Le Lézard
Classified in: Health, Science and technology
Subject: SVY

Increase in ransomware attacks to healthcare's vulnerable remote access systems threatens patients


Nonprofit patient safety organization releases hazard report, recommendations  

PLYMOUTH MEETING, Pa., April 12, 2024 /PRNewswire/ -- Ransomware groups are increasingly targeting vulnerable remote access systems in healthcare, with several high-profile incidents in recent months. Ransomware attacks can cripple a hospital's ability to serve patients by cutting off access to or manipulating essential technologies and patient data. Hackers can exploit remote systems to divert emergency vehicles, cancel appointments, and in worse-case scenarios, shut down entire facilities.

Ransomware attacks can cripple a hospital's ability to serve patients.

It's common for hospitals to grant remote access to their networks, including for hybrid or remote employees; for physicians accessing patient records; and for radiologists reading studies. Vendors are also given access to remote hospital systems to run financial operations such as bill payments; or to support medical devices, IT systems, or physical plant/HVAC systems. Attackers can exploit these entry points?gaining access to and moving throughout the network?if remote access systems are not protected.

"The consequences of these attacks can be devastating: vital medical records held hostage, treatment plans in disarray, and potentially deadly delays in care," said Marcus Schabacker, MD, PhD, president and CEO of ECRI. "Each unchecked vulnerability is a threat to patient safety. To grow complacent about cybersecurity in healthcare is to play fast and loose with patients' lives."

"Although we're seeing an uptick in ransomware that targets remote access, this threat is not new," added Schabacker. "ECRI has called out cybersecurity issues in our annual top ten hazards list every year since 2018 ? with hackers exploiting remote access topping the list in 2019. It's alarming that the issue has only worsened in the years since."

ECRI's recent report includes recommendations for healthcare leaders to address ransomware attacks on remote access systems:

The full report, released to ECRI members, includes high-profile ransomware incidents that recently impacted the healthcare industry. ECRI is one of the nation's largest patient safety organizations, and the only organization worldwide to conduct independent medical device evaluations.

SOURCE ECRI


These press releases may also interest you

at 12:55
Sumo Logic, the leading SaaS Log Analytics Platform, today announced its position in the Challengers' Quadrant of the Gartner 2024 Magic Quadrant for Security Information and Event Management (SIEM). Sumo Logic Cloud SIEM streamlines threat...

at 12:41
Mitra Future Technologies, Inc. ("Mitra Chem"), a pioneering innovator in North American lithium-ion battery materials, today announced an investment from Alpha Wave Ventures as part of the company's Series B funding round. As part of the investment,...

at 12:38
The Department of Health ? Abu Dhabi (DoH), the regulator of the healthcare sector in the Emirate, signed a Memorandum of Understanding (MoU) with Mohamed bin Zayed University of Artificial Intelligence (MBZUAI), the leading AI research-based...

at 12:31
Optimizely, the leading digital experience platform (DXP) provider, today announced it has been named a Leader in the 2024 Gartner® Magic Quadranttm for Content Marketing Platforms. Gartner places Optimizely in the Leaders Quadrant for the seventh...

at 12:25
Aldevron, a leading global manufacturer of DNA, RNA, and proteins used in cell and gene therapies and vaccine development, today announced it has entered a strategic partnership with Acuitas Therapeutics, Inc., a private biotechnology company...

at 12:23
Between 6 May 2024 and 10 May 2024 EQT AB (LEI code 213800U7P9GOIRKCTB34) ("EQT") has repurchased 348,028 own ordinary shares (ISIN: SE0012853455). The repurchases form part of the repurchase program of a maximum of 2,154,000 own ordinary shares...



News published on and distributed by: