Shoddy IT infrastructure invites hackers

Hackers are attracted to hospitals with rapid adoption of IT


Training and maintaining “digital hygiene” in a healthcare facility can reduce the threat of a ransomeware attacks, according to an article on the Healthcare Exec website.

Hackers are attracted to hospitals with rapid adoption of IT without a concomitant increase in the number and sophistication of IT support staff, according to new research from Marshall University.

A massive increase in health IT utilization in a relatively short time because of the Meaningful Use program ensured security deficiencies, which may now open systems up to cyber criminals, the study said.

Proper risk mitigation and disaster recovery are crucial to reduce costs and the likelihood of data loss.

Read the article.



September 5, 2019


Topic Area: Security


Recent Posts

Building Envelope Design: Beyond Energy Efficiency

An integrated approach to envelope design can create more comfortable and energy-efficient hospitals.


Outpatient Surge Reshapes Long-Term Strategy for Medical Outpatient Buildings

Demographic tailwinds, policy uncertainty and shifting care models are pushing health systems to rethink how and where they invest in outpatient facilities.


Mercy Medical Center to Be Integrated into Baystate Health

Until the transition is complete and receives all regulatory approvals, Mercy Medical Center and Baystate Health will continue to operate independently.


Managing IAQ in Healthcare Facilities During Wildfires

Wildfires are becoming more prevalent across the country. Facilities must be prepared to handle their effects on air quality. 


Building Hospital Resilience in an Era of Extreme Weather

Expert Jennifer Mahan discusses the vulnerabilities healthcare facilities face during disasters and the infrastructure strategies that keep operations running.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.