Is Your X-ray Machine Scuppering IT Security?

HIT security
share Share

This year alone has seen a huge increase in cyber attacks on healthcare data. It is no coincidence theta cybercriminals target healthcare. While compared to other sectors, the financial gains of hacking into a hospital’s data and demanding a ransom for release, are negligible, the guarantees of success are greater.

For one thing, many healthcare facilities are operating under old IT applications using older systems that are much easier to penetrate than those in the financial sector for example. For another, hackers know that a hospital will probably fold under the pressure to release data as in some cases patient lives depend on it. Reputation always does.

A report in Health Data Management takes look at two of the most common weak points that hackers take advantage of and what healthcare executives can do to minimise the risks.


First Line of defence: Doctors


With medical charts now beings stored electronically, physicians hold the keys to access to patient data. Surprisingly, many doctors still don’t understand that simple actions – or lack of them – can seriously compromise the security of such data.

In order t spend more time with a patient or to move onto the next task, sometimes doctors forget to log off their computers. Using weak passwords for easy remembering rather than employing a range for different systems also contributes to making data more vulnerable to hackers.

Naturally, hackers have exploited these tendencies and targeted healthcare records. In light of this, proper security awareness for all staff members is essential including remedying the above practices. Training should also highlight not clicking on suspicious emails or visiting sites that may comprise security.

Following training, reminders to implement security practices are necessary.

See Also:
Cyberhygiene Best Remedy Against Healthcare Hacking

Confirm Who is Responsible for Devices


Who owns the digital X-ray machines or electrocardiograms in your healthcare facility? Sometimes it is the vendor. This leaves healthcare providers vulnerable to external breaches that are not covered by in-house standards. Sometimes it is medical staff themselves who are responsible for maintaining standards. In order to ensure hat such devices are as secure as possible, hospital executives must monitor who has access to them, be crystal clear on the security standards imposed by the vendor and pinpoint practices to maintain stringent levels of security. It is no exaggeration to say that such practices could make the difference in a life or death situation.


Source: Health Data Management 

Image Credit: locutushealth

«« Latest on Mobile Use in Hospitals

Bitcoin Technology for Healthcare? »»

Published on : Tue, 4 Oct 2016

Related Articles

Maintaining the safety and protection of IT systems that keep important health information requires discipline. This is especially... Read more

The Impact of Technology on Medical Careers

With artificial intelligence and telemedicine gaining a foothold in healthcare, there are fears about technology easing medical... Read more

Tech giant Google's formal purchase of Fitbit, the world's second largest wearable maker, in a deal worth $2.1 billion, finally... Read more

IT security point of access doctors devices IT training How staff training can help IT security

No comment

Please login to leave a comment...