a further resource on this topic).
- Improve implementation of organization-wide initiatives focused on managing, securing, storing, protecting, and destruction of information through enterprise information management efforts as a part of the IG program (IGAM competency: Enterprise Information Management).
- Address weaknesses in the organization’s programs through use of advanced security tools and technology as a part of the organization-wide privacy and security program (IGAM competency: Privacy and Security).
- Enhance cyber threat response through IG awareness and adherence education, including topics such as phishing campaigns and other security training beyond HIPAA basics (IGAM competency: IG Awareness and Adherence).
- Strengthen protection of the organization’s information assets.
- Improve the organization’s efforts to both provide access and better secure electronic protected health information, paper records, and legacy systems.
- Limit the collection and use of protected health information and ensure it is obtained with minimum necessary intent.
For more details and information on this important testimony, read the full GAO report: https://www.gao.gov/assets/700/693405.pdf.
Katherine Downing (kathy.downing@ahima.org) is vice president, information governance at AHIMA.