Learn about ways in which hackers compromise patient and hospital data, and how to solve those problems with strong cyber awareness and security measures

Healthcare – A Top Target

Healthcare – A Top Target

It shouldn’t come as a surprise that the healthcare sector is one of the hackers’ favorite targets. And why wouldn’t it be? Patient data and hospital systems are highly valuable, making them perfect for demanding ransom. Any disruption in the daily operation of a hospital can quite literally be the difference between life and death. And since there are so many assets connected to the network, running critically important devices, hackers know that healthcare organizations would be more willing to pay a ransom to quickly restore to operations.

But did you know that one specific area in healthcare has recently become a hot favorite for hackers? We’re referring to web applications, which may include telehealth services, electronic health records, patient portals, computer-aided design systems for dentists, inventory management systems, health insurance portals, and even online pharmacies, among many others.

What Exactly Are Web Applications?

Web applications, sometimes called web apps, are application-based programs downloaded via the internet from a remote server. A web app is intended for interaction, unlike a website, which is only meant to share information. Examples of web apps include word processors, shopping carts, editors, and online forms.

Why Target Web Applications?

Web apps are like the front desk of any company or organization. While other databases may be on the intranet, these are readily available on any device with an internet connection. Once web applications are compromised, hackers have access to the company’s resources as well as the ability to target all the people who use the application. As a result, they may be able to access hundreds or even millions of users.

Types Of Attacks on Healthcare Web Applications

The same kind of web app threats that affect other sectors is of particular concern to healthcare web applications as well. These include cross-site scripting (XSS), path traversal, SQL injection (SQLi), local file inclusion, cross-site request forgery (CSRF), DDoS assaults, and XML external entity (XXE).

Healthcare Web Application Hacking – A Sad Reality

There have been several instances in recent years that have caused alarm to the healthcare sector, specifically, and the public, generally. In September 2020, attacks on a sizable provider with 400 hospitals and mental health institutions in the US and UK, forced several hospitals to resort to using paper-based records for their information. Patients were occasionally switched around, and services put on hold, but fortunately, no patient or personnel information seemed to have been compromised.

However, other victims were not as lucky. Another a nonprofit hospital network based in San Diego, was attacked in May 2021, resulting in losses and damages of $112.7 million. The incident severely disrupted patient care and compelled clinicians to return to paper records. Additionally, the hackers succeeded in obtaining approximately 150,000 patients’ stolen data.

What Does This All Mean?

With the overall increase in the size and frequency of cyberattacks against healthcare institutions, sitting back and hoping for the best is no longer (nor was it ever) the best option. The stakes are far too high to be shortsighted in how to protect against those with malicious intent. An investment into a comprehensive cyber assessment by a qualified professional is money far better spent than paying out tens of millions of dollars in ransoms, or worse, settling lawsuits potentially ranging from identity theft to serious injury or death. It only takes one lapse for everything to come crashing down.

Zelvin Security

Dangers of the Dark Web

Dangers of The Dark Web: How to Reduce Your Risk    Navigating the Dark Webs: A Clear Guide  Beneath the familiar surface of the internet lies a hidden danger: the dark web. This platform poses serious risks to organizations, such…

READ MORE

Understanding Cybersecurity Without Getting Technical

Tennessee’s Utility District Association (TAUD) is helping its members comply with the state comptroller’s cybersecurity regulations and helping UD’s maintain efficient operations for its customers across the state. Last week, general managers, office managers, board members and commissioners joined together…

READ MORE

Protecting Your Digital Smile: The Importance of Continuous Security Testing

Cybersecurity consulting Company

Continuous security testing is an essential component of an effective security strategy. In today’s digital landscape, organizations face a constant stream of potential threats and vulnerabilities that can put sensitive data and critical systems at risk. Without continuous security testing,…

READ MORE

Healthcare – A Top Target

It shouldn’t come as a surprise that the healthcare sector is one of the hackers’ favorite targets. And why wouldn’t it be? Patient data and hospital systems are highly valuable, making them perfect for demanding ransom. Any disruption in the…

READ MORE

ROI of Penetration Testing

You may already have a group of Information Technology professionals, and spend money on security tools to alert, detect, and quarantine security anomalies, so why would you even need to spend money on a penetration test? Well, just like any…

READ MORE