Skip to main content
Top
Published in: Journal of Clinical Monitoring and Computing 5/2023

24-04-2023 | Reviews

The elephant in the room: cybersecurity in healthcare

Author: Anthony James Cartwright

Published in: Journal of Clinical Monitoring and Computing | Issue 5/2023

Login to get access

Abstract

Cybersecurity has seen an increasing frequency and impact of cyberattacks and exposure of Protected Health Information (PHI). The uptake of an Electronic Medical Record (EMR), the exponential adoption of Internet of Things (IoT) devices, and the impact of the COVID-19 pandemic has increased the threat surface presented for cyberattack by the healthcare sector. Within healthcare generally and, more specifically, within anaesthesia and Intensive Care, there has been an explosion in wired and wireless devices used daily in the care of almost every patient—the Internet of Medical Things (IoMT); ventilators, anaesthetic machines, infusion pumps, pacing devices, organ support and a plethora of monitoring modalities. All of these devices, once connected to a hospital network, present another opportunity for a malevolent party to access the hospital systems, either to gain PHI for financial, political or other gain or to attack the systems directly to cause erroneous monitoring, altered settings of any device and even to access the EMR via this IoMT window. This exponential increase in the IoMT and the increasing wireless connectivity of anaesthesia and ICU devices as well as implantable devices presents a real and present danger to patient safety. There has, at the same time, been a chronic underfunding of cybersecurity in healthcare. This lack of cybersecurity investment has left the sector exposed, and with the monetisation of PHI, the introduction of technically unsecure IoT devices for monitoring and direct patient care, the healthcare sector is presenting itself for further devastating cyberattacks or breaches of PHI. Coupled with the immense strain that the COVID-19 pandemic has placed on healthcare and the changes in working patterns of many caregivers, this has further amplified the exposure of the sector to cyberattacks.
Literature
1.
go back to reference Moore GE. Cramming more components onto integrated circuits. Electronics. 1965;38(8):114–7. Moore GE. Cramming more components onto integrated circuits. Electronics. 1965;38(8):114–7.
7.
go back to reference Jalali MS, Landman A, Gordon WJ. Telemedicine, privacy, and information security in the age of COVID-19. J Am Med Inform Assoc. 2020;28(3):671–2.CrossRefPubMedCentral Jalali MS, Landman A, Gordon WJ. Telemedicine, privacy, and information security in the age of COVID-19. J Am Med Inform Assoc. 2020;28(3):671–2.CrossRefPubMedCentral
8.
9.
go back to reference Jiang JX, Bai G. Evaluation of causes of Protected Health Information Breaches. JAMA Intern Med. 2019;179(2):265–7.CrossRefPubMed Jiang JX, Bai G. Evaluation of causes of Protected Health Information Breaches. JAMA Intern Med. 2019;179(2):265–7.CrossRefPubMed
10.
go back to reference Sittig DF, Singh H. A socio-technical approach to preventing, mitigating, and recovering from Ransomware attacks. Appl Clin Inf. 2016;7(2):624–32.CrossRef Sittig DF, Singh H. A socio-technical approach to preventing, mitigating, and recovering from Ransomware attacks. Appl Clin Inf. 2016;7(2):624–32.CrossRef
11.
go back to reference Royal Academy of Engineering. Cyber safety and resilience: strengthening the digital systems that support the modern economy. London: Royal Academy of Engineering. 2018. Royal Academy of Engineering. Cyber safety and resilience: strengthening the digital systems that support the modern economy. London: Royal Academy of Engineering. 2018.
13.
go back to reference Coventry L, Branley D. Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas. 2018;113:48–52.CrossRefPubMed Coventry L, Branley D. Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas. 2018;113:48–52.CrossRefPubMed
16.
go back to reference Lallie HS, Shepherd LA, Nurse JRC, Erola A, Epiphaniou G, Maple C, Bellekens X. Cyber Security in the age of COVID-19: a Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the pandemic. Comput Secur. 2020;105:102248.CrossRef Lallie HS, Shepherd LA, Nurse JRC, Erola A, Epiphaniou G, Maple C, Bellekens X. Cyber Security in the age of COVID-19: a Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the pandemic. Comput Secur. 2020;105:102248.CrossRef
18.
go back to reference Ghafur S, Grass E, Jennings NA, Darzi A. The challenges of cybersecurity in health care: the UK National Health Service as a case study Comment. Lancet Digital Health. 2019;1(1):e10–e12. Ghafur S, Grass E, Jennings NA, Darzi A. The challenges of cybersecurity in health care: the UK National Health Service as a case study Comment. Lancet Digital Health. 2019;1(1):e10–e12.
21.
go back to reference Scott J, Spaniel D. Your life, repackaged and resold: the deep web Exploitation of Health Sector Breach victims. New York: ArtOfTheHak; 2019. Scott J, Spaniel D. Your life, repackaged and resold: the deep web Exploitation of Health Sector Breach victims. New York: ArtOfTheHak; 2019.
30.
go back to reference Pranggono B, Arabo A. COVID-19 pandemic cybersecurity issues. Internet Technol Lett. 2020;2021(4):e247. Pranggono B, Arabo A. COVID-19 pandemic cybersecurity issues. Internet Technol Lett. 2020;2021(4):e247.
31.
go back to reference Baumgart DC. Digital advantage in the COVID-19 response: perspective from Canada’s largest integrated digitalized healthcare system. NPJ Digit Med. 2020;3(1):1–4.CrossRef Baumgart DC. Digital advantage in the COVID-19 response: perspective from Canada’s largest integrated digitalized healthcare system. NPJ Digit Med. 2020;3(1):1–4.CrossRef
32.
go back to reference Houses of Parliament. Robotics in social care. London: Houses of Parliament; 2018. Houses of Parliament. Robotics in social care. London: Houses of Parliament; 2018.
37.
go back to reference McNamee K. 5G – What could go wrong? [Conference Presentation]. ISC2 Security Congress 2020, Online (2020). McNamee K. 5G – What could go wrong? [Conference Presentation]. ISC2 Security Congress 2020, Online (2020).
39.
go back to reference Ferretti L, Wymant C, Kendall M, Zhao L, Nurtay A, Abeler- Dorner L, Parker M, Bonsall D, Fraser C. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science. 2020;368(6491):eabb6936. Ferretti L, Wymant C, Kendall M, Zhao L, Nurtay A, Abeler- Dorner L, Parker M, Bonsall D, Fraser C. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science. 2020;368(6491):eabb6936.
43.
go back to reference Nasajpour M, Pouriyeh S, Parizi RM, Dorodchi M, Valero M, Arabnia HR. Internet of things for current COVID-19 and future pandemics: an exploratory study. J Healthc Inf Res. 2020;4(4):1–40. Nasajpour M, Pouriyeh S, Parizi RM, Dorodchi M, Valero M, Arabnia HR. Internet of things for current COVID-19 and future pandemics: an exploratory study. J Healthc Inf Res. 2020;4(4):1–40.
57.
go back to reference Hadnagy C. Social Engineering: the Science of Human Hacking. 2nd ed. Indianapolis: Wiley; 2018.CrossRef Hadnagy C. Social Engineering: the Science of Human Hacking. 2nd ed. Indianapolis: Wiley; 2018.CrossRef
58.
go back to reference Hoffman S. Cybersecurity threats in healthcare organizations: exposing vulnerabilities in the healthcare information infrastructure. World Libraries. 2020;24(1) Hoffman S. Cybersecurity threats in healthcare organizations: exposing vulnerabilities in the healthcare information infrastructure. World Libraries. 2020;24(1)
59.
go back to reference Furnell S, Shah JN. Home working and cyber security–an outbreak of unpreparedness? Comput Fraud Secur. 2020;2020(8):6–12. Furnell S, Shah JN. Home working and cyber security–an outbreak of unpreparedness? Comput Fraud Secur. 2020;2020(8):6–12.
64.
go back to reference Ronquillo JG, Winterholler JE, Cwikla K, Szymanski R, Levy C. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. J Am Med Inf Assoc Open. 2018;1(1):15–9. Ronquillo JG, Winterholler JE, Cwikla K, Szymanski R, Levy C. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. J Am Med Inf Assoc Open. 2018;1(1):15–9.
Metadata
Title
The elephant in the room: cybersecurity in healthcare
Author
Anthony James Cartwright
Publication date
24-04-2023
Publisher
Springer Netherlands
Published in
Journal of Clinical Monitoring and Computing / Issue 5/2023
Print ISSN: 1387-1307
Electronic ISSN: 1573-2614
DOI
https://doi.org/10.1007/s10877-023-01013-5

Other articles of this Issue 5/2023

Journal of Clinical Monitoring and Computing 5/2023 Go to the issue