Ransomware Remains Threat to Healthcare

Healthcare systems are susceptible to ransomware attacks, largely due to technology that gives access to patient data

By Chris Miller, Assistant Editor, Facility Market


The healthcare industry continues to fight against a consistent wave of ransomware-based cyberattacks. Although consistent, this threat of ransomware is not a new one. Between 2014 and 2020 about a third of NHS trusts were successfully attacked with ransomware, according to Open Access Government. This caused more than 200 days of downtime.

Healthcare systems have an intrinsic susceptibility to ransomware attacks due to the amount of technology within them. Technology that gives access to patient data especially is everywhere in a healthcare setting. Many systems do not implement modern software to mitigate cyberattacks. This makes it easier for those that want to take advantage of patient health records and other data in these spaces like test results. The outcomes of cyberattacks can be harmful to healthcare operations. 

For example, a recent cyberattack hurt a network of hospitals and clinics in Ohio and West Virginia, according to Nextgov. This attack forced the network to temporarily cancel surgeries and divert patients with emergencies to other facilities. The system had to shut down its information technology systems as well. Since the pandemic began, cybersecurity professionals have seen an increase in attempted ransomware and hacking attacks in healthcare systems, according to The PEW Charitable Trusts

Ransomware kits found on the dark web make it easier for cybercriminals to take advantage of weak information technology systems. These criminals disrupt backup systems, delete shadow copies and unlock files to maximise their impact. They often hold precious data and force organizations to pay large ransoms. Health systems should execute a zero trust plan to mitigate cyber attacks. This plan mandates that these spaces should not give access to any user until they prove their identity. After being given access, the user should only have access to the information they need. For example, a doctor could only have access to their own patients’ records. This limits the effects of an attack if a cybercriminal were to get ahold of access information. Access and identity restrictions should be the foundation of a security strategy based on a zero trust method.



August 26, 2021


Topic Area: Information Technology


Recent Posts

Building Hospital Resilience in an Era of Extreme Weather

Expert Jennifer Mahan discusses the vulnerabilities healthcare facilities face during disasters and the infrastructure strategies that keep operations running.


Ennoble Care Falls Victim to Data Breach

Their investigation into the incident is still ongoing.


USDA Invests $73.8M to Aid in Livingston Hospital Expansion

Livingston Hospital will use the loan to modernize and construct a 56,000-square-foot addition to the hospital.


Why A Skilled Cleaning Staff Matters in Operating Rooms

Operating rooms are high-risk zones for infection due to invasive procedures and vulnerable patients, so competence in cleaning is critical.


General Leonard Wood Community Hospital Opening Date Set

The medical facility is designed to provide care to service members, retirees and their families.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.