You are on page 1of 4

INNOVATIVE BUSINESS IDEAS

CYBERSECURITY IN
HEALTHCARE

Innovative business and


breakthrough technologies
ENG19CT0006
APEKSHA PRABHU

Why cybersecurity in healthcare is important?


In today's technological environment, cybersecurity in healthcare and data
protection are critical for companies to function normally. EHR systems, e-
prescribing systems, practise management support systems, clinical decision
support systems, radiology information systems, and computerised physician
order entry systems are all examples of specialised hospital information
systems used by many healthcare companies. In addition, the Internet of
Things' tens of thousands of devices must be safeguarded. Smart elevators,
intelligent heating, ventilation, and air conditioning (HVAC) systems, infusion
pumps, and remote patient monitoring devices are just a few examples.
In addition to the assets listed below, healthcare companies generally have the
following assets.
Email-Within healthcare companies, email is the major mode of
communication. Email systems are used to trade, produce, receive, send, and
retain various types of information. Individuals tend to store all kinds of
important information in their mailboxes, including intellectual property,
financial information, patient information, and so on. As a result, email security
is a critical component of healthcare cybersecurity.
Phishing is a major danger. Phishing is the source of the majority of major
security problems. Unwitting users may inadvertently infect their computers
with malware by clicking on a malicious link or opening a harmful attachment
within a phishing email. In certain cases, malware can propagate to other
machines through a computer network. The recipient of the phishing email
may be asked to provide sensitive or confidential information. Phishing emails
are very effective because they trick the receiver into doing something they
don't want to do, such as exposing sensitive or confidential information,
clicking on a harmful link, or opening a dangerous file. As a result, phishing
attacks must be thwarted through frequent security awareness training.
Physical access to a computer or device without authorization can lead to its
compromise. Physical approaches, for example, can be used to break into a
gadget. Technical controls that are in place may be bypassed if a device is
physically exploited. It is therefore critical to physically secure a device in order
to protect its functionality, correct setup, and data. Unauthorized physical
access to a computer or device can lead to its compromise. Physical methods,
for example, can be employed to get access to a device. If a device is physically
abused, any technical controls in place may be circumvented. Physically
securing a device is consequently important in order to preserve its
functioning, accurate configuration, and data.
Legacy Systems
The term "legacy system" refers to equipment that is no longer supported by
the manufacturer. Applications, operating systems, and other legacy systems
are examples of legacy systems. One issue with healthcare cybersecurity is that
many businesses have a large legacy system footprint. The downside of legacy
systems is that they are often no longer supported by the manufacturer, and as
a result, security patches and other upgrades are typically unavailable.
Organizations may have legacy systems because upgrading them is too
expensive or because an update is not available. Manufacturers of operating
systems may retire systems, and healthcare organisations may not have the
cybersecurity budgets to update to currently supported versions. Legacy
operating systems are common in medical equipment. There may also be
legacy operating systems to support legacy applications for which there is no
successor.
Risk Evaluations
Every cybersecurity programme in healthcare must start with a risk
assessment. Before taking any action to assist control the risk, it is necessary to
analyse the risk. Risk must be assessed based on criteria such as the likelihood
of occurrence, the impact on the organisation, and the risk's prioritisation.
Regular risk assessments, at least once a year, should be done or evaluated.

4 ways to improve cybersecurity in health care are to


Disallow the usage of same password on all system
keep your system updated
Training your staff for increasing cybersecurity
Implement high cybersecurity technologies

Conclusion:
Aligning cybersecurity and patient safety programmes will not only help your
company safeguard patient safety and privacy, but it will also assure the
continued effective delivery of high-quality treatment by preventing
interruptions that might negatively influence clinical outcomes. Also there are
lot of other benefits like reduced risk of medical errors, Improved patient
privacy protection, safer technology adoption, faster patient care, safer
operations of medical devices.

References:
https://www.himss.org/resources/cybersecurity-healthcare
https://www.cybersecurity-insiders.com/5-benefits-of-better-cybersecurity-
in-hospitals/
Picture credits: https://unsplash.com/s/photos/cybersecurity-in-healthcare

You might also like