1. INTRODUCTION
In the modern world everything is digitized. Every sector including Healthcare, Military, Business, Manufacturing & Financial use Information Technology in their everyday work. All the other sectors have taken necessary precautions against cyber security threats except the healthcare sector. That is mostly because the healthcare sector focusses more on healthcare and less on its own security. Also cyber security resources are highly restricted for the healthcare sector due to the high cost in healthcare. But still technological advancements in the healthcare sector are improving the accuracy and quality in the healthcare. But with that comes the risks of cyber threats. Nowadays there are more cyber security breaches in the healthcare sector that are being reported. But the unreported breaches are always more than the incidents that are being reported. If the personnel in the healthcare sector are more considerate about cyber security these attacks and breaches can be reduced by having foundational quality information technology (IT) system, training and awareness, risk base methodologies and preventive and proactive stance. [1]
According to Fortified Health Security releases 2021 mid-year Horizon Report over 22 million people have been affected by breaches in the healthcare sector in 2021 which is a 185 percent increase compared to 2020 [2]. These cyber-attacks may affect patient’s identities as well as finances, obstruct hospital operations and jeopardize patient’s health and wellbeing. When attackers breach hospital databases they can access patient’s full names, date of births, blood types, and diseases treated for which can be a serious privacy issue. These can cause long term problems like loss of reputation and income of hospitals and health facilities [1]. For an example in 2017 United Kingdom National Health Service (NHS) got affected to a ransom ware attack called ‘WannaCry’ [3], in February 2016 a German Hospital Lukaskrankenhaus Neuss was affected by a ransom ware attack through social engineering and in 2018 Norway Regional Health Authority (HRF) was compromised by a foreign criminal group [1], and in the same year a small hospital the ‘Hancock Regional Hospital’ in United States was affected by a malware called ‘SamSam’ and recently Ireland Health Service Executive (HSE) faced another ransom ware called ‘Conti’ [3].
When the healthcare sector is compromised it affects its stakeholders. Stakeholders are a party that has an interest in a company or an organization or a party that can be affected by the company or the organization [4]. In the healthcare sector the primary stakeholders are the doctors and the working staff. The secondary stakeholders are the pharmaceutical firms [4]. Secondary stakeholders have the ability to impact interactions or destabilize primary stakeholders [4]. Stakeholders in the healthcare sector have a significant impact on the industry’s trajectory. Their support is critical as they give the financial support, corporate strategy, solutions and other services to the healthcare sector [4].
New technologies are being developed for better treatment and patient care every day in the healthcare sector. Every department inside the healthcare sector use and store personal identifiable information (PII) and protected health information (PHI) [1]. These are highly sensitive data and virtually all the departments manage them at least on some level. These interactions could be subjected to cyber-attacks compromising the integrity of the system and confidentiality of patients and employees through malware [5].
Because of high demand for patient information and the use of outdated systems in the healthcare sector cyber-attacks are very common nowadays [5]. There are some reasons why the healthcare sector is targeted by an attacker. Attackers can make a lot of money by stealing private patient data, attackers can easily gain access to medical devices, etc. open and shareable healthcare information are important but the use of outdated technology and not caring much about cyber security solutions leads to being victim of cyber-attacks [6].
2. RESEARCH STATEMENT
This paper reviews the literature regarding cyber security threats and mitigations about the healthcare sector. In this paper it is explained in detail about what is the healthcare sector, how harmful the present day cyber-attacks are, how long they can affect, why the healthcare sector is the victim, what kinds of attacks are common, ransom ware, data breeches, insider threats, DDoS attacks and some real world examples of attacks on the health care sector, prevention methods and what to do in the future for the healthcare sector regarding cyber security [5].
3. REVIEW OF THE LITERATURE
What Is The Healthcare Sector?
Attacker may make a lot of money by stealing patient’s private data.
Attackers
can easily gain access to Medical devices.
Regarding online protection and patient information protection, these new devices give even more access points for attackers. Because these medical devices are not designed for security purposes and they are made for only one purpose such as monitoring both normal and abnormal metabolic activity, monitoring heart rates and making prescriptions. However, those devices do not store details, but attackers can carry out an attack on a server that does contain valuable data because it’s too easy to compromise these devices [6]. After compromising these medical devices the attacker will be able to restrict the healthcare organization from providing crucial lifesaving medication to patients. It’s the worst thing that can happen when an attacker gains access to the medical devices.
Staff remotely access the data.
Many medical units are interconnected to provide the maximum possible
treatment for each patient effectively. Doctors or other staff members who need
to access that data can sit at their own desks and they can retrieve data
remotely from multiple devices at any time [6]. Because of
this feature attackers can also gain access through interconnected network and as
every device connected is not protected correctly as every employee is not
aware of the online risks, the attackers can easily compromise the whole system
[6].
Workers refusing the use of new technology.
Everyone knows that the healthcare workers are one of the busiest and most sought-after
professionals. This also implies that they don't have the time or resources to
add online security measures to their job since they work more hours and under
pressure & stress. Health care workers
should be able to focus on their tasks without being distracted by other things
like cyber-attacks [6].
Most of the staff doesn’t have any knowledge about online threats.
Because of the heavy workload of the healthcare sector every employee is
unable to acquire any knowledge about online risks. Also they are trained for
only medical purposes and cyber threats are not a part of their training. As a
result of financial, resource, and time restrictions, it is probably not
feasible for all healthcare employees to be knowledgeable in cyber security
best practices [6]. Because of this reason they are targeted more by attackers
and most of them become a victim unknowingly.
Having a huge number of medical devices, which means it is difficult to
achieve top level security for all the devices.
There is a vast network of linked medical devices in today's healthcare sector.
As a result, larger organizations can operate with hundreds of medical devices
interconnected which in turn can pose a possibility for a cyber-attack. As
previously mentioned, healthcare staff is not usually aware of threats to
devices. So IT professionals are tasked with the responsibility of securing a
whole physical network and to protect the rest of the network when one device
is compromised. Use of outdated technology.
Although the medical technology has advanced significantly over the past
decade, not all the aspects of the healthcare sector have caught up. For an
example the security side of the healthcare sector is still primordial. As a
result of limited resources and a reluctance to acquire new methods, a lot of
medical equipment has become outdated. It is recommended that all software must
be updated in hospitals and those who does not are the ones that are highly susceptible to cyber-attacks.
Open and shareable of healthcare information are important.
On-site
and remotely medical staff can gain access to private patient information on
various devices. They do not have the time to stop and think about the security
aspects of the equipment they're using in the field since most of the time it’s
so urgent [6]. Sharing information is not always protected because they cannot
use their credentials every time when accessing those data, most importantly in
a time-critical situation. Sometimes users just check their mails, to do that
they do not need an admin privilege account, so a single malicious mail can
infect everything in the whole system.
Smaller healthcare organizations does not care much about cyber security solutions
Every
organization has a risk for cyber-attacks. Larger companies use huge amounts of
data and they are the most attractive targets for attackers because of the
large amount of money they can make by attacking them [6]. However, the security
expenses of smaller companies are smaller. As a result smaller businesses are
often seen as easy targets because of their less complicated and not up-to-date
cyber security solutions, as well as a backdoor access opportunity to larger
business targets [6].
Impacts
Real World Examples
UK ‘WannaCry’ ransom ware attack.
Germany Lukaskrankenhaus Hospital.
- Norway Regional Health Authority (HRF)
- US Hancock regional hospital
Mitigations
Provide Information Technology (IT) at the foundation.
Good information technology is required in order for any health care organization to have an effective information security state. In healthcare contexts, this is particularly challenging owing to the lack of human resources, financial constraints, a history of lack of investment, and the complexity of the application area. But still it is essential [1]. Some indicators can offer some insight on a health care facility's IT quality, even if there are no well-established models or methods for doing so even currently. Examples include health facilities with solid application bases that do not have overflowing helpdesk call logs and IT personnel that is largely focused on fixing faulty or broken apps [1].
Risk-based approach
A high level of security is required when it comes to cyber security. However, because there is no such thing as perfect cyber security, a risk-based strategy through corporate risk management is required [1]. An assault is always possible, even with the best IT infrastructure and procedures, as well as a proactive attitude and information security safeguards. so, the cyber security framework suggested by “US National Institute of Standards and Technology (NIST) and the recommendations of the European Union Agency for Network and Information Security (ENISA) are advised to be practiced in a risk-based approach [1].”
Training and awareness
When it comes to cyber security, people are always the weakest link. As a result, health care institutions should consider educating all users regularly. Although this does not ensure security, at the very least, it is a positive step in the right direction [13]. Health facility users, from doctors to staff members, to patients might accidentally or purposefully compromise the hospital's cyber security. So providing trainings that are both relevant and effective can reduce those compromises drastically. Health facilities should regularly analyze and identify knowledge gaps [14]. Because of their unintended acts, end users must always be aware of the dangers they can pose.
Privileges issuing.
Incident response plan
4. FUTURE RESEARCH
Cyber-attacks on the health sector are increasing day by day, as a result cyber security counter measures and threat mitigations should be automated. For example, cloud based technologies and IoT (Internet of Things) as well as Artificial Intelligence will be used more frequently in the future. To catch up with them cyber security professionals must develop and implement new and advanced more powerful and effective methodologies for the detection and prevention of all kinds of cyber threats. So in the future the use of AI controlled security control systems, other various automated systems and IoT must be used to diagnose malware, cyber threats not just by their signature but also by their behaviors. Training sessions should be held in the future including that updated knowledge. Future cyber threats will be much more advanced and deadly due to the advancement of technology and the increased usage of technology in the healthcare sector. So establishing much stronger security standards according to future necessities is recommended.
5. CONCLUSION
Cybercriminals pay more attention to the healthcare sector more due to less cyber security protection in healthcare facilities. Attackers use malware, ransom ware and phishing attacks to breach healthcare systems and steal sensitive information. The most common motive for these attacks is Money or financial benefits. As these attacks are increasing day by day health organizations should pay more attention towards cyber security and implement necessary mitigations and prevention mechanisms. Personnel in the healthcare sector should consider about cyber threats seriously and act accordingly.
6. REFERENCES
[1] Argaw, T. Pastoriza, S. J. and L., "Cyber security of Hospitals: discussing the challenges and working towards mitigating the risks,”
[2] F. H. Security, "Fortified Health Security Releases 2021 Mid-Year Horizon Report,”
[3] DorianRees, "Pinsent Masons," 18 June 2021. [Online]. Available: https://www.pinsentmasons.com/outlaw/analysis/cyber-attacks-healthcare-europe.
[4] Kimberly, "Swift Digital," 13 August 2021. [Online]. Available: https://www.swiftdigital.com.au/blog/stakeholders-healthcare/.
[5] "Cyber Attacks: In the Healthcare Sector,” 08 Feb 2017.
[6] "9 reasons healthcare is the biggest target
for cyber-attacks," Swivel Secure, [Online]. Available: https://swivelsecure.com/solutions/healthcare/healthcare-is-the-biggest-target-for-cyberattacks/.
[7] F. J. Humer C, "Your medical record is worth more to hackers than your credit card," 27 04 2014. [Online]. Available: https://www.reuters.com/article/uscybersecurity-hospitalsidUSKCN0HJ21I20140924.
[8] R. E. M. M. S. R. K. C. Luna R, "Cyber threats to health
information systems: a systematic review. Technol Health Care," 2016.
[9] S. S, "Hackers hold German hospital data hostage," 2016. [Online]. Available: https://www.dw.com/en/hackers-hold-germanhospital-data-hostage/a-19076030.
[10] K. S, "Nearly half of the Norway population exposed in
HealthCare data breach," The Hacker News Logo, 2018.
[11] S. C. T. UNIT, " SamSam Ransomware Campaigns," 2018. [Online]. Available:
https://www.secureworks.com/research/samsamransomware-campaigns.
[12] H. O, "Hancock regional hospital back online after paying hackers $55,000. Digital Health," 2018. [Online]. Available:
https://www.digitalhealth.net/2018/01/hancockregional-hospital-back-online/.
[13] B. S. O. S. S. J. F. J. G. A. Pycroft L, "Brainjacking:
Implant Security Issues in Invasive Neuromodulation," p. 462, Aug 2016.
[14] "The CIS Critical security controls for effective cyber defense," 2016. [Online]. Available:
https://creativecommons.org/licenses/by-ncnd/4.0/legalcode.
[15] "New Report Connects Privileged Account Exploitation to Advanced Cyber Attacks. CyberArk," 2018. [Online]. Available:
Stay Informed, Stay Safe!