SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Reacting to the Rising Trend of Cyberattacks Toward Hospitals
By: Peter Lam
As more hospitals move away from paper and adopt electronic health records and
management services, the risk for being a victim of a cyberattack is increasing. According to the
Health Care IT News, "as many as 75 percent of U.S. Hospitals responding to a poll this week
could have been hit with ransomware in the last year." Hospitals are the ideal target for
cyberattacks because they "provide critical care and rely on up-to-date information from patient
records" (Wired 2016). In particular, a type of cyberattack known as ransomware is the method
of choice for targeting hospitals. By loading and executing the malware onto a target's system,
Ransomware encrypts information until payment for the decryption key is provided (often via
electronic payments such as electronic wire or bitcoin).
This is detrimental to hospitals. Imagine being unable to access patient information on
demand or losing pertinent information for a treatment for days at a time. For Hollywood
Presbyterian Medical Center, this was a reality. Hollywood Presbyterian Medical Center paid a
sum of $17,000 in order to take back their systems and resume normal operations (Tripwire
2016). However, not all cases will have the same outcome as Hollywood Presbyterian Medical
Center. Kansas Heart Hospital paid an unknown first ransom but the hackers demanded a second
ransom (Healthcareitnews 2016). As a result of a cyberattack, hospitals like Hollywood
Presbyterian Medical Center and Kansas Heart Hospital both lost monetary and operational
value. Furthermore, these attacks are becoming more frequent because hackers are realizing how
ill prepared hospitals are for the attacks and how lucrative the payout can be.
As hospitals look to grow and adopt more modern systems and workflows, cybersecurity
can no longer be an afterthought. If such a passive approach to cybersecurity continues,
hospitals will continuously have to react and not prevent potentially crippling attacks. There are
simple tasks such as establishing a backup and restore process, blocking macros, and file
screening are tasks that rank low on complexity but have a moderate to high effectiveness in
security without affecting day to day operations. Being proactive will better protect users and
provide more options to continue operations without having to give into ransoms or losing
important data.

Mais conteúdo relacionado

Destaque

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Destaque (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Reacting to the Rising Trend of Cyberattacks Toward Hospitals

  • 1. Reacting to the Rising Trend of Cyberattacks Toward Hospitals By: Peter Lam As more hospitals move away from paper and adopt electronic health records and management services, the risk for being a victim of a cyberattack is increasing. According to the Health Care IT News, "as many as 75 percent of U.S. Hospitals responding to a poll this week could have been hit with ransomware in the last year." Hospitals are the ideal target for cyberattacks because they "provide critical care and rely on up-to-date information from patient records" (Wired 2016). In particular, a type of cyberattack known as ransomware is the method of choice for targeting hospitals. By loading and executing the malware onto a target's system, Ransomware encrypts information until payment for the decryption key is provided (often via electronic payments such as electronic wire or bitcoin). This is detrimental to hospitals. Imagine being unable to access patient information on demand or losing pertinent information for a treatment for days at a time. For Hollywood Presbyterian Medical Center, this was a reality. Hollywood Presbyterian Medical Center paid a sum of $17,000 in order to take back their systems and resume normal operations (Tripwire 2016). However, not all cases will have the same outcome as Hollywood Presbyterian Medical Center. Kansas Heart Hospital paid an unknown first ransom but the hackers demanded a second ransom (Healthcareitnews 2016). As a result of a cyberattack, hospitals like Hollywood Presbyterian Medical Center and Kansas Heart Hospital both lost monetary and operational value. Furthermore, these attacks are becoming more frequent because hackers are realizing how ill prepared hospitals are for the attacks and how lucrative the payout can be. As hospitals look to grow and adopt more modern systems and workflows, cybersecurity can no longer be an afterthought. If such a passive approach to cybersecurity continues, hospitals will continuously have to react and not prevent potentially crippling attacks. There are simple tasks such as establishing a backup and restore process, blocking macros, and file screening are tasks that rank low on complexity but have a moderate to high effectiveness in security without affecting day to day operations. Being proactive will better protect users and provide more options to continue operations without having to give into ransoms or losing important data.