Focus: Technology

Cyberattackers exploit healthcare data security weaknesses

The healthcare sector is the most targeted industry in the first quarter of 2018


Cyberattackers are exploiting inherent weaknesses in healthcare data security, making the sector the most targeted industry in the first quarter of 2018, according to an article on the Health IT Security website.

The Rapid7 quarterly threat report released May 15. found that the leading attack vectors in healthcare were remote access, such as  suspicious logins, access attempts from disabled accounts, and account leaks, as well as phishing and ransomware.

Healthcare organizations are popular targets because they often have a complex, distributed IT infrastructure with legacy systems and proprietary medical devices, making them difficult to secure quickly, the article said.

Plus, healthcare facilities rely on system availability to keep life-saving operations running. Cyberattackers have frequently exploited this situation with ransomware or denial of service attacks.

Read the article.

 

 



May 22, 2018


Topic Area: Information Technology


Recent Posts

Biofilm 'Life Raft' Changes C. Auris Risk

Microscopic survival structure protects fungal pathogen from disinfectants and help it survive for long periods.


How Healthcare Restrooms Are Rethinking Water Efficiency

Manufacturers discuss strategies, technologies and design approaches that help healthcare facilities meet their sustainability goals.


Northwell Health Finds Energy Savings in Steam Systems

Case study: A proactive steam trap maintenance program is delivering millions in savings, fast payback and measurable carbon reductions across one of the nation’s largest health systems.


The Difference Between Cleaning, Sanitizing and Disinfecting

Cleaning methods and products have various purposes in reducing the spread of germs.


Jupiter Medical Center Falls Victim to Third-Party Data Breach

The third party has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information on legacy systems.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.