Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
31
12:00 AM - EXPO.health
5
6
8
9
10
11
13
15
16
18
19
20
21
22
23
24
26
27
28
30
1
32nd Annual Summer Seminar in Health Care Ethics & Surgical Ethics
2019-07-29 - 2019-08-02    
All Day
32nd Annual Summer Seminar in Health Care Ethics & Surgical Ethics is organized by University of Washington School of Medicine (UWSOM) Continuing Medical Education (CME) [...]
3-Day Physician Assistant PANCE / PANRE Board Review Course by Certified Medical Educators (CME) - Salt Lake City
2019-07-29 - 2019-07-31    
All Day
3-Day Physician Assistant PANCE / PANRE Board Review Course is organized by Certified Medical Educators (CME) and will be held from Jul 29 - 31, [...]
Four Week Radiologic Pathology Correlation Course (Jul 29 - Aug 23, 2019)
2019-07-29 - 2019-08-23    
All Day
Four Week Radiologic Pathology Correlation Course is organized by American Institute for Radiologic Pathology (AIRP) and will be held from Jul 29 - Aug 23, [...]
Third Annual Philadelphia Trauma Training Conference
2019-07-30 - 2019-08-01    
All Day
Third Annual Philadelphia Trauma Training Conference is organized by Thomas Jefferson University (TJU) and will be held from Jul 30 - Aug 01, 2019 at [...]
IDAA Annual Meeting 2019
2019-07-31 - 2019-08-04    
All Day
International Doctors in Alcoholics Anonymous (IDAA) 70th Annual Meeting 2019 is organized by International Doctors in Alcoholics Anonymous (IDAA) and will be held from Jul [...]
EXPO.health
2019-07-31 - 2019-08-02    
All Day
EXPO.health Schedule July 31 - August 2, 2019 - Location: Boston, MA Join us at EXPO.health (Formerly Healthcare IT Expo – HITExpo) 2019 happening July [...]
01 Aug
2019-08-01 - 2019-08-03    
All Day
UCSF CME: Neurosurgery Update 2019 is organized by The University of California, San Francisco (UCSF) Office of Continuing Medical Education and will be held from [...]
PBI Medical Ethics & Professionalism (ME-22) - Irvine
2019-08-02 - 2019-08-03    
All Day
PBI Medical Ethics & Professionalism (ME-22) is organized by Professional Boundaries, Inc. (PBI) and will be held from Aug 02 - 03, 2019 at Wyndham [...]
The 8th Beijing International Top Health & Medical Exhibition (BIHM)
2019-08-02 - 2019-08-04    
All Day
The 8th Beijing International Private Health and Medical Exhibition will be held at the China International Exhibition Center from August 2nd to August 4th, 2019. [...]
Angiogenesis Gordon Research Seminar (GRS) 2019
2019-08-03 - 2019-08-04    
12:00 am
Angiogenesis Gordon Research Seminar (GRS) is organized by Gordon Research Conferences (GRC) and will be held from Aug 03 - 04, 2019 at Salve Regina [...]
Lung Development, Injury and Repair Gordon Research Seminar (GRS) 2019
2019-08-03 - 2019-08-04    
All Day
Lung Development, Injury and Repair Gordon Research Seminar (GRS) is organized by Gordon Research Conferences (GRC) and will be held from Aug 03 - 04, [...]
Platelet Rich Plasma for Aesthetics Course - Miami (Aug 2019)
Platelet Rich Plasma for Aesthetics Course is organized by Empire Medical Training (EMT), Inc and will be held on Aug 04, 2019 at GALLERYone - [...]
Physician Medical Weight Loss Training (Aug 04, 2019)
2019-08-04    
All Day
Physician Medical Weight Loss Training is organized by Empire Medical Training (EMT), Inc and will be held on Aug 04, 2019 at The Platinum Hotel [...]
Grand opening for Saint Alphonsus Regional Rehabilitation Hospital
2019-08-07    
4:00 pm - 6:00 pm
Grand opening for Saint Alphonsus Regional Rehabilitation Hospital 711 North Curtis Road | Boise, Idaho Aug 7, 2019 4:00 p.m. MDT A new home for Saint Alphonsus [...]
7th International Conference on  Medical Informatics & Telemedicine
2019-08-12 - 2019-08-13    
All Day
Conference Date : August 12-13, 2019 Rome, Italy Theme: Innovative information technologies for the improvement of patient care “7th International Conference on Medical Informatics and Telemedicine” will take [...]
CMBBE 2019 - 16th International Symposium on Computer Methods in Biomechanics and Biomedical Engineering and the 4th Conference on Imaging and Visualization
2019-08-14 - 2019-08-16    
8:00 am - 6:00 pm
CMBBE 2019 - 16th International Symposium on Computer Methods in Biomechanics and Biomedical Engineering and the 4th Conference on Imaging and Visualization is organized by [...]
Joint / Extremity / Non Spinal Injection Course (Aug 17, 2019)
2019-08-17    
All Day
Joint / Extremity / Non Spinal Injection Course is organized by Empire Medical Training (EMT), Inc and will be held on Aug 17, 2019 at [...]
Wilderness Medicine Expedition Course 2019
2019-08-25 - 2019-09-02    
All Day
Wilderness Medicine Expedition Course is organized by National Outdoor Leadership School (NOLS) and will be held from Aug 25 - Sep 02, 2019 at Wyss [...]
Diabetes, Lipidology, Pulmonary Medicine, and Critical Care Conference
2019-08-25 - 2019-09-01    
All Day
Diabetes, Lipidology, Pulmonary Medicine, and Critical Care Conference is organized by Continuing Education, Inc and will be held from Aug 25 - Sep 01, 2019 [...]
Neurology Certification Review 2019
2019-08-29 - 2019-09-03    
All Day
Neurology Certification Review is organized by The Osler Institute and will be held from Aug 29 - Sep 03, 2019 at Holiday Inn Chicago Oakbrook, [...]
Ophthalmology Lecture Review Course 2019
2019-08-31 - 2019-09-05    
All Day
Ophthalmology Lecture Review Course is organized by The Osler Institute and will be held from Aug 31 - Sep 05, 2019 at Holiday Inn Chicago [...]
Emergency Medicine, Sex and Gender Based Medicine, Risk Management/Legal Medicine, and Physician Wellness
2019-09-01 - 2019-09-08    
All Day
Emergency Medicine, Sex and Gender Based Medicine, Risk Management/Legal Medicine, and Physician Wellness is organized by Continuing Education, Inc and will be held from Sep [...]
Events on 2019-07-30
Events on 2019-07-31
IDAA Annual Meeting 2019
31 Jul 19
Knoxville
EXPO.health
31 Jul 19
Boston
Events on 2019-08-01
01 Aug
Events on 2019-08-29
Events on 2019-08-31
Latest News

Temporary hospitals are rife with cybersecurity vulnerabilities

Temporary hospitals are rife with cybersecurity vulnerabilities

The COVID-19 outbreak has led to a series of rapidly established medical-treatment units the world over, which will be utilizing remote-care devices that lack proper protection. The situation gives hackers more opportunities to perpetrate attacks. They could also infiltrate these devices to steal a patient’s personal health information, causing complications for both the users of these devices and the healthcare providers themselves.

Temporary medical units carry a unique set of vulnerabilities due to the fact they are remote and sit outside of a defense-in-depth architecture. Because of the very nature of their purpose – to care for patients in a time of crisis – IT security is naturally lower on the priority list.

“They are being set up quite quickly with constrained budgets, and the budget for those is not on IT, it’s on PPE, patient care, getting testing set up, everything a center should be focused on during this crisis,” Tom Burt, corporate vice president of Microsoft Customer Security & Trust, told Healthcare IT News.

He explained that some immediate steps healthcare organizations can take include making sure software is updated and fully patched – what Burt calls the “number one hygiene” measure they can do to make sure they are resilient – as well as enabling two-factor authentication for every account that has access to the pop-up center’s system.

Because ransomware and phishing attacks are the most common types of cyberattacks on healthcare systems, Burt also recommends ensuring the system is backed up offline, and going through practice exercises.

“If you are a victim of ransomware, you want to make sure you get your system back up and running as quickly as possible so you don’t have to pay the criminals to get your data back,” he said.

While he noted the transmission of the data from a temporary facility to a home facility like the CDC or WHO is not particularly vulnerable, what he has seen is state actors looking for the most vulnerable point in a communications network.

Those state actors may focus on those temporary facilities as vulnerable points, and if they can successfully infect that facility, they can use that control over a device to further communicate with another organization.

“That communication would then appear to be legitimately coming from the pop-up facility, and it’s easier to get the recipient to click on the link and get themselves infected,” he said.

To that end, Microsoft recently expanded the availability of its AccountGuard security service program to help healthcare organizations defend themselves against cyberattacks from nation states.

The company has also rolled out a series of services to help bolster security during the outbreak, including advisories on protection from COVID-19-related phishing attacks.

Administrators already fight on a daily basis to patch, upgrade and maintain physical systems within predefined facilities, and these systems are available 24/7, 365 days a year, which means there is a constant routine to maintain security hygiene.

“On the other hand, temporary medical units are impossible to maintain for the reason they are not often employed,” Travis Volk, technical vice president at Radware, explained. “Because these weaker networks are also connected to broader medical organizations, it increases the potential entry points for hackers seeking to infiltrate a hospital.”

He noted it’s also true that using wireless connectivity opens a localized opportunity for hackers to monitor traffic over air and increase the odds of identifying legitimate credentials to simplify their access.

Natali Tshuva, CEO and cofounder of IoT cybersecurity company Sternum, said it’s the rapid deployment of these temporary medical units that concerns her the most.

“Because we are establishing these units so quickly, there simply is not enough time to build the proper IT infrastructure to protect the overall network, either via an effective firewall or through other cybersecurity measures,” she said.

Furthermore, the vast majority of these temporary medical units will be highly dependent on connected medical devices due to the demands of remote care, monitoring devices and infrastructure like smart beds.

These medical IoT devices rarely have any embedded security and remain particularly vulnerable, Tshuva noted, and pointed out healthcare organizations came into this pandemic facing an uphill struggle.

Now, as they must establish these temporary medical centers to battle the consequences of the pandemic, the cybersecurity risks are further heightened.

“If we were not in the midst of a pandemic, defense measures established by broader medical organizations would have more of a fighting chance to stop malicious parties from being able to initiate attacks against medical devices within hospitals, as these devices would be in a controlled environment,” she explained. “But these temporary medical units leave the connected medical environment more exposed than ever before.”

Caleb Barlow, CEO of cybersecurity firm CynergisTek, pointed out that in addition to temporary facilities, there are now hundreds of thousands of remote-healthcare workers who are not working directly with patients but have access to providers, patient data, and financial data, and are on the same email system.

“Gaining access to the remote worker is one thing, but now using that access to get into the hospital’s resources creates a situation that, frankly, no provider was prepared for,” he said.

“Added to the quick deployment in less than ideal circumstances, you now have users who have most likely not been fully trained on new devices, new networks and a new set of login credentials in many cases.”

Barlow explained that in a remote medical facility, when a physician is accessing the electronic healthcare records, the endpoint and the network are totally unknown.

In many cases, these remote facilities are in stadiums or convention centers running on the network in that location, which likely lacks the network-security provisions that one would normally expect.

“The endpoint is also unknown, and might be a shared computer, personal workstation or a rented laptop,” he said. “The only layer of security left are the access credentials and, simply put, if the bad guy has those, then they are likely inside the EHR.”