Skip to main content
Top
Published in: BMC Medical Informatics and Decision Making 1/2020

Open Access 01-12-2020 | Review

Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks

Authors: Salem T. Argaw, Juan R. Troncoso-Pastoriza, Darren Lacey, Marie-Valentine Florin, Franck Calcavecchia, Denise Anderson, Wayne Burleson, Jan-Michael Vogel, Chana O’Leary, Bruce Eshaya-Chauvin, Antoine Flahault

Published in: BMC Medical Informatics and Decision Making | Issue 1/2020

Login to get access

Excerpt

The increasing incorporation of technology into the health field is leading to greater precision in healthcare; however, advancements in cybersecurity measures are still required. According to a 2016 report by IBM and the Ponemon Institute, the frequency of data breaches in the healthcare industry has been rising since 2010 [1], and it is now among the sectors most targeted by cyberattacks globally [2]. Due to its immutability, the information accessed through health data breaches is of particular interest to criminals [3]. Blood type, past surgeries and diagnoses, and other personal health information are contained in an individual’s medical file. As these records include private data such as name, date of birth, insurance and health provider information, as well as health and genetic information, it is not possible to restore privacy or to reverse psychosocial harm when private data are compromised. …
Literature
3.
go back to reference Alvarez M. Security trends in the healthcare industry. Somers: IBM; 2017. p. 2–18. Alvarez M. Security trends in the healthcare industry. Somers: IBM; 2017. p. 2–18.
5.
go back to reference Argaw ST, Bempong N, Eshaya-Chauvin B, Flahault A. The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review. BMC Med Inform Decis Mak. 2019;5:1–11. Argaw ST, Bempong N, Eshaya-Chauvin B, Flahault A. The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review. BMC Med Inform Decis Mak. 2019;5:1–11.
8.
go back to reference Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: a systematic review. Technol Health Care. 2016;24:1–9.CrossRef Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: a systematic review. Technol Health Care. 2016;24:1–9.CrossRef
10.
go back to reference The Impact of HIPAA and HITECH. Mountain View: Symantec corperation; 2010. p. 1–7. The Impact of HIPAA and HITECH. Mountain View: Symantec corperation; 2010. p. 1–7.
11.
go back to reference Regulation 2016/679 of the European parliament and the Council of the European Union. Brussels: Off J Eur Communities; 2016: 1–88. Regulation 2016/679 of the European parliament and the Council of the European Union. Brussels: Off J Eur Communities; 2016: 1–88.
12.
go back to reference EPFL IRGC. Governance of trust in precision medicine. Lausanne: EPFL International Risk Governance Center; 2018. p. 1–24. EPFL IRGC. Governance of trust in precision medicine. Lausanne: EPFL International Risk Governance Center; 2018. p. 1–24.
13.
go back to reference Bradley N, Alvarez M, McMillen D, Craig S. Reviewing a year of serious data breaches, major attacks and new vulnerabilities: Analysis of cyber attack and incident data from IBM’s worldwide security services operations. Somers: IBM X-Force® Res 2016 Cyber Secur Intell Index. 2016: 1–19. 2017. Bradley N, Alvarez M, McMillen D, Craig S. Reviewing a year of serious data breaches, major attacks and new vulnerabilities: Analysis of cyber attack and incident data from IBM’s worldwide security services operations. Somers: IBM X-Force® Res 2016 Cyber Secur Intell Index. 2016: 1–19. 2017.
26.
go back to reference Voldal D. A practical methodology for implementing a patch management process. Swansea: SANS Inst Inf Secur Read Room; 2003. p. 1–14. Voldal D. A practical methodology for implementing a patch management process. Swansea: SANS Inst Inf Secur Read Room; 2003. p. 1–14.
31.
go back to reference Alvarenga A, Tanev G. Cybersecurity risk assessment framework that integrates value-sensitive design. Technol Innov Manag Rev. 2017;7:32–43. . Alvarenga A, Tanev G. Cybersecurity risk assessment framework that integrates value-sensitive design. Technol Innov Manag Rev. 2017;7:32–43. .
32.
go back to reference Moses V, Korah I. Lack of security of networked medical equipment in radiology. Am J Roentgenol. 2015;204:343–53.CrossRef Moses V, Korah I. Lack of security of networked medical equipment in radiology. Am J Roentgenol. 2015;204:343–53.CrossRef
34.
go back to reference Medical Device Safety Action Plan. Silver Spring: FDA; 2018. 1-18. 2017 HIMSS Cybersecurity survey. Chicago: HIMSS; 2017. p. 5–37. Medical Device Safety Action Plan. Silver Spring: FDA; 2018. 1-18. 2017 HIMSS Cybersecurity survey. Chicago: HIMSS; 2017. p. 5–37.
35.
go back to reference Khan SI, Hoque ASML. Digital health data: a comprehensive review of privacy and security risks and some recommendations. Comput Sci J Mold. 2016;24:273–92. Khan SI, Hoque ASML. Digital health data: a comprehensive review of privacy and security risks and some recommendations. Comput Sci J Mold. 2016;24:273–92.
38.
go back to reference EPFL IRGC. Governing cybersecurity risks and benefits of the. EPFL IRGC. Governing cybersecurity risks and benefits of the.
39.
go back to reference Internet of Things. Connected medical & health devices and connected vehicles. Workshop report. Lausanne: EPFL International Risk Governance Center; 2017. p. 6–29. Internet of Things. Connected medical & health devices and connected vehicles. Workshop report. Lausanne: EPFL International Risk Governance Center; 2017. p. 6–29.
41.
go back to reference Ondiege B, Clarke M, Mapp G. Exploring a new security framework for remote patient monitoring devices. Computers. 2017;6:11.CrossRef Ondiege B, Clarke M, Mapp G. Exploring a new security framework for remote patient monitoring devices. Computers. 2017;6:11.CrossRef
44.
go back to reference Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Heal Care. 2017;25:1–10.CrossRef Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Heal Care. 2017;25:1–10.CrossRef
45.
go back to reference Cybersecurity. The protection of data and systems in networks that connect to the Internet - 10 Best Practices for the Small Healthcare Environment. Washington: Department of Health and Human Service; 2010. p. 5–21. Cybersecurity. The protection of data and systems in networks that connect to the Internet - 10 Best Practices for the Small Healthcare Environment. Washington: Department of Health and Human Service; 2010. p. 5–21.
46.
go back to reference Ehrenfeld JM. WannaCry, Cybersecurity and Health Information Technology: A Time to Act. J Med Syst. 2017;41:104.CrossRef Ehrenfeld JM. WannaCry, Cybersecurity and Health Information Technology: A Time to Act. J Med Syst. 2017;41:104.CrossRef
47.
go back to reference Sittig DF, Singh H. A socio-technical approach to preventing, mitigating, and recovering from Ransomware attacks. Appl Clin Inform. 2016;7:624–32.CrossRef Sittig DF, Singh H. A socio-technical approach to preventing, mitigating, and recovering from Ransomware attacks. Appl Clin Inform. 2016;7:624–32.CrossRef
48.
go back to reference Langer SG. Cyber-security issues in healthcare information technology. J Digit Imaging. 2017;30:117–25.CrossRef Langer SG. Cyber-security issues in healthcare information technology. J Digit Imaging. 2017;30:117–25.CrossRef
49.
go back to reference Kim L. Cybersecurity awareness: Protecting data and patients. Nursing 2018. 2017;47:65–7. Kim L. Cybersecurity awareness: Protecting data and patients. Nursing 2018. 2017;47:65–7.
50.
go back to reference Palmaers T. Implementing a vulnerability management process. Swansea: SANS Inst Inf Secur Read Room; 2013. p. 1–21. Palmaers T. Implementing a vulnerability management process. Swansea: SANS Inst Inf Secur Read Room; 2013. p. 1–21.
51.
go back to reference Rochford O, Young G, Lawson C. Predicts 2017: Threat and vulnerability management. Stamford: Gartner; 2016. 1–6. Rochford O, Young G, Lawson C. Predicts 2017: Threat and vulnerability management. Stamford: Gartner; 2016. 1–6.
53.
go back to reference Wright A, Aaron S, Bates DW. The big phish: Cyberattacks against U.S. healthcare systems. J Gen Intern Med. 2016;31:1115–8.CrossRef Wright A, Aaron S, Bates DW. The big phish: Cyberattacks against U.S. healthcare systems. J Gen Intern Med. 2016;31:1115–8.CrossRef
54.
go back to reference Harries D, Yellowlees PM. Cyberterrorism: is the U.S. healthcare system safe? Telemed J E Health. 2013;19:61–6.CrossRef Harries D, Yellowlees PM. Cyberterrorism: is the U.S. healthcare system safe? Telemed J E Health. 2013;19:61–6.CrossRef
56.
go back to reference Health Care Industry Cybersecurity Task Force Report on Improving Cybersecurity in the Health Care Industry. Washington: Department of Health and Human Service; 2017. 1–87. Health Care Industry Cybersecurity Task Force Report on Improving Cybersecurity in the Health Care Industry. Washington: Department of Health and Human Service; 2017. 1–87.
57.
go back to reference Le Bris A, El Asri W. State of Cybersecurity & Cyber Threats in healthcare organizations: applied Cybersecurity strategy for managers. Cergy: ESSEC Bus Sch; 2017. p. 1–13. Le Bris A, El Asri W. State of Cybersecurity & Cyber Threats in healthcare organizations: applied Cybersecurity strategy for managers. Cergy: ESSEC Bus Sch; 2017. p. 1–13.
59.
go back to reference Cybersecurity and Hospitals. Four Questions Every Hospital Leader Should Ask in Order to Prepare for and Manage Cybersecurity Risks. Chicago: America Hopital Association; 2015. p. 1–15. Cybersecurity and Hospitals. Four Questions Every Hospital Leader Should Ask in Order to Prepare for and Manage Cybersecurity Risks. Chicago: America Hopital Association; 2015. p. 1–15.
62.
go back to reference Piggin R. Cybersecurity of medical devices - addressing patient safety and the security of patient health information. London: BSI; 2017. p. 3–22. Piggin R. Cybersecurity of medical devices - addressing patient safety and the security of patient health information. London: BSI; 2017. p. 3–22.
66.
go back to reference Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, Naehrig M, Wernsing J. CryptoNets: Applying neural networks to Encrypted data with high throughput and accuracy. Proc 33rd Int Conf Int Conf Mach Learn. 2016;48:201–10. Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, Naehrig M, Wernsing J. CryptoNets: Applying neural networks to Encrypted data with high throughput and accuracy. Proc 33rd Int Conf Int Conf Mach Learn. 2016;48:201–10.
67.
go back to reference Costan V, Devadas S. Intel SGX explained. IACR Cryptol ePrint Arch. 2016;2016:86. Costan V, Devadas S. Intel SGX explained. IACR Cryptol ePrint Arch. 2016;2016:86.
68.
go back to reference Corrigan-Gibbs H, Boneh D. Prio: private, robust, and scalable computation of aggregate statistics. Boston: NSDI; 2017. p. 259–82. Corrigan-Gibbs H, Boneh D. Prio: private, robust, and scalable computation of aggregate statistics. Boston: NSDI; 2017. p. 259–82.
71.
go back to reference Raisaro JL, Troncoso-Pastoriza JR, Misbach M, Sousa JS, Pradervand S, Missiaglia E, et al. MedCo: Enabling Privacy-Conscious Exploration of Distributed Clinical and Genomic Data. Orlando: 4th Int Work Genome Priv Secur; 2017. p. 1–21. Raisaro JL, Troncoso-Pastoriza JR, Misbach M, Sousa JS, Pradervand S, Missiaglia E, et al. MedCo: Enabling Privacy-Conscious Exploration of Distributed Clinical and Genomic Data. Orlando: 4th Int Work Genome Priv Secur; 2017. p. 1–21.
73.
go back to reference Kotz D, Gunter CA, Kumar S, Weiner JP. Privacy and security in Mobile health: a research agenda. Computer. 2016;49:22–30.CrossRef Kotz D, Gunter CA, Kumar S, Weiner JP. Privacy and security in Mobile health: a research agenda. Computer. 2016;49:22–30.CrossRef
Metadata
Title
Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks
Authors
Salem T. Argaw
Juan R. Troncoso-Pastoriza
Darren Lacey
Marie-Valentine Florin
Franck Calcavecchia
Denise Anderson
Wayne Burleson
Jan-Michael Vogel
Chana O’Leary
Bruce Eshaya-Chauvin
Antoine Flahault
Publication date
01-12-2020
Publisher
BioMed Central
Published in
BMC Medical Informatics and Decision Making / Issue 1/2020
Electronic ISSN: 1472-6947
DOI
https://doi.org/10.1186/s12911-020-01161-7

Other articles of this Issue 1/2020

BMC Medical Informatics and Decision Making 1/2020 Go to the issue