<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=323641658531367&amp;ev=PageView&amp;noscript=1">

Hospitals: The New Frontier for Medical Device Cybercrime

As I penned my most recent blog last week, I did not expect to have a new healthcare cybercrime situation surface so quickly! Hot on the heels of the recent event at Hollywood Presbyterian, where hackers employing ransomware held the hospital’s system and data hostage, a new report reveals “deadly cybersecurity weaknesses” at other hospitals. Deadly is not a euphemism here, as we’re referring to the ability to hack directly into the medical devices built to monitor patient health and turn them into tools of harm.

Now when we consider healthcare cybersecurity, the definition includes not only Electronic Medical Records (EMR) access and sensitive PHI data, but also the patient’s physical health. (Think patient monitoring systems and automated IV drug-delivery, as mentioned in the recent Baltimore Sun article.)

Independent security consultants profess shock at the reported ease of their “secret shopper” hacking infiltration, but let’s remember (1) that the FDA recently raised the warning flag along with new draft guidance for medical device cybersecurity, and (2) that most medical device manufacturers already follow the regulations for US markets.

As we have seen from other industries, health care hackers come in many guises, from lone wolf individuals and activist groups to organized crime and nation states. And an organization’s employees are a key target. So too are 3rd party vendors providing service to the hospital. Hackers often see vendors as an easy “back door” into an organization.

The potential for harm exists, yes. But so does the potential for thwarting harm. Given the tools and training to recognize everything from phishing scams to potentially poor privacy practices, people remain the first line of defense for privacy, security and good manufacturing practices. Let’s keep our sights set on prevention measures: policy development, training, ongoing risk analysis, 3rd party risk mitigation, quality management systems and compliance monitoring.

Contact us to discuss how Ostendio can help you develop, manage and track your Risk Mitigation, Information Security and Compliance.

[av_one_full first min_height='' vertical_alignment='' space='' custom_margin='' margin='0px' padding='0px' border='' border_color='' radius='0px' background_color='' src='' background_position='top left' background_repeat='no-repeat'][/av_one_full]

[av_button label='Download our Cybercrime Tip Sheet. Learn how to protect your organization!' link='manually,http://ostendio.com/?p=5190' link_target='' size='large' position='center' icon_select='no' icon='ue800' font='entypo-fontello' color='theme-color' custom_bg='#444444' custom_font='#ffffff']

Grant Elliott
Post by Grant Elliott
March 2, 2016