HackDig : Dig high-quality web security articles for hacker

3 Vectors of a Healthcare Cyberattack

2015-02-04 12:35

Our healthcare systems, from EHR to medical devices, are more vulnerable than many of us realize. And the stakes are too high to ignore.

Even within the healthcare industry, few people realize just how vulnerable many of our systems are to cyberattack. We talk about protected health information (PHI) and HIPAA compliance, we worry about penalties under new Omnibus rules and the HITECH Act, but few organizations see themselves as targets for the sophisticated attacks that have wreaked havoc for the likes of Home Depot and Sony. We’re just hospitals, insurance companies, and doctors’ offices, right?

The reality, though, is that the black market for patient data is up to twenty times more valuable than that for credit card data often stolen in retail breaches. Healthcare data is detailed, rich, and full of information that cybercriminals can use for identity theft and fraud. More importantly, it takes far longer for patients to know their information has been compromised – it can take up to a year or more for someone to realize their patient data has been compromised. When a credit card is stolen, algorithms in the financial industry pick up unusual activity very quickly and systems often automatically provide protection. These same protections simply don’t yet exist in healthcare.

Attacks on big retailers, banks, and media companies make headlines, but the high stakes and big payoffs mean that we’re too close to a wave of healthcare-related cybercrime for which most organizations and consumers are unprepared. Unfortunately, this is just the tip of the iceberg. There are, in fact, three primary vectors of a healthcare cyberattack.

Traditional cyberattacks

These are the types of attacks that happen to all institutions, even if some are more likely to make headlines than others. Malware, phishing schemes, trojans, ransomware - they’re all out there, but the healthcare industry is particularly vulnerable because it lacks the built-in protections and underlying security mindset of other industries. These types of malicious software, whether deployed through targeted attacks, compromised websites, spam, infected mobile devices, or otherwise, can not only expose sensitive data but create distracting and expensive IT headaches. A 2012 Ponemon Institute study found that data breaches cost the average healthcare organization roughly $2.4 million over the previous two-year period.

These attacks aren’t terribly new, but their sophistication is and the ability to expose patient data is of real concern Cybercriminals have developed entire malware platforms that can be customized to attack healthcare organizations. The resulting HIPAA violations can incur substantial monetary penalties, not only for medical practices but their business associates as well.

Connected medical devices

In 2011, the Association for the Advancement of Medical Instrumentation (AAMI) found that the average hospital had 1.4 networked medical devices per bed, double the number just two years before. Today, everything from heart monitors to IV pumps can be networked, automatically interfacing with EHR systems and providing real-time alerts to healthcare providers. From the perspectives of patient care and operational efficiency, this is a good thing. From a security perspective, it’s a potential nightmare.

Most of these devices, as well as MRI machines, CT scanners and countless other diagnostic machines were never designed with security in mind. Many diagnostic systems use off-the-shelf operating systems like Microsoft Windows while other devices use purpose-built software designed to collect data - not keep it safe. Too many of these devices are eminently hackable and, once compromised, can provide hackers with unfettered access to the clinical data systems within which they interface.

And it isn’t just patient data that’s vulnerable through connected devices. Cyberterrorists could potentially manipulate machines to intentionally harm patients or shut down critical systems in hospitals. As early as 2011, one researcher demonstrated how an insulin pump could be hacked to deliver a lethal dose of insulin.

Personal and home health devices

Device proliferation isn’t just occurring in hospitals. An increasing numbers of home health devices, mobile apps, wearables, and more are collecting and transmitting personal health information. Not only do these devices and apps potentially expose patient data (or at least fail to adequately protect it), but they also often interface directly with EHR and clinical data systems. When everything from a home glucose monitor to an iPhone app can become part of the attack surface, it should become clear just how badly exposed healthcare institutions are. As with clinical devices, most of these new patient care modalities are designed for convenience and innovative functionality rather than security.

The time to address healthcare security is not when medical record breaches start making headlines alongside those of Neiman Marcus and Target. The time is now. The healthcare industry as a whole needs to be proactive and begin deploying systems with security baked in, protected at both the network and application levels. The stakes are simply too high to wait.

Source: kcattarebyc-erachtlaeh-a-fo-srotcev-3/tsop/moc.tenitrof.golb

Read:1980 | Comments:0 | Tags:No Tag

“3 Vectors of a Healthcare Cyberattack”0 Comments

Submit A Comment



Blog :

Verification Code:


Share high-quality web security related articles with you:)


Tag Cloud