DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Mobile Imaging
Current Location:
> This Story

starstarstarstarstar (1)
Log in or Register to rate this News Story
Forward Printable StoryPrint Comment



Health IT Homepage

The promise of AI (part 2 of 2) Dr. Luciano Prevedello shares insight he’s gained through the AI lab his radiology department created

Elsevier touts new study validating use of STATdx solution Reduced diagnostic errors by as much as 37 percent

Hospitals harness technology to achieve patient satisfaction Meeting a diverse range of patient expectations

Apple Watch can monitor heart rhythms with FDA approval Detects atrial fibrillation and can tell if you've taken a sudden fall

Dr. David Hirschorn on NYMIIS 2018 Imaging informatics takes center stage again at the New York symposium

Healthcare players aim to advance value-based care with HL7 resources Utilizing HL7 FHIR in two initial test cases

Anatomy of a hospital cybersecurity attack Tips for detecting, responding to, and preventing attacks at your facility

What does mobile tech mean for radiology? A discussion with William Pan, CEO of EBM Technologies

ScImage, Cardiac Imaging forge partnership Bringing 'anywhere, real-time' access to cardiology images

Patient iP and Clinerion enhance access to real world data for clinical trials Improving the selection of trial sites, accelerate enrollment

Health care hacks: The difference between life and death

By Gary Sockrider

Cyberattacks continue to dominate our news cycle with the recent attacks like Reaper, WannaCry and NotPetya highlighting the harsh reality of today’s world: personal information is gold and cyberattacks are growing. According to NETSOUT Arbor’s 13th annual Worldwide Infrastructure Security Report (WISR), ransomware was cited as the top threat by enterprises in 2017. Business impacts due to attacks include reputation/brand damage and operational expense, in addition to revenue loss.

Cyberattacks aren’t confined to any specific industry or size, and the cost for companies to bounce back from these threats can be hundreds of thousands of dollars per event. It’s no secret that health care information is one of the most valuable commodities on the black market. With that kind of monetary motivation, we’ll likely see an increase in breaches of medical records in the coming years.

Story Continues Below Advertisement


Special-Pricing Available on Medical Displays, Patient Monitors, Recorders, Printers, Media, Ultrasound Machines, and Cameras.This includes Top Brands such as SONY, BARCO, NDS, NEC, LG, EDAN, EIZO, ELO, FSN, PANASONIC, MITSUBISHI, OLYMPUS, & WIDE.

Unfortunately, health care has an added and unique security issue: Attacks in this industry can literally be fatal for the end user. These hacks can cause increases or decreases in medicine dosages or a shutdown of an implanted device, to the impairment and detriment of lifesaving technology. With that in mind, the health care industry must consider how to mitigate the risks of hacks and, ultimately, how to better protect patients. An increased focus on the state of security in health care should be top-of-mind for all hospital staff.

Regulations are minimum standards
While regulations can be useful for creating awareness and driving responsibility, they are not comprehensive. As we’ve seen in retail security breaches, regulations might be imposed but they set a bare minimum for protection. If retailers adhere to all regulations, their financial liability is limited, even though the damage to the end user can be devastating. Take, for example, the recent Equifax breach, which led to sensitive information of hundreds of thousands customers being exposed, with little to no repercussion for their lack of action. This is the issue with regulations being considered an antidote to the problem. As regulations don’t update as quickly as technology does, adherence to regulations puts your organization out-of-date and at risk almost immediately. The bottom line is that effective cybersecurity requires organizations to go above and beyond industry regulations.

Since the first wave of networked medical devices, security threats have taken a new direction, going beyond the sale of information to potentially life-threatening attacks. Hacking a network, manipulating critical data or medication, or changing a device’s cadence all have dangerous consequences.
  Pages: 1 - 2 - 3 >>

Health IT Homepage

You Must Be Logged In To Post A Comment

Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Gold Service Dealer Program
Receive RFP/PS
Healthcare Providers
See all
HCP Tools
A Job
Parts Hunter +EasyPay
Get Parts
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to, Inc. Copyright ©2001-2018, Inc.