{"id":6740,"date":"2017-04-13T14:15:52","date_gmt":"2017-04-13T18:15:52","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=6740"},"modified":"2019-11-15T22:43:44","modified_gmt":"2019-11-15T11:43:44","slug":"healthcare-future-landscape","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/healthcare-future-landscape\/6740\/","title":{"rendered":"Healthcare security: Risks and predictions"},"content":{"rendered":"<p>In recent years, the healthcare sector has faced increasingly intense and complex cybersecurity threats. Organizations are spending more money than ever on security, but hackers keep finding ways in and continue stealing sensitive data, including personal medical records.<\/p>\n<p>As hospital technology evolves, so will the threats. The rapid pace of change means that hospitals will face even more pressure because as fast as new prevention techniques are released, cybercriminals move on to the next generation of attacks.<\/p>\n<h2>Hacker targets<\/h2>\n<p>Healthcare IT systems have only recently become attractive targets for cybercriminals. That is because healthcare organizations are increasingly holding more and more lucrative patient data \u2014 personal and financial information that cybercriminals can use to commit identity fraud.<\/p>\n<p>Furthermore, with more healthcare services being provided online and the use of mobile devices increasing, hackers are exploiting new vulnerabilities and using ransomware to take systems down. With the lives of patients at stake, many organizations decide the best option is to pay the ransom to retrieve data and get their services restored.<\/p>\n<p>Unfortunately, it\u2019s difficult to see a future beyond an escalated game of cat and mouse playing out between healthcare security and hackers. The recent spate of attacks on hospitals in the US and around the world has certainly raised awareness of potential threats, but one might also argue that the ease in which some groups have attacked healthcare systems has also highlighted the rewards for hackers.<\/p>\n<h2>Updating IT systems<\/h2>\n<p>There\u2019s plenty of evidence that cybercriminals are targeting less-modern systems, and over the next five to 10 years we expect healthcare providers will invest in updated technology for greater security.<\/p>\n<p>The challenge for IT managers in this sector has always been managing an infrastructure built over diverse and overlapping technology waves, often with gaps between the layers that enable hacker access.<\/p>\n<p>The systems are cumbersome and difficult to manage. In many cases, the manufacturers of system components no longer provide support for the products. For example, Microsoft withdrew support for Windows XP a couple of years ago, which means that the software is no longer updated or patched for security.<\/p>\n<p>Legacy systems, especially those more than a decade old, are extremely vulnerable and often integrated too deeply into an organization\u2019s infrastructure to be replaced. But as security threats intensify over the coming years, replacing these systems with modern IT will become a priority for healthcare providers.<\/p>\n<h2>The Internet of Hackable Things<\/h2>\n<p>As more critical medical equipment and devices move online, the stakes for security are high \u2014 malicious actors hijacking and controlling them could have deadly consequences.<\/p>\n<p>I\u2019m reminded of a <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/10\/21\/yes-terrorists-could-have-hacked-dick-cheneys-heart\/\" target=\"_blank\" rel=\"noopener nofollow\">story<\/a> that from a couple of years ago about former US Vice President Dick Cheney\u2019s doctors disabling his pacemaker\u2019s wireless capabilities to thwart possible assassination attempts. As more and more of the medical devices people depend on to stay alive are being networked, Internet of Things (IoT) security is fast becoming a higher priority.<\/p>\n<p>If not tackled effectively, security concerns could hamper the development of mobile and wearable devices, which have exploded on the healthcare scene in recent years. Cloud-powered and enabled by the ubiquity of smart mobile devices and online storage, these tools have the potential to transform preventative and outpatient care.<\/p>\n<p>Unfortunately, many of the problems with medical devices can\u2019t be fixed with a simple software patch \u2014 instead, the systems must be re-architected, and that takes time. It could be years before hospitals and patients see more secure devices.<\/p>\n<h2>Protecting Data<\/h2>\n<p>Big data and data analytics open doors to precision medicine, population health, and value-based care. But often they are let down by poor management procedures for data protection. Hospitals need to improve working practices; a <a href=\"http:\/\/www.cio.com\/article\/3078572\/security\/human-error-biggest-risk-to-health-it.html\" target=\"_blank\" rel=\"noopener nofollow\">large proportion of data breaches<\/a> come down to human error. Most hospital systems have many shared workstations and shared passwords, something not regularly seen in other industries.<\/p>\n<p>Hospitals also have to deal with the challenge of a proliferation of data from a wide range of sources \u2014 from mobile devices to data generated from health monitoring sensors. As a result, hospitals are under pressure to maintain numerous isolated IT assets and the data that resides on them.<\/p>\n<p>Until data security is addressed, health IT professionals will continue to face major barriers to the widespread adoption of new technologies. Therefore, we expect healthcare providers to take steps over the next few years to improve security by putting reliable access management procedures and systems in place. As well as keeping operating systems, browsers, and applications up to date, this will include enabling strong access security controls.<\/p>\n<p>Changes to technology in healthcare are coming on fast and furious, and it\u2019s past time for healthcare organizations to take action to secure their systems. By combatting security threats head on through systems that are built from the ground up with the management and protection of data in mind, we can realize a future in which healthcare technology transforms our lives for the better.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Safeguarding data and combating cyberthreats in healthcare.<\/p>\n","protected":false},"author":2051,"featured_media":15204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[282,491,2188],"class_list":{"0":"post-6740","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-cyberthreats","11":"tag-healthcare"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/healthcare-future-landscape\/6740\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/healthcare-future-landscape\/15071\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/healthcare-future-landscape\/6740\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/healthcare-future-landscape\/6863\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/healthcare-future-landscape\/15962\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/healthcare-future-landscape\/6740\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/healthcare\/","name":"healthcare"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2051"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=6740"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6740\/revisions"}],"predecessor-version":[{"id":24275,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6740\/revisions\/24275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15204"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=6740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=6740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=6740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}