Ransomware Remains Threat to Healthcare

Healthcare systems are susceptible to ransomware attacks, largely due to technology that gives access to patient data

By Chris Miller, Assistant Editor, Facility Market


The healthcare industry continues to fight against a consistent wave of ransomware-based cyberattacks. Although consistent, this threat of ransomware is not a new one. Between 2014 and 2020 about a third of NHS trusts were successfully attacked with ransomware, according to Open Access Government. This caused more than 200 days of downtime.

Healthcare systems have an intrinsic susceptibility to ransomware attacks due to the amount of technology within them. Technology that gives access to patient data especially is everywhere in a healthcare setting. Many systems do not implement modern software to mitigate cyberattacks. This makes it easier for those that want to take advantage of patient health records and other data in these spaces like test results. The outcomes of cyberattacks can be harmful to healthcare operations. 

For example, a recent cyberattack hurt a network of hospitals and clinics in Ohio and West Virginia, according to Nextgov. This attack forced the network to temporarily cancel surgeries and divert patients with emergencies to other facilities. The system had to shut down its information technology systems as well. Since the pandemic began, cybersecurity professionals have seen an increase in attempted ransomware and hacking attacks in healthcare systems, according to The PEW Charitable Trusts

Ransomware kits found on the dark web make it easier for cybercriminals to take advantage of weak information technology systems. These criminals disrupt backup systems, delete shadow copies and unlock files to maximise their impact. They often hold precious data and force organizations to pay large ransoms. Health systems should execute a zero trust plan to mitigate cyber attacks. This plan mandates that these spaces should not give access to any user until they prove their identity. After being given access, the user should only have access to the information they need. For example, a doctor could only have access to their own patients’ records. This limits the effects of an attack if a cybercriminal were to get ahold of access information. Access and identity restrictions should be the foundation of a security strategy based on a zero trust method.



August 26, 2021


Topic Area: Information Technology


Recent Posts

The OR HVAC Puzzle: Why Individual Systems Are on the Rise

Extra penetrations, tight clearances and strict humidity needs—design experts explain what it really takes to plan dedicated units for each operating room.


Sutter Health Announces Plans for New Santa Clara Medical Center

Sutter projects the medical center will open in late 2031.


Sanford Health Receives $300M Gift for Black Hills Medical Center Campus

Construction is scheduled to begin in 2027 with completion expected by 2030.


Wanted: Scientific Standard for Hospital Cleaning

No accepted criteria exist for defining a surface as clean using microbiologic methods.


NLCS Strengthens Safety and Compliance with Comprehensive Electrical Program

Case study: A renewed partnership with Siemens helps the senior living provider meet NFPA 70B standards, reduce risk, and enhance reliability across its communities.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

 
 
 
 

Healthcare Facilities Today membership includes free email newsletters from our facility-industry brands.

Facebook   Twitter   LinkedIn   Posts

Copyright © 2023 TradePress. All rights reserved.