Aftereffects
The situation continues to evolve, and we continue to explore short- and long-term solutions. The Change Healthcare incident magnifies the vulnerability of health care electronic data exchange systems to cyberattacks and bad actors. Its impact will be felt for months and years to come, as heightened scrutiny is directed at the security, authentication and third-party validation of health care systems, platforms and applications.
Criminals are also at the ready to take advantage. A few weeks after the attack, Minnesota Attorney General Keith Ellison and a spokesperson for the Minnesota Hospital Association warned Minnesotans of scammers contacting people posing as hospital, clinic or pharmacy employees trying to obtain credit card information because of the outage.
The incident raises concerns about threats to national security since a criminal group in Russia allegedly hacked Change Healthcare. The prospect of entirely disabling health care across the country through a cyberattack is terrifying. But it could happen. Last year, more health care industry targets reported ransomware attacks to the FBI’s Internet Crime Complaint Center than any other of the 16 sectors of critical infrastructure.
For now, senior leaders at UnitedHealth Group are being questioned by legislators and regulators about security deficiencies, and after the system was disconnected, the company’s slow response and modest payment advances. HHS opened an investigation into whether Change Healthcare complied with federal law to protect patient data. Provider lawsuits and patient class action suits have been filed against UnitedHealth Group. Congressional hearings also have commenced.
Administrative aftershocks will continue. Returning to full restoration of services is not as simple as flipping a switch. Even when Change Healthcare’s applications or replacement systems are fully functional, it will take programming, contracting, security testing and additional staff and IT resources to be operating as before. Back-end clean up, reconciliation and accounting for claims during recovery will stretch on for months.
Ongoing Security
This incident was a test of our readiness and resilience. Our foresight not to connect our network to Change Healthcare protected us, our members and providers. Strong business continuity planning enabled our quick response to implement workarounds and alternate systems, support our providers, and ensure continuous care to members — as befits our mission of improving the health of our members through innovative services and partnerships across communities.
We passed this test, but the work of security is never done. As soon as one threat is defused, another presents itself. Our security team monitors this activity day in and day out and implements new security measures as needed. We continue to be ever-vigilant and to actively fortify our cybersecurity and protection of members’ personal health information. Health care is a mammoth ecosystem, and we’re doing our best to ensure everybody with a stake in our corner of it is safe and secure.
Tenbit Emiru, MD, PhD, MBA,
is the executive vice president and chief medical officer at UCare.