Securing Network Closets in Healthcare Facilities

Greetings and welcome back.  In today’s blog we look at a subject that is all-too-often overlooked in hospitals, doctors offices, and other medical facilities: Securing Network Closets in Healthcare Facilities.  The fact is, healthcare records have the largest value of any type of record in the black market for Personally Identifiable Information (PII).  Because of this, healthcare facilities will always be prime targets for data thieves and network closets are one of the most poorly secured part of most healthcare facilities.

In a study of all network closets in a large university, this excellent paper published by East Tennessee State University by Nathan Timbs shows that there were, on average, more than 1 threat, hazard or vulnerability for each of the 82 network closets surveyed.  Not surprisingly, data thieves have become very accomplished at using vulnerabilities in the cyber/physical security of wiring closets to steal large quantities of valuable data.  Another excellent paper published online by Towson State University shows how easily a person can gain physical access to a network closet to place an eavesdropping device into most any network.  This device – which can be a simple switch that is converted to their own nefarious purposes – then sends data offsite to their data capture system, completing the theft process.

This process, known as a man-in-the-middle attack system, is surprisingly fast and easy to add to any network closet.  In fact, some of the largest data thefts recorded have been accomplished by cyber/physical man-in-the-middle attacks such as those discussed by these two excellent papers.   This creates a significant challenge to healthcare facilities because HIPAA requires security of all your Physical, Cyber and Operational assets as is shown in the following graphic and, network closets are definitely a key to being secure and HIPAA Compliant.

Securing Network Closets in Healthcare Facilities


Because of these issues, it is vital that Physical, Cyber and Operational security need to be addressed in the network closet, preferably with a single unified solution.  RackGuardian was build from the ground-up to be a system that provides full physical and cybersecurity to your network closets and all of the equipment within them.

RackGuardian does all the following:

  • Interfaces and securely manages any Wiegand-Based Access Card System
  • Interfaces and protects any SNMP-based computer, network or power system
  • Provides full physical and operational monitoring of the network closet

Please think about this and take a look at RackGuardian.  We would be happy to confidentially discuss the security of your network closets for your facility.

Until Next Time,

Be Well!

Network Closet Security – Physical Security

Greetings and welcome back.  In this blog, we take a close look at Network Closet Security Vulnerabilities – Physical Security.  This is the first in a new series on the key types of network closet security flaws.  This is a key topic, especially for all those of you who are covered under HIPAA, PCI-DSS, FERPA, Gramm Leach Bliley and other data security regulations.  The fact is, as more data shifts to the cloud, that means that more data is transported through your network closets to the various cloud providers that you employ.  Because cloud services tend to be well-fortressed, cyber criminals are turning to the easiest way to get to that data – your network closets.

To begin with, all of the key data security regulations require you to physically secure your data.  Here are some key provisions with which we should all take time to familiarize ourselves:

HIPAA Section 164.310: “Facility Access Controls. Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.”

PCI-DSS Requirement 9.1: Verify the existence of physical security controls for each computer room, data center, and other physical areas with systems in the cardholder data environment. Without physical access controls, such as badge systems and door controls, unauthorized persons could potentially gain access to the facility to steal, disable, disrupt, or destroy critical systems and cardholder data. 

GRAMM LEACH BLILEY: “Management should deploy adequate physical security in a layered or zoned approach at every IT operations center commensurate with the value, confidentiality, and criticality of the data stored or accessible and the identified risks.”

Its clear from these sections of security codes that you need to provide a secure card-based access system in order to be compliant with major data security regulations.  What isn’t clear is which physical security system is the best for your application.  Fortunately, our RackGuardian system is one of the only systems that supports virtually any access card on the market.  That means that, if you are already using a card access system for your main door at your facility, chances are very good that RackGuardian can support that card on a plug-and-play basis.  If, on the other hand, you need a new access card system, then we also have you covered.

In the next 2 blogs, we plan to look at cybersecurity and also backup power and environmental security for your data.  Please take a good look at RackGuardian and we believe that you will find that its the most powerful security product for data security on the market.  We welcome you to contact us with any questions about your individual security needs.

Until next time,

Be Well!


HIPAA Physical Security Standards for Server Racks

Greetings and welcome back.  This week we continue our blog series on the  Cyber/Physical/Operational standards for HIPAA and  this week we look at HIPAA Physical Security Standards for Server and Telecom Racks.  As we saw in our last blog, HIPAA breaches continue to grow in number and severity and one of the key reasons for this growth is very poor physical security of electronic Protected Health Information (ePHI).  Let’s use this blog to examine the key physical security standards for HIPAA in order to better understand the types of security that must be put in place to be HIPAA compliant and reduce your chances of a disastrous security breach.

To begin with, please realize that the physical security standards for HIPAA are fairly lengthy so we are posting the first section that deals specifically with the Physical Access Security to your server and telecom rack(s).

A covered entity or business associate must, in accordance with § 164.306:


(1)Standard: Facility access controls. Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.

The key provision of the HIPAA Physical Security Statute is Physical Access Controls.  These access controls must be implemented to limit access to the electronic information systems and to the facility or facilities in which they are housed.

HIPAA 164.310 requires physical access controls on every server and telecom rack that contains ePHI and on the room in which each is located

What type of access controls are required?  The covered entity or business associate must have a system that accomplishes 2 purposes:

Every HIPAA covered entity must:

  1. Restrict physical access to ePHI from those who do not have access authority
  2. Grant physical access only to those who have written access authority

Simply put, you must have a Physical Access Control System on every room containing ePHI and on the racks containing e-PHI.  Please note that e-PHI is stored in both Electronic Health Records (EHR) servers and on your IP-based phone system which stores messages from patients. If your telecom and EHR servers are located in separate racks, you must either locate them to the same rack within the same room or, insure that all separate racks and their rooms have their own Physical Access Control System.  Failure to safeguard both EHR and telecom servers is a common mistake that violates HIPAA rules.

Putting in a card or biometric access system in an existing server or telecom rack is not difficult and it takes only about 20 minutes to install each one.  The largest brand is resold by AlphaGuardian Networks with the RackGuardian system and all of its features are integrated into our product.   RackGuardian can integrate with a card-access or a biometric access system it controls access to each rack and room and it also logs entries and exits to a room and to each server and telecom rack.

Please remember that nearly half of all HIPAA breaches are physical in nature because there are very few organizations that employ access controls  both at the room-level and on the individual racks containing ePHI.  Also review this chart from last week’s blog to understand the severity of failing to cover yourself for physical breaches – which are now nearly half of all HIPAA violations.

HIPAA Physical Security for Server Racks


Now, recall also from last week that nearly half of all physical access and theft violations were from insiders.  If that alarms you, it should, but the facts are that ePHI is worth a lot of money on the open market.  The value in ePHI is both as raw records – worth around $10 per record, and in Ransomware – worth many thousands of dollars per rack.  As physical breaches grow, so do the number and total of HIPAA fines levied against healthcare providers and their business agents.

The Compliancy Group publishes all HIPAA fines levied and settled as of the latest week.  As you can see from the chart below, the total fines for HIPAA violations are skyrocketing and showing no signs of leveling-off.  At the present rate of fines, the total for 2017 will be $41 million and if trends continue, 2018 could approach $75 million.  Please bear in mind that this cost does NOT include the cost of legal settlements with individuals whose records have been breached.  Fines for HIPAA Violations

The long and short of this is that placing a Physical Access Security system on your server and telecom racks and on the room in which they are located is a very small price to be HIPAA compliant and avoid the enormous cost of fines and lawsuits.  Our patented RackGuardian unit is the only system on the market that integrates Physical Access Control for rooms and their server racks together with full Cyber and Operational security.  We would urge every reader to look carefully at this solution and we would be more than happy to have a confidential discussion about how to protect your ePHI from all threats.

Until Next Time,

Be Well!