Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Device Attacks, Network Scanning Compromise Healthcare Data
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Device Attacks, Network Scanning Compromise Healthcare Data
Big DataSecurity

Device Attacks, Network Scanning Compromise Healthcare Data

Larry Alton
Larry Alton
5 Min Read
Device Attacks, Network Scanning Compromise Healthcare Data
SHARE

In the past decade, healthcare has gone truly high tech. Whether it’s electronic health records (EHR), more precise CT and MRI machines, or just the main hospital server, greater digitization comes with its own risks. Add to that the legal ramifications of healthcare data leaks and hospitals are dealing with a crisis of epidemic proportions as they try to protect patient data.

Contents
  • The Fight Against Ransomware
  • Protecting Your Patients

The Fight Against Ransomware

Ransomware is one of the greatest threats to overall data security today, with an average of 4,000 ransomware attacks daily. But why target medical data? The primary reason is that medical files typically contain everything needed to steal someone’s identity and because medical systems can easily be coerced into paying for a resolution.

When the Eerie County Medical Center in Buffalo, New York was hit by a ransomware attack in April 2017, for example, they received a note demanding that the hospital “must send us 1.7 BitCoin for each affected PC OR 24 BitCoins to receive ALL Private Keys for ALL affected PC’s,” equal to about $44,000. What could they do? The hospital, a level 1 trauma center, couldn’t access its EHRs, email, or website. Ultimately it took millions of dollars and six weeks for the hospital to set everything right.

Other common points of entry in the healthcare system include MRI and CT machines – essentially any diagnostic tool or machine that is hooked up to the internet. With these machines, hackers target device infrastructure, which means they can do everything from access files through the internet connection to modify images or manipulate radiation levels. When it comes to hacking medical devices, the risk isn’t just one of security; security breaches threaten patients lives.

More Read

supply chain management with data analytics
Big Data Proves Invaluable to Retail Supply Chain Management
Social Business By Design: Transformative Social Media Strategies for the Connected Company
9 Ways Location Data Can Help You Excel in Retail
Data Visualization Boosts Business Scalability with Sales Mapping
How You Can Use Big Data in Your Small Business

Protecting Your Patients

In order to protect patient records and their very health, hospital systems need to take aggressive steps to improve system security. That starts with a strong firewall.

Many devices lack sufficient processing power for next generation firewall (NGFW) and other advanced security strategies, making it hard to fully secure them. One way to strengthen your security is by allowing an overcapacity hospital firewall to burst to the cloud, rather than directly upgrading it. Depending on your system’s needs, you can scale your firewall using a regional security hub – allowing you to keep current appliances like that pricy MRI machine, or by using firewall bursting, which leverages cloud-based firewall to increase your system’s available power. Which you choose depends on your current system components, traffic, and overall architecture.

Hospital systems should also be more aggressive when working with vendors to be certain devices like MRI and CT machines are secure. These diagnostic machines are part of the IoT and they need to be managed in the same fashion as small-scale devices using encryption, two-factor authentication, and other security features.

Finally, though increased digitization and use of IoT increases medical precision overall, hospitals should consider where digitization is to the patient’s benefit and where it poses too great a risk. EHRs, for example, help maintain continuity of care and simplify record transmission between providers, but is it really to the patient’s advantage if their IV line is part of the IoT if that means risking an overdose? Requiring a live operator for sensitive functions like administering medications is a simple, low-tech way to protect patient health in this brave new world of technology.

At its core, medicine is a high-risk enterprise and that means providers should always be aware of the worst-case scenario, whether that’s data theft or diagnostic manipulation. Your patients’ lives hang in the balance. In 2018, digital security is part of your motto to “first, do no harm.”

TAGGED:device attackshealthcare dataransomware
Share This Article
Facebook Pinterest LinkedIn
Share
ByLarry Alton
Follow:
Larry is an independent business consultant specializing in tech, social media trends, business, and entrepreneurship. Follow him on Twitter and LinkedIn.

Follow us on Facebook

Latest News

image fx (60)
How Finance & BI Teams Choose Accounting Software
Big Data Business Intelligence Exclusive
Why the AI Race Is Being Decided at the Dataset Level
Why the AI Race Is Being Decided at the Dataset Level
Artificial Intelligence Big Data Exclusive
image fx (60)
Data Analytics Driving the Modern E-commerce Warehouse
Analytics Big Data Exclusive
ai for building crypto banks
Building Your Own Crypto Bank with AI
Blockchain Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

cybersecurity with AI and big data
Artificial IntelligenceBig DataInternet of ThingsSecurity

Tapping AI to Counter Rising Ransomware Threat in Big Data Era

9 Min Read
data collection in healthcare
Data Collection

The Role and Importance of Data Collection in Healthcare

9 Min Read
dreamstime l 204902773
Artificial IntelligenceExclusiveITSecurity

10 Tips to Fight Against AI-Driven Ransomware Attacks

10 Min Read
Hackers Attack
ITSecurity

Organization’s Data Protection: Be Aware of the Different Ways Hackers Attack

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?