By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
    Health
    Healthcare organizations are operating on slimmer profit margins than ever. One report in August showed that they are even lower than the beginning of the…
    Show More
    Top News
    photo of hands with blue veins
    8 Proven Tips on Finding Difficult Veins
    November 12, 2021
    tips for getting over the pandemic blues
    4 Proven Ways to Get Over the Pandemic Blues
    February 22, 2022
    medical industry innovations
    How is CNC Machining Transforming the Medical Industry?
    June 2, 2022
    Latest News
    The Wide-Ranging Benefits of Magnesium Supplements
    June 11, 2025
    The Best Home Remedies for Migraines
    June 5, 2025
    The Hidden Impact Of Stress On Your Body’s Alignment And Balance
    May 22, 2025
    Chewing Matters More Than You Think: Why Proper Chewing Supports Better Health
    May 22, 2025
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
    Policy and Law
    Get the latest updates about Insurance policies and Laws in the Healthcare industry for different geographical locations.
    Show More
    Top News
    Transformational and Disruptive Changes Are Coming to the Delivery System
    July 22, 2012
    Telemedicine and the PCP Cliff
    November 30, 2012
    Engaging Specialty Practices in the Patient Centered Medical Neighborhood
    March 24, 2013
    Latest News
    Streamlining Healthcare Operations: How Our Consultants Drive Efficiency and Overall Improvement
    June 11, 2025
    Building Smarter Care Teams: Aligning Roles, Structure, and Clinical Expertise
    May 18, 2025
    The Critical Role of Healthcare in Personal Injury Recovery: A Comprehensive Guide for Victims
    May 14, 2025
    The Backbone of Successful Trials: Clinical Data Management
    April 28, 2025
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: How Serious is the Threat of a Cyber Attack on U.S. Healthcare?
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > How Serious is the Threat of a Cyber Attack on U.S. Healthcare?
eHealth

How Serious is the Threat of a Cyber Attack on U.S. Healthcare?

rdowney14
Last updated: December 20, 2012 5:00 am
rdowney14
Share
4 Min Read
SHARE

A new paper discussses the vulnerability of the U.S. Healthcare system, and a story in a respected publication assesses the threat of cyber warfare.

A new paper discussses the vulnerability of the U.S. Healthcare system, and a story in a respected publication assesses the threat of cyber warfare.

David Harries and Dr. Peter Yellowlees authored the “Brief Communication” in the new issue of Telemedicine and eHealth, titled “Cyberterrorism: Is the U.S. Healthcare System Safe?“  Mr. Harries works for Océ North America, a Canon Group Company, and Dr. Yellowlees is a psychiatrist at U-C Davis in California.  Because we’re doing a lot with technology in medicine now, we’ve become fairly dependent on these systems.  And the authors believe that this dependence on data systems that use the Internet makes them a potential target for terrorists.  Should there be an attack on, say, a hospital computer system, bringing it down or revealing confidential patient information acquired from it, this could shake the trust in such systems.  As far as we know, there hasn’t been a successful attack on a U.S. healthcare organization.  The authors suggest that with cyber attacks on the increase, it may only be a matter of time before one is launched successfully.  In the article, they discuss “several best practices” healthcare organizations can adopt now for protection.

As to the actual threat of cyber-warfare, The Economist featured an article in its edition last week, titled “Hype and Fear.” It points out that “almost all (roughly 98%) of the vulnerabilities in commonly used computer programmes that hackers exploit are in software created in America.”  General Keith Alexander, the head of both the Cyber Command and the National Security Agency, says the attacker always has the advantage.  Many potential targets of cyber-terrorists, like power grids, sewage systems, and transportation systems, are less vulnerable than you might think.  Even if a foreign organization launched a weapon like the Stuxnet virus that was used against Iran, experience shows it will have limited success and the vulnerabilities will be repaired quickly.  And that was the best that purportedly two first-rate cyber powers (the U.S. and Israel) could come up with.  To develop a Stuxnet would require large teams of highly-qualified people which may be beyond terrorist groups.  And a large team formed to do bad things attracts the attention of intelligence agencies who are often successful infiltrating them.

More Read

Apple Health
Apple Health App: A First Taste
Physician Websites: Five Good Ways to Connect With Patients
Understanding the Patient Digital Search Process
ACP Ethics Manual on Social Media, Catastrophes, and More
Tips to Create Unique Social Media Content for Your Hospital

Still, there’s probably some teenager working round the clock trying to hack his way into a healthcare system for “fun”.  As a side note, companies like Microsoft have hired the people who mount cyber attacks on them to frustrate the others who are out there.

Harris and Yellowlees suggest that healthcare organizations develop a “defense in depth” approach as part of an overall risk management strategy.  This involves multiple layers of protection.  They offer six guidelines  to follow:

1. Regular security risk assessments that determine any gaps.

2. Intrusion prevention and detection services that can detect and block cyber attackers.

3. Installation of a data loss prevention solution that checks for leakage of information.

4. Audit logs to track access to sensitive patient data.

5. Performance of regular tests of Web security.

6. Mandates that software for mobile devices, laptops, portable storage and backup tapes be encrypted.

Even with all these measures in place, you may still have to worry about the IT guy who was fired last week and wants to “get even.”

TAGGED:cyber attack
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

Streamlining Healthcare Operations: How Our Consultants Drive Efficiency and Overall Improvement
Global Healthcare Policy & Law
June 11, 2025
magnesium supplements
The Wide-Ranging Benefits of Magnesium Supplements
Health
June 11, 2025
Preparing for the Next Pandemic: How Technology is Changing the Game
Technology
June 6, 2025
migraine home remedies and-devices
The Best Home Remedies for Migraines
Health Mental Health
June 5, 2025

You Might also Like

Will Information Technology Squeeze Physicians Out Of Their Central Role In Health Care?

July 11, 2012
EHR
DiagnosticseHealthHealth ReformMedical InnovationsMedical RecordsTechnology

Why EHRs are Key to Better Clinical Data

April 29, 2014
EHR MU How to prepare
eHealthMedical Records

EHR Meaningful Use: How to Prepare for Stage 1

October 18, 2013

HealthCare Social Media: Social Networks Lead to Innovation and Quality

February 10, 2013
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?