Cyberattacks on Healthcare: How They Happen and What You Can Do to Protect Your Data

Healthcare facilities make good targets for hackers for several reasons, the chief of which is the trove of detailed patient information they store. For cybercriminals, successfully exfiltrating patient data is akin to striking a pot of gold. For the facilities and patients affected by hacks, the experience is a nightmare.

You wouldn’t forget the bad experience quickly, but you can reduce your exposure or even prevent attacks altogether.

4

The Landscape of Cyberattacks on Healthcare

Cyberattacks on healthcare facilities are not new. In 2017, the WannaCry ransomware nearly pulled the rug from underneath the UK National Health Service. The cyberattack made waves, but the NHS was not the threat actors’ primary target. Cybercriminals did, however, seem to learn that healthcare facilities are low-hanging fruits. In 2021, theOffice of Public Affairsreported that a group of hackers launched a coordinated cyberattack on over 1,500 hospitals, schools, and financial firms.

Ransomware and phishing are the common methods hackers use in these attacks: phishing to get privileged access to servers; and ransomware to lock the facilities out and squeeze them for money.

Photo of a Patient Monitor

Compared to technology companies that also handle valuable client data, healthcare facilities are easy targets mainly because hackers have multiple points of entry. Also, because the consequences of their attacks disrupt lives, hackers expect management to cave quickly.

How Most Cyberattacks on Healthcare Happen

The main point of entry for hackers is phishing emails sent to healthcare staff. Although hackers would prefer to target staff with admin-level access, just about any staff member will do. The first goal is to compromise the person’s device by tricking them into downloading malware attached to the email. The phishing trick may also be to get them to click a bad link and enter their login credentials on a fake dashboard.

Now that the malware is on the staff’s compromised device, the next goal is getting it onto the facility’s network. This typically happens when the compromised device connects to unsecured or poorly-secured devices on the network. The connection can happen via WLAN, Bluetooth, File Transfer Protocol, or even plugging in a USB drive.

Photo of Woman Looking at Computer Screen with Money on the Table

Once the malware is in the facility’s network, it executes its payload and establishes a Command-and-Control System with the attacker. With this backdoor open, hackers can move laterally and establish themselves—compromise more servers and create other backdoors in the network for future attacks.

Why Hackers Target Healthcare Facilities

It boils down to money and identity. Hackers are not interested in knowing who got a tooth extracted or what an X-ray looks like. The aim is to get patients’ personal information and vital records. This includes full name, address history, card details, social security number, biometrics, birth certificate, death certificate, and more.

With this information, it is possible to steal a person’s identity and use that to take loans, open bank accounts, or even impersonate someone when corresponding with service providers. Cybercriminals can also use vital records like death certificates to carry out public benefits fraud. For hackers who are not interested in using stolen data, there is demand on the black market (or indeed dark web).

healthcare word cloud on laptop

But monetizing stolen patients’ data is not always a walk in the park. So, hackers often prefer to compel hospital management to pay a ransom. They strong-arm facilities into paying by encrypting files and locking out their staff from devices they heavily rely on for accessing patient information and providing care.

At such times, healthcare executives are caught in the undertow. They have to choose between paying the ransom and possibly getting fined by the government (as perthe US Treasury) or facing lawsuits from patients whose data got leaked. It is not uncommon for management to capitulate and choose the option that protects their brand image and costs less money. It’s often a lack of money that means healthcare institutions don’t implement proper security measures in the first place…

ChatGPT

How You Can Protect Healthcare Data From Hackers

Hospitals are at the bullseye of cyberattacks on healthcare, but the target will likely expand to technology companies with products that collect health data, like smartwatches. Here are the things you, a health facility administrator, healthcare professional, or someone who uses healthcare services, can do to reduce your risks.

Upgrade Old Hardware and Patch Outdated Software

Many healthcare facilities still use computers running legacy versions of Windows operating systems like Windows 7 and Windows XP.Support for legacy OSes has ended, meaning that hackers can easily exploit existing vulnerabilities. But even new computer models running the latest Windows OS version aren’t invincible. However, they are better because they have developer support. you could expect to receive security updates that patch flaws, often before hackers can exploit them.

Furthermore, many facilities rely on third-party companies that supply niche equipment and software. Using so many providers increases entry points for hackers—because everything is connected. When relying on niche products or services, it’s best to patronize companies with a history of improving their merchandise.

In a sector where the budgeteers prioritize consumables and payroll, it can be challenging to allocate funds to replacing old, albeit functioning, hardware. Nevertheless, the potential loss from cyberattacks makes this a necessary expense.

Contract a Blue or Red Team

The IT department of healthcare facilities is mainly responsible for maintaining clinical software and troubleshooting failed hardware. These departments typically run lean, with few staff members who have the skills or knowledge to prevent cyberattacks. In such cases, consider hiring a blue, red, or purple team to assessyour organization’s cybersecurity posture.

Cybersecurity analysts are worth it. A team may recommend or implement encryption protocols that make your files useless to hackers even if they penetrate your network. Furthermore, they mayset up deception technologyto buy your IT department time to handle cyberattacks before they cripple your systems.

Follow Cybersecurity Best Practices for Safeguarding Data

We recommendendpoint security practices, especially zero-trust network access and regulating USB port access. Meanwhile, if you have to use a device, such as a phone, that often connects to the facility network, consider having one solely dedicated to work. Avoid deeply integrating that device into your home network as it could transmit malware from work to your home.

That said, if you use mobile apps, we recommend sharing the least amount of data possible. One way to limit the amount of data a device collects is using one that stores your data locally instead of one that uploads it to a company’s cloud. If you use devices that help your physician monitor your health remotely, ask for one withadvanced end-to-end encryptionfor safeguarding data.

What’s the Future for Healthcare Security?

Healthcare professionals rely heavily on digital equipment to deliver quality care. Blackouts caused by cyberattacks can quickly turn to chaos, like matter hitting an oscillator. The effect of attacks will worsen in the future as the generation of professionals familiar with pen, paper, and analog equipment retire. However, it is possible to reduce your risk by strengthening your cybersecurity.

ChatGPT is useful for many tasks, but there are some critical shortcomings that should make you think twice before trusting it for medical advice.

When your rival has to bail out your assistant.

It saves me hours and keeps my sanity intact.

These are the best free movies I found on Tubi, but there are heaps more for you to search through.

Make sure you don’t miss these movies and shows before Netflix removes them.

Revolutionize your driving experience with these game-changing CarPlay additions.

Technology Explained

PC & Mobile