Focus: Technology

Cyberattackers exploit healthcare data security weaknesses

The healthcare sector is the most targeted industry in the first quarter of 2018


Cyberattackers are exploiting inherent weaknesses in healthcare data security, making the sector the most targeted industry in the first quarter of 2018, according to an article on the Health IT Security website.

The Rapid7 quarterly threat report released May 15. found that the leading attack vectors in healthcare were remote access, such as  suspicious logins, access attempts from disabled accounts, and account leaks, as well as phishing and ransomware.

Healthcare organizations are popular targets because they often have a complex, distributed IT infrastructure with legacy systems and proprietary medical devices, making them difficult to secure quickly, the article said.

Plus, healthcare facilities rely on system availability to keep life-saving operations running. Cyberattackers have frequently exploited this situation with ransomware or denial of service attacks.

Read the article.

 

 



May 22, 2018


Topic Area: Information Technology


Recent Posts

The Future of Backup Power Systems in Healthcare Facilities

Manufacturers discuss what trends are shaping the future of backup power systems in healthcare.


Infection Control is Key to Ongoing Measles Outbreak

Infection control is essential to protecting both patients and staff from contracting measles.


Kaiser Permanente to Open New Parker Medical Offices

It also announced it's in the early stages of planning a rebuild and expansion of its Westminster Medical Offices.


Skanska Completes Renovation for New Sutter Health Care Center

The new facility will provide internal medicine, family medicine, pediatrics, as well as lab and imaging services.


Probiotic Cleaners: The Start of a Cleaning Revolution?

Advantages of probiotic cleaning include fewer resistant genes and cost savings through decreased antibiotic use.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.