Building a Wall Against Cyber Attacks

Organizations should first address low-hanging fruit to protect this information

By Dan Hounsell


Healthcare systems are attractive targets for cyberattackers. Vast quantities of patient data is generated and accessed. An increased reliance on applications and data during the pandemic explains why cyberattacks have increased by 45 per cent globally since November 2020. 

The largest motivation for cyberattackers is financial gain because patient information is incredibly valuable on the dark web, according to Healthcare Global. Identity theft is another reason. Terry Ray, senior vice president at Imperva, says organizations should first address low-hanging fruit to protect this information.

“The application side is the primary access point for everything that's going to happen anywhere in the organisation” he says. “It doesn’t matter what EMR or systems you're using, whether you've outsourced or brought things in-house, the majority of your users are going to access patient data through an application, so you've got to make sure those are secure. You can't go low budget.”



April 26, 2021


Topic Area: Information Technology


Recent Posts

Biofilm 'Life Raft' Changes C. Auris Risk

Microscopic survival structure protects fungal pathogen from disinfectants and help it survive for long periods.


How Healthcare Restrooms Are Rethinking Water Efficiency

Manufacturers discuss strategies, technologies and design approaches that help healthcare facilities meet their sustainability goals.


Northwell Health Finds Energy Savings in Steam Systems

Case study: A proactive steam trap maintenance program is delivering millions in savings, fast payback and measurable carbon reductions across one of the nation’s largest health systems.


The Difference Between Cleaning, Sanitizing and Disinfecting

Cleaning methods and products have various purposes in reducing the spread of germs.


Jupiter Medical Center Falls Victim to Third-Party Data Breach

The third party has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information on legacy systems.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.