Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Device Attacks, Network Scanning Compromise Healthcare Data
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Device Attacks, Network Scanning Compromise Healthcare Data
Big DataSecurity

Device Attacks, Network Scanning Compromise Healthcare Data

Larry Alton
Larry Alton
5 Min Read
Device Attacks, Network Scanning Compromise Healthcare Data
SHARE

In the past decade, healthcare has gone truly high tech. Whether it’s electronic health records (EHR), more precise CT and MRI machines, or just the main hospital server, greater digitization comes with its own risks. Add to that the legal ramifications of healthcare data leaks and hospitals are dealing with a crisis of epidemic proportions as they try to protect patient data.

Contents
  • The Fight Against Ransomware
  • Protecting Your Patients

The Fight Against Ransomware

Ransomware is one of the greatest threats to overall data security today, with an average of 4,000 ransomware attacks daily. But why target medical data? The primary reason is that medical files typically contain everything needed to steal someone’s identity and because medical systems can easily be coerced into paying for a resolution.

When the Eerie County Medical Center in Buffalo, New York was hit by a ransomware attack in April 2017, for example, they received a note demanding that the hospital “must send us 1.7 BitCoin for each affected PC OR 24 BitCoins to receive ALL Private Keys for ALL affected PC’s,” equal to about $44,000. What could they do? The hospital, a level 1 trauma center, couldn’t access its EHRs, email, or website. Ultimately it took millions of dollars and six weeks for the hospital to set everything right.

Other common points of entry in the healthcare system include MRI and CT machines – essentially any diagnostic tool or machine that is hooked up to the internet. With these machines, hackers target device infrastructure, which means they can do everything from access files through the internet connection to modify images or manipulate radiation levels. When it comes to hacking medical devices, the risk isn’t just one of security; security breaches threaten patients lives.

More Read

Book Review – BRFplus Business Rule Management for ABAP Applications
Brookings Report: Big Data Is Key To Improving Writing Skills
Who Gets the Call When Your Analytics Process Crashes?
Beyond RDBMS: Databases for Modern Applications
3 Ways Automation Tools Use Big Data To Drive Business Growth

Protecting Your Patients

In order to protect patient records and their very health, hospital systems need to take aggressive steps to improve system security. That starts with a strong firewall.

Many devices lack sufficient processing power for next generation firewall (NGFW) and other advanced security strategies, making it hard to fully secure them. One way to strengthen your security is by allowing an overcapacity hospital firewall to burst to the cloud, rather than directly upgrading it. Depending on your system’s needs, you can scale your firewall using a regional security hub – allowing you to keep current appliances like that pricy MRI machine, or by using firewall bursting, which leverages cloud-based firewall to increase your system’s available power. Which you choose depends on your current system components, traffic, and overall architecture.

Hospital systems should also be more aggressive when working with vendors to be certain devices like MRI and CT machines are secure. These diagnostic machines are part of the IoT and they need to be managed in the same fashion as small-scale devices using encryption, two-factor authentication, and other security features.

Finally, though increased digitization and use of IoT increases medical precision overall, hospitals should consider where digitization is to the patient’s benefit and where it poses too great a risk. EHRs, for example, help maintain continuity of care and simplify record transmission between providers, but is it really to the patient’s advantage if their IV line is part of the IoT if that means risking an overdose? Requiring a live operator for sensitive functions like administering medications is a simple, low-tech way to protect patient health in this brave new world of technology.

At its core, medicine is a high-risk enterprise and that means providers should always be aware of the worst-case scenario, whether that’s data theft or diagnostic manipulation. Your patients’ lives hang in the balance. In 2018, digital security is part of your motto to “first, do no harm.”

TAGGED:device attackshealthcare dataransomware
Share This Article
Facebook Pinterest LinkedIn
Share
ByLarry Alton
Follow:
Larry is an independent business consultant specializing in tech, social media trends, business, and entrepreneurship. Follow him on Twitter and LinkedIn.

Follow us on Facebook

Latest News

ai kids and their parents
How Cities Use AI to Improve Playground Design
Exclusive News
human resource data
The Integration of Employee Experience with Enterprise Data Tools
Big Data Exclusive
protecting patient data
How to Protect Psychotherapy Data in a Digital Practice
Big Data Exclusive Security
data analytics
How Data Analytics Can Help You Construct A Financial Weather Map
Analytics Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

GDPR and security
Best PracticesBig DataData ManagementExclusiveInternet of ThingsPolicy and GovernancePrivacySecurity

GDPR Fines, Ransomware, and Cybersecurity: What You Need To Know

9 Min Read
cybersecurity with AI and big data
Artificial IntelligenceBig DataInternet of ThingsSecurity

Tapping AI to Counter Rising Ransomware Threat in Big Data Era

9 Min Read
data collection in healthcare
Data Collection

The Role and Importance of Data Collection in Healthcare

9 Min Read
dreamstime l 204902773
Artificial IntelligenceExclusiveITSecurity

10 Tips to Fight Against AI-Driven Ransomware Attacks

10 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?