5 ways the medical field is targeted by hackers

11:55 AM
5 ways the medical field is targeted by hackers -

The use of electronic medical records is on the rise, with 54% of doctors use a system file 2011. electronic health the 09 health information Technology for economic and clinical health Act provides Medicare and Medicaid incentives to health care providers that adopt these systems.

With an increasing number of patient files in this format, many cyber criminals are moving to exploit the available data. Other types of medical technology, such as wireless connected medical devices, are open to cyber attacks as well. Here are some ways cybercriminals target the health sector.

Identity Theft in Healthcare Provider Files

Health care providers are turning to cloud computing and digital data management for their patient records. The days of paper files are soon to an end, but it puts patient data at risk savvy cyber criminals. One study found more than 49,00 malicious events among medical care providers, partners, pharmaceutical companies, insurance providers, and claims clearinghouses between September 2012 and October 2013.

Approximately 72 percent of malicious traffic was associated with supplier networks. Your doctor, dentist or medical specialist could easily become the target of these attacks. The study found that many organizations can not detect malicious activity, while others took months to realize that they were compromised.

This study highlighted the dramatic vulnerability of the health care industry for cyber criminals. Hackers can access patient names, addresses, medical information and personal financial information through medical records.

Ransomed information health care providers

The medical information is worth a lot, especially to the providers that collect, conserve and protect. Some cyber criminals have taken advantage of it, thinking they can steal data may be more valuable to its original owner as anyone. cyber criminals have taken to multiple ransom their stolen data.

An Australian medical clinic was a victim of this type of attack in 2012, with the pirates demanding a $ 4,0 ransom for the return of medical records from the clinic. Medical facilities are not the only target for this type of flight. Another Australian company had to pay a ransom of $ 3,000 for the return of financial documents. While anyone can fall prey to these pirates, the urgent need for a health care provider may have to file his patient, makes the industry more vulnerable than most ransom.

In most cases, hackers use this approach will not steal data from the target, but rather to insert a virus that encrypts, making it inaccessible. The pirates then refuse to provide access to the files until a ransom is paid. Authorities recommend that police contact for help before giving a targeted ransom. However, the mere idea that criminals could make its inaccessible medical information when it is needed most is sobering.

Government Buildings flight data

The delayed launch of the website healthcare.gov revealed numerous errors and weaknesses in the design of the site. Although the site is now operational, experts argue that patient information is far from certain. David Kennedy, the head of the security firm TrustedSec LLC, noted more than 20 flaws in the security of the site in early 2014.

In just five minutes, Kennedy designed a program that collected data from approximately 70,000 records. Program execution took only four minutes. All this was done without hacking the site, because the government keeps the data blatantly available to anyone who knows how to look for it. The arguments in favor of the safety of the site focused on the belief that hackers will not see the value of these data and will instead focus their efforts elsewhere.

The surprising accessibility of this information is a prime target for hackers. With the limited expertise, it is possible for criminals lovers gather information on people using the website healthcare.gov. This instance highlights the fact that it is not only extremely cyber savvy who can make use of the personal data of individuals.

Medical Device Hacking

One of the most terrifying threats of the medical community is the medical device hacking. With the knowledge, hackers can gain access to implanted medical devices such as pacemakers. Although there is no impact recorded this kind of piracy, some individuals have shown that it is possible.

Medtronic, Boston Scientific, and St. Jude Medical have all been attacked by pirates in the first half of 2013. These are three of the largest manufacturers of medical devices in the country. The target of these attacks is unknown. Medical device manufacturers have a wealth of exclusive information on their technology would be invaluable for competitors. There are signs that these attacks may come from China.

Many medical devices, including insulin pumps and pacemakers, are now connected to wireless networks of suppliers. While this allows doctors to provide emergency medical assistance far, it also makes these devices vulnerable to attack from a hacker. A large dose of insulin or electrical shock to the heart could prove fatal.

Internal Hacking and sales information

disgruntled employees may pose a serious threat in the healthcare industry, where information is easily hacked from within by employees with appropriate skills to get past the first guarantees. A Florida Hospital employee stole data from more than 700,000 patient records in 2011 and sold the information to interested parties. Companies that provide counsel and chiropractic services, for example, were interested in information on patients who have recently been treated after a car accident.

In February 2014, information from three major hospitals in Shanghai was stolen and sold to pharmaceutical companies. These pirates were also insiders who had access to hospital systems. Wireless networks have made the work possible in the car of a hacker, where he used a laptop.

The industry of medical data is expected to reach $ 10 billion by 2020. With so much money exchanging hands for medical information of patients, it seems inevitable that criminals enterprising want to get their hands on a part of the money.

Keeping information safe is a major concern for patients and health care providers, with many important considerations to be addressed in the months and years ahead.

Previous
Next Post »
0 Komentar