You are on page 1of 14

NCM 32 (LAB) A1 LESSON 1 NOTES

(Notes From Video Source) ➢ It also includes those systems that


handle data related to the activities
I. What is Nursing Informatics? of providers and health
organizations.
Nursing Informatics ➢ As an integrated effort, these may be
➢ It takes nursing science and leveraged to improve patient
analytical and information sciences outcomes, inform research, and
and and combines them all together influence policy-making and
➢ It puts together a framework for how decision-making.
we support patient care at the ➢ Because health information systems
bedside and how we can support commonly access, process, or
nurses and in their daily work maintain large volumes of sensitive
➢ Nursing informaticists are weaved data, security is a primary concern.
into healthcare systems and a variety
of different roles Examples of HIS:
➢ Electronic Medical Record (EMR)
Some Examples: and Electronic Health Record (EHR)
➢ Electronic medical records ○ It replaces the paper version
○ involved at looking at how of a patient’s medical history.
the documentation supports ○ It includes more health data,
nursing practice at the test results, and treatments.
bedside how it aligns with It also is designed to share
policy what the implications data with other electronic
are for workflow reporting health records so other
➢ Virtual Care healthcare providers can
access a patient’s healthcare
II. Nursing Informatics Jobs data.
➢ Practice Management Software
➢ Clinical Informaticist ○ It helps healthcare providers
➢ Nursing Informaticist manage daily operations such
➢ Healthcare Informaticist as scheduling and billing
➢ ETC ➢ Master Patient Index (MPI)
○ It connects separate patient
III. Impact on Patient Outcomes records across databases.
IV. Certification ➢ Patient Portals
○ It allows patients to access
Lesson 1: Understanding Health their personal health data
Informatics such as appointment
information, medications
I. Concepts, Components, & and lab results over an
Frameworks internet connection
➢ Remote Patient Monitoring (RPM)
Health Information System (HIS) ○ It allows medical sensors to
➢ A system designed to manage send patient data to
healthcare data. healthcare professionals
➢ This includes systems that collect, ➢ Clinical Decision Support (CDS)
store, manage and transmit a ○ It analyzes data from various
patient’s electronic medical record clinical and administrative
(EMR), a hospital’s operational systems to help healthcare
management or a system supporting providers make clinical
healthcare policy decisions. decisions.

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

needed for the planning,


Understanding Health Information implementation, and evaluation of
Systems public health practice. Such
surveillance can:
I. Concepts, Components, and ○ serve as an early warning
Frameworks system for impending public
health emergencies;
A. Concepts ○ document the impact of an
Health Information Systems intervention, or track
➢ any system that captures, stores, progress towards specific
manages or transmits information goals; and
related to the health of individuals or ○ monitor and clarify the
the activities of organizations that epidemiology of health
work within the health sector problems, to allow priorities
➢ incorporates things such as to be set and to inform public
○ district level routine health policy and strategies.
information systems,
○ disease surveillance systems, Laboratory Information Systems (LIS)
and ➢ computer software that processes,
○ also includes laboratory stores and manages data from all
information systems, stages of medical processes and
○ hospital patient tests.
administration systems ➢ A laboratory information system
(PAS) and (LIS) is a computer system that
○ human resource helps to manage many aspects of a
management information medical laboratory, including
systems (HRMIS). inputting, processing, and storing
the information and data of a lab.
Routine Health Information Systems For example, when Larry went to the
(RHIS) medical laboratory to get his blood
➢ comprise data collected at regular drawn and analyzed, the LIS helped
intervals at public, private, and to manage all the information that
community-level health facilities and related to his visit. This information
institutions. The data give a picture included:
of health status, health services, and ○ The date of his visit
health resources. ○ His primary care physician
➢ Most of the data are gathered by ○ Pertinent patient information
healthcare providers as they go and demographics
about their work, by supervisors, ○ The type of sample that was
and through routine health facility drawn
surveys. The sources of those data ○ Physician test orders
are generally individual health ○ Who got billed for his visit
records, records of services ○ When the test results were
delivered, and records of health sent to his physician
resources.
Patient Administration System (often
Surveillance Systems Public health abbreviated to PAS)
surveillance ➢ developed out of the automation of
➢ the continuous, systematic administrative paperwork in
collection, analysis and healthcare organizations,
interpretation of health-related data particularly hospitals, and are one of

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

the core components of a hospital's


IT infrastructure. The PAS records
the patient's demographics (e.g.
name, home address, date of birth)
and details all patient contact with
the hospital, both outpatient and
inpatient.

Health Information Systems


➢ An integrated effort to collect,
process, report and use health
information and knowledge.
➢ Decision-making at:
○ all levels of a health system
requires reliable health
statistics that are
disaggregated by sex, age and
socioeconomic
characteristics.
➢ policy level, decisions
informed by evidence
contribute to more efficient
resource allocation
1. Health Information Systems
➢ delivery level, information
Resources
about the quality and
➢ These include the legislative,
effectiveness of services can
regulatory and planning frameworks
contribute to better outcomes
required for a fully functioning
health information system, and the
★ Overall, a well-functioning HIS is an
resources that are required for such
integrated effort to collect, process,
a system to be functional. Such
report and use health information
resources involve personnel,
and knowledge to influence policy
financing, logistics support,
and decision making, programme
information and communications
action, individual and public health
technology (ICT), and coordinating
outcomes, and research.
mechanisms within and between the
★ Sound decision-making at all levels
six components
of a health system requires reliable
health statistics that are
2. Indicators
disaggregated by sex, age and
➢ A core set of indicators and related
socioeconomic characteristics.
targets is the basis for a health
★ At a policy level, decisions informed
information system plan and
by evidence contribute to more
strategy. Indicators need to
efficient resource allocation and, at
encompass determinants of health;
the delivery level, information about
health system inputs, outputs and
the quality and effectiveness of
outcomes; and health status
services can contribute to better
outcomes.
3. Data Sources
➢ These can be divided into two main
B. Components and Framework
categories;

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

○ (1) population-based ➢ Decreased physical exertion


approaches (censuses, civil ➢ Increased productivity
registration and population
surveys) Digital and mobile technologies are
○ (2) institution-based data bringing huge benefits to the healthcare
(individual records, service sector. By embracing these new
records and resource technologies, healthcare organizations can
records). improve patient health outcomes, be
➢ A number of data-collection cost-effective, and provide timely care.
approaches and sources do not fit Patients will also be able to better manage
into either of the above main and control their health and medical
categories but can provide important information.
information that may not be
available elsewhere. These include This shows that technology can help
occasional health surveys, research, ensure a brighter, healthier future for
and information produced by everyone.
community based organizations.
A. Medical Apps
4. Data Management ➢ Necessity of daily life and may be the
➢ This covers all aspects of data most popular mHealth device
handling from collection, storage, ➢ Example: diabetic patients using
quality-assurance and flow, to mobile apps to enter their glucose
processing, compilation and readings, diet and exercise data that
analysis. is sent remotely to their physician
for review and a message is sent
5. Information Products back to the patient with feedback
➢ Data must be transformed into
information that will become the B. Wearable Healthcare
basis for evidence and knowledge to Technology (Healthcare IoMT)
shape health action. ➢ One of the hottest technology trends
in healthcare is the IoT
6. Dissemination and Use ➢ Medical companies develop new
➢ The value of health information is products:
enhanced by making it readily ○ Smart contact lenses\smart
accessible to decision-makers and by medical apparel
providing incentives for, or ○ Neurological devices
otherwise facilitating, information ○ Monitoring skin patches
use.
➢ Uses of IoMT:
II. Emerging Trends and ○ Asset Tracking
Applications ○ Drug management: “Digital
Pill”
What is the importance of technology in ○ Smart Biosensors - monitor
nursing practice? vital signs and other health
conditions
Technology in Nursing has many benefits:
➢ Faster Communication ➢ Example:
➢ Efficient Charting ○ FitBit - to track fitness
➢ Increased Patient Safety activities, blood pressure,
➢ Faster Lab Results and Improved sleep patterns and calories
Scheduling

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

C. Big Data and Artificial ➢ The surgeon has to control the robot,
Intelligence software minimizes the minute
➢ In Big Data errors that any surgeon can make
○ tying in patient data to health ➢ Benefits:
insurance providers to ○ Greater precision
encourage patients to take ○ Shorter hospitalization
ownership of their healthcare ○ Smaller incisions
needs ○ Reduced pain and discomfort
➢ Uses of AI in healthcare include
○ Supporting clinical III. Privacy, Security, and Ethical Use
decision-making of ICT
○ Identifying patient health
risk factors in advance A. Computer Security Risks
○ Support diagnostics ➢ any event or action that could
cause a loss of or damage to
D. Privacy and Data Security computer hardware,
➢ Data from clinical and non-clinical software, data, information,
sources will need to be protected as or processing capability.
it is being shared across platforms to
unlock new opportunities in health A cybercrime is an online or Internet-based
service innovation illegal act
➢ Blockchain may be implemented for
privacy and security Computer Security Risks
○ Currently the hottest trend 1. Hacker
that is widely expected to ➢ Any skilled computer expert
revolutionize data security that uses their technical
across industry sectors knowledge to overcome a
○ The fundamental building problem
block that facilitates the use 2. Cracker
of AI and Big Data solutions ➢ One who breaks into or
in healthcare otherwise violates the system
integrity of remote machines
with malicious intent
E. VR and 3D Printing
➢ 3D printing of tissues could bring a 3. Script kiddie
revolution in transplantation ➢ A person who uses existing
➢ Augmented and virtual reality computer scripts or code to
○ integrate deeper into medical hack into computers, lacking
education the expertise to write their
○ Enhance the learning own.
experience (anatomy, 4. Corporate espionage
surgical procedures) ➢ The improper or unlawful
theft of trade secrets or other
F. Medical Robots knowledge proprietary to a
➢ Assists surgeons competitor for the purpose of
➢ Made up of cameras and articulated achieving a competitive
robotic arms advantage in the marketplace
➢ Specialized video cameras peer into 5. Cyberextortion
the area of the body being operated ➢ A form of online crime which
upon occurs when a person uses
the Internet to demand

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

money or other goods or ➢ A malicious program that


behavior (such as sex), from hides within or looks like a
another person by legitimate program
threatening to inflict harm to
his person, his reputation, or 4. Rootkit
his property. ➢ Program that hides in a
6. Cyberterrorism computer and allows
➢ Any "premeditated, someone from a remote
politically motivated attack location to take full control
against information,
computer systems, computer An infected computer has one or more of
programs, and data which the following symptoms:
results in violence against ➢ Operating system runs much slower
noncombatant targets by than usual
sub-national groups or ➢ Available memory is less than
clandestine agents." expected
➢ Files become corrupted
➢ Screen displays unusual message or
image
➢ Music or unusual sound plays
randomly
➢ Existing programs and files
disappear
➢ Programs or files do not work
properly
➢ Unknown programs or files
mysteriously appear
B. Internet and Network Attacks ➢ System properties change
➢ Information transmitted over ➢ Operating system does not start up
networks has a higher degree ➢ Operating system shuts down
of security risk than unexpectedly
information kept on an
organization’s premises A firewall is hardware and/or software that
➢ An online security service is a protects a network’s resources from
Web site that evaluates your intrusion.
computer to check for
Internet and e-mail Intrusion Detection Software
vulnerabilities. ➢ Analyzes all network traffic
➢ Assesses system vulnerabilities
1. Computer Virus ➢ Identifies any unauthorized
➢ Affects a computer negatively intrusions
by altering the way the ➢ Notifies network administrations of
computer works. suspicious behavior patterns or
security breaches
2. Worm Honeypot
➢ Copies itself repeatedly, ➢ Vulnerable computer that is set up to
using up resources and entice an intruder to break into it
possibly shutting down the
computer or network C. Unauthorized Access and Use

3. Trojan Horse Unauthorized Access

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

➢ The use of the computer or network ○ Electrical power problems


without permission ➢ Noise, undervoltages, and
Unauthorized Use overvoltages
➢ The use of a computer or its data for ○ Errors in computer programs
unapproved or possibly illegal
activities Two ways to protect from system failures
caused by electrical power variations
A possessed object is any item that you must include surge protectors and
carry to gain access to a computer or uninterruptible power supplies (UPS)
computer facility
➢ Often are used in combination with a H. Health Concerns of Computer
personal identification number Use
(PIN) ➢ The widespread use of computers
has led to health concerns
A biometric device authenticates a person’s ○ Repetitive strain injury (RSI)
identity by translating a personal ○ Carpal tunnel syndrome
characteristic into a digital code that is (CTS)
compared with a digital code in a computer. ○ Computer vision syndrome
(CVS)

D. Hardware Theft and Vandalism Hand Exercises


➢ Spread fingers a[art for several
Hardware Theft seconds while keeping wrists
➢ Act of stealing computer equipment straight
Hardware Vandalism ➢ Gently push back fingers and then
➢ Act of defacing or destroying thumb
computer equipment ➢ Dangle arms loosely at slides and
then shake arms and hands
E. Software Theft
➢ Steals software media Techniques to Ease Eye Strain
➢ Internationally erases programs ➢ Every 10 to 15 minutes, take an eye
➢ Illegally copies a program break
➢ Illegally registers and/or activates a ○ Look into the distance and
program focus on an object for 20 to
30 seconds
F. Information Theft ○ Roll your eyes in a complete
➢ Information theft occurs when circle
someone steals personal or ○ Close your eyes and rest
confidential information them for at least one minute
➢ Encryption is a process of ➢ Blink your eyes every five seconds
converting readable data into ➢ Place your display device about an
unreadable characters to prevent arm’s length away from your eyes
unauthorized access with the top of the screen at eye level
or below
G. System Failure ➢ Use larger fonts
➢ A system failure is the prolonged ➢ If you wear glasses, ask your doctor
malfunction of a computer about computer glasses
➢ A variety of factors can lead to ➢ Adjust the lighting
system failure, including:
○ Aging hardware –Natural
disasters

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

Ergonomics is an applied science devoted to 8. Employees may not use others’


incorporating comfort, efficiency, and safety intellectual property as their own
into the design of items in the workplace. 9. Employees shall consider the social
impact of programs and systems
Computer addiction they design
➢ Occurs when the computer 10. Employees always should use
consumes someone’s entire social computers in a way that
life demonstrates consideration and
➢ Symptoms of users include: respect for fellow humans
○ Craves computer time
○ Overjoy hen at the computer Green computing involves reducing the
○ Unable to stop computer electricity and environmental waste while
activity using a computer.
○ Irritable when not at the
computer Green Computer Suggestions
○ Neglects family and friends 1. Use computers and devices that
○ Problems at work or school comply with the ENERGY STAR
program
I. Ethics and Society 2. Do not leave the computer running
➢ Computer ethics are the moral overnight
guidelines that govern the use of 3. Turn off the monitor, printer, and
computers and information systems other devices when not in use
➢ Information accuracy is a concern 4. Use LCD monitors instead CRT
○ Not all information on the monitors
Web is correct 5. Use paperless methods to
communicate
Intellectual property rights 6. Recycle paper
➢ The rights to which creators are 7. Buy recycled paper
entitled for their work 8. Recycle toner cartridges
○ A copyright protects any 9. Recycle old computer, printer, and
tangible form of expression other devices
➢ An IT code of conduct is a written 10. Telecommunicate to save gas
guideline that helps determine 11. Use video conferencing and VoIP for
whether a specific computer action is meetings
ethical or unethical
➢ Information privacy refers to the
IT Code of Conduct right of individuals and companies
1. Computers may not be used to harm to deny or restrict the collection and
other people use of information about them
2. Employees may not interfere ith ➢ Huge databases store data online
others’ computer work ➢ It is important to safeguard your
3. Employees may not meddle in information
others’ computer flies
4. Computers may not be used to steal How to Safeguard Personal Information
5. Computers may not be used to bear 1. Fill in only necessary information on
false witness rebate, warranty, and registration
6. Employees may not copy or use forms
software illegally 2. Do not preprint your telephone
7. Employees may not use others; number or Social Security number
computer resources without on personal checks
authorization

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

3. Have an unlisted or unpublished WebSecure or through an


telephone number anonymous Website such as
4. If Called ID is available in your area, Anonymizer.com
find out how to block your number
from displaying on the receiver’s ➢ A cookie is a small text file that a
system Web server stores on your computer
5. Do not write your telephone number ➢ Web sites use cookies for a variety of
or charge credit receipts reasons:
6. Ask merchants not to write credit ○ Allow for personalization
card numbers, telephone numbers, ○ Store users’ passwords
Social Security numbers, and ○ Assist with online shopping
driver’s license numbers on the back ○ Track how often users visit a
of your personal checks site
7. Purchase goods with cash, rather ○ Target advertisements
than credit or checks
8. Avoid shopping club and buyer cards How do Cookies Work?
9. If merchants ask personal questions, 1. When you type the Web address of a
find out why they want to know Website in a browser window, the
before releasing information browser program searches your hard
10. Inform merchants that you do not disk for a cookie associated with the
ant them to distribute your personal website.
information 2. If the browser finds a cookie, it sends
11. Request, in writing, to be removed information in the cookie file to the
from mailing lists website.
12. Obtain your credit report once a year 3. If the website does not receive cookie
from each of the three major credit information, and is expecting it, the
reporting agencies (Equifax, site creates an identification number
Experan, and TranUnion) and for you in its database and sends
correct any errors that number to your browser. The
13. Request a free copy of your medical browser in turn creates a cookie file
records once a year from the Medical based on that number and stores the
Information Bureau cookie file on your hard disk. The
14. Limit the amount of information you website now can update information
provide to websites. Fill in only in the cookie file whenever you
required information access the site.
15. Install a cookie manager to filter
cookies ➢ Spam is an unsolicited e-mail
16. Clear your history file when you are message or newsgroup posting
finished browsing ➢ Phishing is a scam in which a
17. Set up a free email address for perpetrator sends an official looking
merchant forms e-mail message that attempts to
18. Turn off file and printer sharing on obtain your personal and financial
your internet connection information
19. Install personal firewall ➢ Pharming is a scam where a
20. Sign up for free email filtering perpetrator attempts to obtain your
through your Internet access personal and financial information
provider or use an anti-spam via spoofing
program such as Brightmail
21. Do not reply to spam for any reason —--------------------------------------------------
22. Surf the web anonymously oth a Other Supplemental Resources
program such as Freedom

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

I. Knowing the benefits of electronic more than 20,000 in Q3, a growth


health information systems for rate of 45 percent.1
clinicians (3-minute YouTube video) ➢ In 2020, healthcare organizations
remained a target. In April, the
II. Digital Citizenship (45-minute international law enforcement
YouTube video) agency Interpol warned that, amidst
the broader global pandemic,
hackers were targeting healthcare
III. What cyber criminals want from systems with ransomware. The
your healthcare organization agency’s warning came just days
after Microsoft told several dozen
Introduction hospitals that their gateway and VPN
appliances were vulnerable to
Cybercriminals target the medical industry attacks.
for a gold mine of personal and financial ➢ For healthcare organizations to
data. effectively implement security
➢ As 21st century health records have measures unique to their
moved from paper to digital and as environment, they must first
the healthcare infrastructure understand why cybercriminals are
handling smart medical devices and trying to breach their networks. This
network-connected systems has paper identifies the top four
become increasingly complex, healthcare targets for cybercriminals
cybercriminals have taken note. and the impact of their compromise
Unfortunately, while the personally on medical staff, patients, and daily
identifiable information (PII) stored operations.
on endpoints is valuable to patients,
physicians, and healthcare Top 4 Healthcare Targets for
providers, it’s also highly sought Cybercriminals
after by cybercriminals. 1. Patient PII
➢ Unlike stolen credit cards, electronic 2. Operations, systems and files for
patient records contain PII that ransom
never expires, which can be 3. Technology providers, vendors and
repeatedly used for malicious intent. suppliers
With stolen PII, criminals can falsify 4. Broad attack surface
insurance claims and tax returns,
obtain fraudulent credit cards, open A. Patient PII
bank accounts to write bad checks,
and obtain government-issued ➢ While some healthcare organizations
passports to create new identities. have opted to house pertinent
The opportunities are endless. patient and medical data they keep
➢ Every day, the medical sector is on record in the cloud, many choose
exposed to cyberthreats like Trojans, to store theirs locally. Per patient,
ransomware, insider threats, and they store a wide range of PII that’s
other forms of malware—with the valuable to a criminal to orchestrate
most disruptive coming from identity theft, such as name, date of
information stealing Trojans and birth, home address, email address,
ransomware attacks. Threat and Social Security number (SSN).
detections have increased from ➢ Then there’s the wealth of electronic
about 14,000 healthcare-facing protected health information (ePHI)
endpoint detections in Q2 2019 to that the medical sector stores on
each patient, including health

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

records, images from medical exams, B. Operations, systems, and files for
blood tests and other test results, as ransom
well as diagnosis and treatment
information. Combined with stolen ➢ The healthcare sector is an essential
PII, when bad actors gain access to critical infrastructure entity that
patient records, they have, in must remain operational
essence, a goldmine to commit around-the-clock to serve the local
insurance fraud. community and surrounding region.
➢ Cybercriminals can sell information This makes ransomware attacks
deemed valuable either individually especially dangerous to the
or as a data set, which underground healthcare industry with the risk of
criminals refer to as “fullz”—a selling causing significant financial,
jargon that means the full identity reputational, health, and safety
package of a person. Patient data is harm. Ransomware attacks usually
highly sought after by deny access to the healthcare
cybercriminals. In fact, healthcare organization’s systems and files until
records fetch a high price with a ransom is paid. And in the event it
individual records commanding isn’t paid, some attackers may
$1,000 on the dark web. threaten to sell the “captured” PII on
➢ That’s a lot of financial profit for the black market.
cybercriminals, and, unfortunately, ➢ Ransomware accounts for most
stolen records come at a steep cost healthcare malware attacks. And
for the medical sector. Healthcare when they hit, they cripple
organizations have the highest operations. Life Saving surgeries
industry costs associated with data must be postponed, appointments
breaches at $6.45 million—65 canceled, and medical tests halted.
percent higher than the global It’s safe to say that the consequences
average of all industries. Healthcare of ransomware for the healthcare
costs rank well above other industry far outweigh any other
industries because the sector organization, as essential devices,
experiences an average total cost per systems, and files are locked out.
stolen record of $429, which is
significantly higher than less
regulated industries. Impact of ransomware on healthcare
➢ Even with lives on the line,
Impact of PII theft on patients and staff cybercriminals are not showing any
➢ A cybercriminal owning a single data signs of mercy with their
set on a patient or a staff member ransomware attacks on the medical
working in a healthcare organization sector. According to analysis by
can fully take over their identities by Coveware, not only did the average
posing as them when dealing with ransomware demand rise 184
governments and private percent to $36,295, but the
institutions, whether that’s for tax healthcare industry accounted for
purposes or taking out a loan. 13.6 percent of ransomware targets.5
➢ They can also mix up or combine In addition to the cost of paying the
certain data to create a new identity ransom (if the organization makes
profile. These new profiles are called that decision), impacted
“synthetic identities,” which is the organizations must notify patients of
fastest growing financial crime. the data breach and inform them
that their information may have
been exposed.

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

➢ And, what better way to publish patient records


demonstrate the impact online.
ransomware has on healthcare
operations than to share some
examples that occurred in 2019 and C. Technology Providers, Vendors, and
2020? Third-party Suppliers
○ All three DCH Health System ➢ Weak security of third-party vendors
hospitals in Alabama were in the supply chain was revealed as a
temporarily closed to new new threat vector after
patients following a targeted cybercriminals breached Target
ransomware attack. through one of their refrigeration
○ The Cancer Center of Hawaii contractors. Unfortunately,
temporarily suspended healthcare organizations are not
cancer radiation treatments immune to supply chain attacks.
at two centers due to a Such attacks happen against medical
ransomware attack. centers through unsecured medical
○ Wood Ranch Medical went technology applications, vendors,
out of business after a and other suppliers.
ransomware attack caused ➢ In some cases, threat actors target
the health provider to lose all third parties as a means to an end,
access to their patients’ looking for a less secure, easier entry
medical records. into healthcare networks. For
○ Campbell County Health example, cybercriminals might first
suspended new inpatient compromise a third-party and lay
admissions and canceled dormant on their network, pouncing
some surgeries following a at the first opportunity to grab login
ransomware attack. credentials to the healthcare
○ Seneca Nation Health System network.
as well as Olean Medical ➢ In well-coordinated attacks,
Group lost access to their criminals lodge social engineering
computer and EHR systems attacks against healthcare personnel
following a ransomware pretending to be an authorized
attack on both of the vendor with the intent to redirect
healthcare organizations. huge sums of money from vendor
○ Brookside ENT & Hearing accounts to their own.
Services in Michigan closed ➢ On the other hand, cybercriminals
the medical practice after a also target vendors directly, knowing
successful ransomware that they, too, store patient
attack deleted every medical information. This is especially true
record, bill, and of medtech companies that provide
appointment, including the medical management apps that
backups. patients download on their mobile
○ University of Arkansas for devices or access on their home
Medical Sciences shut down computers. While the security of
its information network after medical management apps is
detecting a “malware virus.” managed by third parties, the apps
○ Hammersmith Medicines must interface and communicate
Research rebuffed a with the overall security
ransomware attack in real infrastructure of their associated
time, but the threat actors healthcare organization. In addition,
managed to swipe and the presence of advertising or

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

analytics trackers increases medtech systems, the healthcare


processing time, which could sector has a unique cybersecurity
increase the app’s vulnerability to challenge. Digital expansion of PHI
breach. and a variety of healthcare devices
create a broad attack surface with
Impact of vendor compromise on healthcare potential gaps in security controls
➢ In scenarios where healthcare and processes that create
technology providers, vendors, and opportunities for cyber criminals to
third-party suppliers are breached target the PHI stored on these
for patient data, the healthcare devices.
organizations, themselves, are not ➢ At the heart of the issue: many of
liable to pay any post-breach costs. these systems were not designed
Sadly, the result is still the theft and with security in mind. As noted by
sale of data about patients in Yarmela Pavlovic, legal expert who
underground markets on the dark advises digital health and mobile
web with the risk of identity theft health tech companies, “… there are
and account takeovers becoming a lot of companies grappling with
high. legacy products and trying to
➢ In addition, medical organizations, implement cybersecurity controls
already on tight budgets, might need based on more modern technology
to come up with additional funds to for products where those concerns
pay the real vendors if criminals were not part of the original design
stole from vendor accounts. Finally, and development.”
patients connecting to compromised
medical technology platforms from Impact of broad attack surface on
home can endanger their home healthcare organizations and patients
networks and infect additional ➢ Medical IoT devices offer new ways
devices. to monitor patients and equipment
while improving care,
D. Broad Attack Surface responsiveness, and lowering costs.
➢ The infrastructure of But this broadens the attack surface
network-connected devices inside with unknown security protections.
healthcare organizations is Connected medical devices—from
incredibly complex. In addition to WiFi enabled infusion pumps to
multiple users with access to patient smart MRI machines—increase the
healthcare information (PHI), attack surface of devices sharing
healthcare organizations use a wide information and create security
variety of devices in their IT concerns, including device
ecosystems, such as central servers, tampering, PII risks, and potential
desktops, mobile devices, MRI regulatory violations.
machines, radiology equipment, ➢ For example, in July 2019 it was
PACs medical imaging files, and discovered that MiniMed Insulin
other equipment. Often, these Pumps had a cybersecurity
systems are running old operating vulnerability that could allow a
systems and legacy software. And hacker to wirelessly connect to other
these devices can all connect to the devices within range and change the
same network and central databases pump’s settings. As a result, the FDA
with little knowledge of device issued a Class 1 recall (the most
security. serious type of recall) on several
➢ With a combination of legacy product models that had been in
systems and new, innovative

Prepared by: Rigo Gray Marshall K. Kirit


NCM 32 (LAB) A1 LESSON 1 NOTES

distribution to healthcare patients 3. Republic Act - 8792 (E-Commerce Act of


since 1999. 2000
➢ Cybercriminals will, no doubt, 4. Republic Act - 11293 (Philippine
continue to focus their targets on a Innovation Act)
large number of endpoints that are 5. Republic Act - 10844 (Department of
less secure than traditional Information And Communications
enterprises who are comparatively Technology Act of 2015)
more invested in security that boast
the same numbers. They find it a lot
easier and more lucrative at the V. Blockchain in Healthcare (2-minute
same time. YouTube video)

Conclusion

When it comes to making a buck out


of stolen information, cybercriminals have
always targeted vulnerable systems and
people, whether it’s local government
bodies, schools, nonprofits, or individuals
who are not technically savvy.
Cybercriminals don’t discriminate. And
unfortunately, the healthcare sector remains
a highly attractive target.

It is important for healthcare


executive boards and IT professionals to be
reminded that they have a fiduciary
responsibility to ensure that patient and
staff PII, including financial information,
are protected; healthcare ecosystems run as
normal; and operational hours are
continuous. Fortunately, there are several
tactics they can take to fulfill these.
Because cybercriminals have
adopted a multivector offensive
technique—a mixture of malware, social
engineering, and hacking— implementing a
multi-vector defensive stance to protect
endpoints is the next logical step. This is
done by combining good security hygiene
practices and technologies that provide
layered protection and detection.

IV. IT-related Laws in the Philippines

1. Republic Act - 10173 (Data Privacy Act of


2012)
2. Republic Act - 10175 (Cybercrime
Prevention Act of 2012)

Prepared by: Rigo Gray Marshall K. Kirit

You might also like