Focus: Technology

Cyberattackers exploit healthcare data security weaknesses

The healthcare sector is the most targeted industry in the first quarter of 2018


Cyberattackers are exploiting inherent weaknesses in healthcare data security, making the sector the most targeted industry in the first quarter of 2018, according to an article on the Health IT Security website.

The Rapid7 quarterly threat report released May 15. found that the leading attack vectors in healthcare were remote access, such as  suspicious logins, access attempts from disabled accounts, and account leaks, as well as phishing and ransomware.

Healthcare organizations are popular targets because they often have a complex, distributed IT infrastructure with legacy systems and proprietary medical devices, making them difficult to secure quickly, the article said.

Plus, healthcare facilities rely on system availability to keep life-saving operations running. Cyberattackers have frequently exploited this situation with ransomware or denial of service attacks.

Read the article.

 

 



May 22, 2018


Topic Area: Information Technology


Recent Posts

Dirty Floors: How Pathogens Can Accumulate and Spread Underfoot

Studies show that healthcare floors are covered in bacteria and can quickly spread throughout patient rooms. 


WellSpan Health Opens Its Newberry Hospital in Pennsylvania


Cahaba Center for Mental Health Ensnared in Data Breach

On March 28, 2025, Cahaba identified suspicious activity in an employee email account.


Reframing the Construction Manager as a Community Manager

Managers must work with patients, community residents and other interested parties to ensure a smooth, successful construction projects


Health First Celebrates 'Topping Off' Ceremony for New Cape Canaveral Hospital Campus

Construction is slated to finish by the end of 2026 or early 2027.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.