Clean Sweep Live Auction on Wed. May 1st. Click to view the full inventory

DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Pediatrics
Current Location:
> This Story

Log in or Register to rate this News Story
Forward Printable StoryPrint Comment




Health IT Homepage

Want to reduce readmissions? Let’s start with keeping patients healthier Insights from Robin Hill, chief clinical officer at Vivify Health

Decision support software could reduce scans by 6 percent: MIT researchers Prevent overuse of powerful and costly imaging exams

CMS to add more telehealth benefits to Medicare Advantage plans Aiming for greater flexibility, lower costs

Fredrik Palm ContextVision appoints new CEO

Trice Imaging connects imaging devices of large chain healthcare provider Aleris Patients and physicians can view images on laptops, cell phones

Three recommendations to better understand HIPAA compliance Approximately 70 percent of organizations are not HIPAA compliant

Researchers orchestrate malware attack to expose imaging vulnerabilities Deceived radiologists and AI algorithms into misdiagnoses

How hyper-targeting patient communications can improve medication adherence Providing specific messages can make a world of difference

Sound Imaging launches MR patient motion and detection system, SAMM MD Reduces repeat scans, prevents interruption to workflow

Where are your patients going? Keeping patients from switching to a new provider is good business and good medicine

Anatomy of a hospital cybersecurity attack

By Mike Kijewski

Security is the collective responsibility of all players in a healthcare delivery organization (HDO), from vendors and third parties to threat intelligence-sharing platforms.

What makes healthcare, and particularly hospitals, a popular target?
Story Continues Below Advertisement


Special-Pricing Available on Medical Displays, Patient Monitors, Recorders, Printers, Media, Ultrasound Machines, and Cameras.This includes Top Brands such as SONY, BARCO, NDS, NEC, LG, EDAN, EIZO, ELO, FSN, PANASONIC, MITSUBISHI, OLYMPUS, & WIDE.

● Highly valuable data – the volume of personal health information and financial details stored, combined with their sensitive nature, as nearly all of the data is governed by government regulations
● Lack of IT investment and training – healthcare is noted to have the lowest confidence in endpoint security, with 72 percent of participants feeling they are not up to the job of protecting endpoints from exploitation
● Highly connected systems – the scale of the IT infrastructure, overlapping systems, bluetooth/wireless connected devices and data constantly in transit increases the size of the threat landscape

According to the Ponemon Institute, this is the seventh year of healthcare data breaches costing the most, estimated at more than 2.5 times the cost of similar attacks in other industries.

To best defend against increasingly sophisticated cyber threats, we assess the threat landscape of an HDO, typical threats and better practices in preparing for a breach.

Assuming the reality of an HDO includes overlapping systems, lingering legacy systems and connected medical devices, it is easy to conclude HDOs and medical device vendors are faced with securing a complicated array of endpoints. With an increasing number of devices connecting to HDO networks, each endpoint presents a possible entry point from which a malicious actor could launch an attack.

Criminals are sophisticated, but also rely on probability odds. The more endpoints targeted, the higher the likelihood of finding an entry point. A recent review of all medical device disclosures identified a 400 percent increase quarter over quarter, with a prediction that the trend will increase. Whenever an endpoint connects or a user runs software that is unpatched or out of date, the threat surface expands.

The common phases of hacking (recon, discovery, exploitation, evil, persistence and movement) have identified the biggest threats to endpoints, outlined below:

  Pages: 1 - 2 - 3 >>

Health IT Homepage

You Must Be Logged In To Post A Comment

Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Gold Service Dealer Program
Receive RFP/PS
Healthcare Providers
See all
HCP Tools
A Job
Parts Hunter +EasyPay
Get Parts
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to DOTmed.com, Inc. Copyright ©2001-2019 DOTmed.com, Inc.