Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Healthcare Organizations Must Consider The Financial Impact Of Ransomware Attacks
Newest First  |  Oldest First  |  Threaded View
ba956
50%
50%
ba956,
User Rank: Apprentice
4/13/2016 | 12:57:29 PM
Re: Healthcare Ransomware attacks
If we assume that a healthcare entity if offline for a calendar week, how many surgeries or other procedures were delayed, rescheduled, or transferred due to the absence of the supporting electrinic health record?

Who is liable when the patient's health is further compromised because they did not receive the proper procedure/care at the right time?  

Operating premise is that the healthcare entity pays the ransom, and gets the data back.   If the data modified and the patients health is compromised as a result of incorract/inaccurate information in their E.H.R, whos assume liability?    Who validates the integrity of the data following a recovery from the ransomware attack? 

Most hospitals have standby procedures which they fall back on during a major IT outage. Older physicians came of age in a pen & paper world and can generally switch back to paper based notes, orders, and patient records.  But younger Docs are generally clueless in this regard. They have always worked in the E.H.R and digital environment -they never had the pen & paper experience.  So thier success is dependent on regular training and drills.  

Some hospitals keep their standby procedures on the computer/network.  This makes for tough sledding when your off the network or down to minimal electrical power.  

 
Bronchae
50%
50%
Bronchae,
User Rank: Apprentice
4/8/2016 | 5:26:01 PM
Healthcare Organizations exposure to Ransomware
Very good point on Ransomware for Healthcare. I appreciate the updated true cost calculations. Your warning should be heeded or the number of real world examples will continue to increase.

 

Bronchae
LordC623
50%
50%
LordC623,
User Rank: Strategist
4/7/2016 | 5:50:59 PM
PR
You forgot to mention the public relations cost. 


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14905
PUBLISHED: 2020-03-31
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS co...
CVE-2020-11441
PUBLISHED: 2020-03-31
phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page.
CVE-2020-1712
PUBLISHED: 2020-03-31
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sen...
CVE-2019-10180
PUBLISHED: 2020-03-31
A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could...
CVE-2019-14880
PUBLISHED: 2020-03-31
A vulnerability was found in Moodle versions 3.7 before 3.7.3, 3.6 before 3.6.7, 3.5 before 3.5.9 and earlier. OAuth 2 providers who do not verify users' email address changes require additional verification during sign-up to reduce the risk of account compromise.