How to Secure Medical Data from Virus Attacks
Hollywood Presbyterian Medical Center paid a $17,000 buyout in bitcoin to hackers who captured control of the hospital's computer systems and would give back access only when the money was paid, the hospital's chief executive said in February.
The recent victim, Methodist Hospital in Henderson, Kentucky is an acute care facility. To fight the infection, the hospital had to turn off all computers in the network. The administration of the hospital is cooperating with the FBI and checking every device for virus. May be some data can be recovered from backups. Unlike the previous hospital attack, the buyout that was asked for was only $1,600. Nevertheless, Methodist Hospital officials say that money will be paid only if it comes to the worst.
Hospitals attacks are still comparatively occasional. But cyber attacks on hospitals have become more spread in past years as hackers pursue personal data they can use for fraud schemes. So how hospitals can secure the data from such attacks?
This question is always at the forefront. The best way to minimize security risks is to require designers and architects to build security into their EHR and EMR systems as a core design requirement. Technology requirements should include new security capabilities that prevent hackers from conducting analysis of medical software. In addition, healthcare software should have continuous modification detection capabilities.
According to EMC’s recent Digital Universe report, up to 90% of digital healthcare information such as claims requests, PHI, and EMRs require additional protection. Healthcare companies continue to ignore the dangers of the digital environment they occupy, evidenced by the fact that only 57% of data receives adequate protection; that means 43% of data is insufficiently secured. The main task for IT specialists in the healthcare sphere is to balance the recognized need for urgent access to medical data against growing security concerns. Organizations can protect medical data by prioritizing the implementation of additional security measures. Even the simple addition of a button or input field could protect a patient’s data from theft.
The second thing hospitals should do - is to install security software. For example, Kaspersky Lab solutions guard users from attacks on many levels of its protection:
The anti-spam pitch detects willfull emails that were sent by cybercriminals.
Built-in email and file antiviruses set the uploading scripts and warn the end user.
The file antivirus recognizes the workable file and warns the end user about virus detected.
The System agent module in Kaspersky Internet Security can detect even unknown patterns of virus and notify the end user. Besides, it will not allow the Trojan virus to encrypt files on your hardware so no cybercriminals will be able to drive away and lock the data and demand money.
In order to tackle these challenges most effectively, we suggest partnering with an mHealth software developer with experience creating innovating and secure solutions. Archer Software has shown its aptitude time and time again for creating and deploying mHealth and EMR systems.
Archer Software has experience developing effective software solutions for healthcare companies, and has received consistently positive feedback from its clients. You can take a look at our full Healthcare portfolio here.
For more information about how we can develop secure healthcare software for hospitals that is right for you, feel free to reach out to our experts at firstname.lastname@example.org.