Connect with us

Hi, what are you looking for?

Tech & Science

Building resilience in healthcare as cyberattacks continue in force

Regardless of the threat actor, patient and insurance data and massive disruption are at the core of what they’re after.

A data center: Network cables plugged into a server. — © Michael Bocchieri/AFP/Getty Images
A data center: Network cables plugged into a server. — © Michael Bocchieri/AFP/Getty Images

The healthcare sector is being inundated with advanced persistent threats. Many of these are coming from Russian state-sponsored cyber and espionage groups. This leaves highly sensitive patient-centric electronic protected health information at risk.

Looking into the risks and appropriate responses for Digital Journal is Benny Czarny, Founder and CEO of OPSWAT.

According to Czarny, to truly understand the nature of the risk it is necessary to understand the reasons for the attacks on the healthcare arena. Here he finds: “The first question when looking at the recent rise of healthcare threats is “why?” – and it’s a fairly simple answer.”

Czarny sees this reason as: “Regardless of the threat actor, patient and insurance data and massive disruption are at the core of what they’re after.”

From this base,  mitigations can be considered. According to Czarny: “Now, understanding the vulnerabilities and how to harden them becomes a bit more complex.”

But first, the nature of healthcare needs assessing: “Healthcare systems deal with a vast network of providers, referral networks, insurers, and more – providing multiple access points to digital patient data. In an environment where healthcare costs are exorbitant , cost controls such as staff reduction and cuts in software spending can have an impact on systems not being patched. The result? Opening outdated systems to legacy vulnerabilities. Coupled with these vulnerabilities are the challenges of managing a multi-vendor environment where patient data is shared across networks and systems.”

There are other vulnerabilities that need to be acknowledged, says Czarny: “What is most concerning when it comes to healthcare are the attack surfaces, and if not reduced, have the potential to cause physical damage or harm to both systems and patients. For example, medical imaging and radiology oncology systems are high-valued medical systems that, if compromised, will adversely affect patient care, and cause financial hardship to the medical facility.”

Furthermore: “Another one is the patient point of care system (POC), a hospital system that includes bedside terminals or other devices for capturing and entering data at the location where patients receive care. These systems are network-connected over WiFi and if compromised, it will impact patient care.”

Based on these alarming points, what is to be done? Czarny proposes: “The increasing adoption of zero-trust technologies are a good indication of improved awareness and better controls.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

Orange, with its multiple locations, thousands of employees, and publicly disclosed breach data, was a prime target.

Social Media

Meta quickly took the matter to arbitration, contending the book violates a non-disparagement contract signed by Wynn-Williams.

Entertainment

British actress Natalie Dormer ("The Tudors" and "Game of Thrones") chatted about starring in the new film "Audrey's Children," which will be released in...