advertisement
Like any large company, a modern hospital has hundreds – even thousands – of workers using countless computers, smartphones and other electronic devices that are vulnerable to security breaches, data thefts and ransomware attacks.
But hospitals are unlike other companies in two important ways. They keep medical records, which are among the most sensitive data about people.
A 2013 data breach at the University of Washington Medicine medical group compromised about 90,000 patients’ records and resulted in a US$750,000 fine from federal regulators. In 2015, the UCLA Health system, which includes a number of hospitals, revealed that attackers accessed a part of its network that handled information for 4.5 million patients.
Cyberattacks can interrupt medical devices, close emergency rooms and cancel surgeries. The WannaCry attack, for instance, disrupted a third of the UK’s National Health Service organizations, resulting in canceled appointments and operations. These sorts of problems are a growing threat in the health care industry.
I’m a systems scientist at MIT Sloan School of Management, interested in understanding complex socio-technical systems such as cybersecurity in health care. A former student, Jessica Kaiser, and I interviewed hospital officials in charge of cybersecurity and industry experts, to identify how hospitals manage cybersecurity issues.
A major challenge in hospitals’ cybersecurity is the enormous number of devices with access to a facility’s network.
Hospital officials could use software to ensure only authorized devices can connect. But even then, their systems would remain vulnerable to software updates and new devices.
They’re often not tested for proper security before being connected to the hospital network. One of our interviewees mentioned:
When new technologies bypass regular processes for purchase and risk assessment, they aren’t checked for vulnerabilities, so they introduce even more opportunities for attack.
Of course, hospital administrators should balance these concerns against the improvements in patient care that new systems can bring. Our research suggests that hospitals need stronger processes and procedures for managing all these devices.
Getting hospital administrators to understand the importance of cybersecurity is fairly straightforward: They told us they’re worried about costs, institutional reputation and regulatory penalties.
People typically treat cybersecurity protections as secondary to what they’re trying to get done. One person we interviewed described why some staff committed the cardinal cybersecurity sin of sharing a password:
The needs can vary widely across a hospital, in ways that can be surprising – such as access to sites likely to carry malicious software. A chief information officer at a research hospital told us:
These experiences are why we concluded that budget limitations are not as crucial to hospital cybersecurity as employee involvement.
The threat is nationwide, and keeps getting harder to defend against, as one chief information security officer told us:
Unfortunately, many hospital administrators seem to believe that protecting data is as simple as meeting state and federal regulations. But those are minimum standards that don’t adequately address the threat. As one of our interviewees said,
Our research shows that hospitals need to think beyond compliance. Also, with so few hospitals well defended against cyberattacks, all hospitals appear more attractive as potential targets.
Further, policymakers, health care leaders and hospitals themselves should work together to make the industry as a whole less susceptible to attacks that threaten people’s privacy and their very lives.
(Mohammad S. Jalali is a Research Faculty, MIT Sloan School of Management.)
(This is an opinion piece and the views expressed above are the author’s own. FIT neither endorses nor is responsible for the same. This article was originally published on The Conversation. Read the original article here.)
(At The Quint, we question everything. Play an active role in shaping our journalism by becoming a member today.)
Published: undefined