Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Latest News

Number of cybersecurity attacks increases during COVID-19 crisis

Number of cybersecurity attacks increases during COVID-19 crisis

The Department of Health and Human Services has reported an increase in cybersecurity breaches in hospitals and healthcare providers’ networks which may be due to COVID-19. Between the months of February and May of this year, there have been 132 reported breaches, according to the HHS. This is an almost 50% increase in reported breaches during the same time last year. The increase in hacking could be attributed to the COVID-19 pandemic, according to Natali Tshuva, CEO and cofounder of Sternum, an IoT cybersecurity company that provides medical device manufacturers with built-in security solutions.

“The healthcare industry has, in the past few years, been one of the most targeted industries for cybercriminals,” she said. “So it’s only natural that at a time of crisis, we are seeing more and more attacks on the healthcare industry.”

Gaining control through patients’ medical devices has become a common technique for hacking during the pandemic because more people are using remote care, according to Tshuva. These devices don’t usually come with built-in security systems, so they have become prime targets for hackers. Once a hacker has gained control of a remote device, they can access the hospital’s network. Also, the temporary medical facilities being used and built to care for COVID-19 patients has created more weak spots.

“When you do things that fast, it’s very hard to create the correct type of infrastructure to protect your network and protect your devices,” Tshuva said. Hackers find vulnerabilities in a system in a number of ways. They can gain access to a network through phishing emails that target an organization’s employees, by hacking into patients’ remote medical devices or by going into a medical facility and finding vulnerable devices within the hospital.

WHAT’S THE IMPACT?

Hackers are taking advantage of a healthcare industry focused on COVID-19. “Hackers know that the healthcare industry is a mess right now in terms of cybersecurity and this gives them even more motivation to create more and more attacks,” Tshuva said. After a network has been compromised, the hacker’s purpose is revealed.

The main motive for hacking into a hospital is financial gain. Hackers make money by selling patients’ protected health information or by holding the network for ransom for upwards of millions of dollars.

Tshuva promotes medical devices with built-in security, since this can prevent breaches in real time, while alerting hospitals that their network has been compromised. “This can also help temporary hospitals because the devices already have built-in protection, so then all you need is better network protection,” Tshuva said.

THE LARGER TREND

In an attempt to curb future security breaches, NATO condemned these hackings in a statement released Wednesday. “These deplorable activities and attacks endanger the lives of our citizens at a time when these critical sectors are needed most, and jeopardize our ability to overcome the pandemic as quickly as possible,” NATO said. In addition to their objection to the attacks, NATO also said that it is ready to take action.

“Reaffirming NATO’s defensive mandate, we are determined to employ the full range of capabilities, including cyber, to deter, defend against and counter the full spectrum of cyber threats,” NATO said.

ON THE RECORD

“It’s best to think about security in advance because when you are in the middle of a crisis, it’s very hard to go back and implement security,” Tshuva said. “The best advice is to think about it as soon as possible and not only after you have a breach.”