ArticlePDF Available

A National Survey of Hospital Cyber Attack Emergency Operation Preparedness

Authors:

Abstract and Figures

Objective: Cyberattacks on healthcare systems are increasing in frequency and severity. Hospitals need to integrate cybersecurity preparedness into their emergency operations planning and response to mitigate adverse outcomes during increasingly likely cyber events. No data currently exist regarding the level of preparedness of United States hospital systems for cybersecurity attacks. We surveyed hospital emergency managers to assess cybersecurity preparedness for these events. Methods: Fifty-seven emergency managers representing hospitals across the United States participated in an online Qualtrics survey regarding current preparedness and response procedures for cybersecurity hazards. Results: Survey responses between April 2019 and May 2021 demonstrated that a majority of hospital systems surveyed included cybersecurity disasters in their HVA (82.4%; 47/57), and most ranked it as 1 of their top 5 priorities (57.4%; 27/47). However, over half denied specifically mentioning cybersecurity in their Emergency Operations Plans (EOPs; 52.6%; 30/57). Fourteen of the 57 hospital systems (24.5%) endorsed previously activating an emergency response for a cybersecurity incident unrelated to information technology (IT) failure. Conclusions: The survey results suggest that American hospitals are currently underprepared for cybersecurity disasters. We emphasize the importance of prioritizing cybersecurity in Hazard Vulnerability Analyses (HVAs) and implementing specific EOP annexes for cybersecurity emergencies.
Content may be subject to copyright.
Disaster Medicine and Public
Health Preparedness
www.cambridge.org/dmp
Brief Report
Cite this article: Sullivan N, Tully J, Dameff C,
Opara C, Snead M, Selzer J. A national survey of
hospital cyber attack emergency operation
preparedness. Disaster Med Public Health Prep.
17(e363), 14. doi: https://doi.org/10.1017/
dmp.2022.283.
Keywords:
cyber attack; healthcare cybersecurity;
ransomware; emergency management; cyber
disaster
Corresponding author:
Jordan Selzer,
Email: jselzer@gwu.edu.
© The Author(s), 2023. Published by Cambridge
University Press on behalf of Society for
Disaster Medicine and Public Health, Inc. This is
an Open Access article, distributed under the
terms of the Creative Commons Attribution
licence (http://creativecommons.org/licenses/
by/4.0/), which permits unrestricted re-use,
distribution and reproduction, provided the
original article is properly cited.
A National Survey of Hospital Cyber Attack
Emergency Operation Preparedness
Natalie Sullivan MD1, Jeffery Tully MD2, Christian Dameff MD3
,
4,
Chibuzo Opara MD5, Mackenzie Snead MD5and Jordan Selzer MD, MPH1
1Department of Emergency Medicine, George Washington University, School of Medicine, Washington, DC, USA;
2Department of Anesthesiology, Division of Perioperative Informatics, University of California San Diego, School
of Medicine, La Jolla, California, USA; 3Department of Emergency Medicine, University of California San Diego,
School of Medicine, La Jolla, California, USA; 4Department of Biomedical Informatics, University of California
San Diego, School of Medicine, La Jolla, California, USA and 5Howard University College of Medicine,
Washington, DC, USA
Abstract
Objective: Cyberattacks on healthcare systems are increasing in frequency and severity.
Hospitals need to integrate cybersecurity preparedness into their emergency operations
planning and response to mitigate adverse outcomes during increasingly likely cyber events.
No data currently exist regarding the level of preparedness of United States hospital systems
for cybersecurity attacks. We surveyed hospital emergency managers to assess cybersecurity
preparedness for these events.
Methods: Fifty-seven emergency managers representing hospitals across the United States par-
ticipated in an online Qualtrics survey regarding current preparedness and response procedures
for cybersecurity hazards.
Results: Survey responses between April 2019 and May 2021 demonstrated that a majority of
hospital systems surveyed included cybersecurity disasters in their HVA (82.4%; 47/57), and
most ranked it as 1 of their top 5 priorities (57.4%; 27/47). However, over half denied specifically
mentioning cybersecurity in their Emergency Operations Plans (EOPs; 52.6%; 30/57). Fourteen
of the 57 hospital systems (24.5%) endorsed previously activating an emergency response for a
cybersecurity incident unrelated to information technology (IT) failure.
Conclusions: The survey results suggest that American hospitals are currently underprepared
for cybersecurity disasters. We emphasize the importance of prioritizing cybersecurity in
Hazard Vulnerability Analyses (HVAs) and implementing specific EOP annexes for cyberse-
curity emergencies.
The Hospital Incident Command System (HICS) based on the National Incident Management
System (NIMS) and the Incident Command System (ICS) provides healthcare organizations
and hospitals with the structure and principles necessary to conduct emergency management
and contingency planning. This system takes into account the Disaster Cycle of prevention, mit-
igation, preparedness, response and recovery. Effective emergency management includes pre-
vention where actions may prevent a hazard from occurring and mitigation and preparedness
where efforts may lessen the impact of an anticipated hazard. Successful systems focus on pre-
paredness actions that have the potential for maximum impact at significantly lower cost than
when resources are focused on the response phase of disaster. Some hazards, however, cannot be
avoided completely; therefore, an effective response plan is also an essential to emergency
management.
Organizations create Emergency Operations Plans (EOP) to establish actions and organiza-
tional structures in response to a hazard event that exceeds the capacity of normal operations.
EOPs provide thorough role descriptions, delineate specific responsibilities and identify
assigned resources. A well-established tool, Hazard Vulnerability Analysis (HVA), informs
EOPs by identifying and prioritizing projected hazards based on their likelihood and potential
impact. Hospitals face many possible hazards and must allocate limited resources according to
their HVA to optimize outcomes. EOP design focuses on an all-hazards approach with addi-
tional planning associated with specific events located in appendices.1
As medicine advances, technological systems allow for a standard of care that simultaneously
integrates different medical devices, testing, and patient monitoring. Healthcare systems both
large and small use a variety of connected medical technologies such as electronic medical
records (EMR) to store sensitive patient information and to communicate across facilities
and between providers. Patients receive implants of wirelessly connected medical devices, such
as defibrillators and insulin pumps, that provide life-sustaining medical support.
As these technologies allow providers access to new care workflows, they may also expose
medical systems and patients to novel vulnerabilities including disruptions and even potentially
https://doi.org/10.1017/dmp.2022.283 Published online by Cambridge University Press
malicious functions.2With the healthcare industry increasingly
dependent on connected technologies, failures to secure critical
systems have become commonplace. Healthcare cybersecurity
attacks are increasing in frequency and severity.1Data loss,
monetary theft, attacks on medical devices, and infrastructure
attacks are among the increasing cyber threats to healthcare.3
Ransomware, one of the most prevalent forms of cyberattacks,
occurs when an outside actor breaks into a network, encrypts
the contained information, and then restricts access until ransom
is paid.4Health-care organizations represent high value targets
for ransomware because they maintain protected health informa-
tion which, when compromised, may result in financial risk, legal
liability, and regulatory penalties.3
While all hospitals undergo intermittent downtime, these typ-
ically happen with some warning and are relatively brief with a
known timeframe. However, cyberattacks occur suddenly, with
unique features including multiple systems simultaneously
impacted and prolonged downtimes. Between 2012 and 2018,
almost half of 166 downtime events across US hospitals involved
a cyberattack.5Downtime contingency workflows and planning
may mitigate patient impact during these events and proper cyber
preparedness may prevent them all together.
No data currently exist regarding the level of preparedness in
the US Hospital systems for cybersecurity attacks. This is true
internationally as well. Through a survey of emergency managers
in hospitals across the country, we further investigate preparedness
with regard to this hazard.
Methods
We created and distributed a brief survey to hospital emergency
management personnel across the United States. To preserve ano-
nymity and thus improve response rate, investigators did not
collect personally identifying information. The questions focused
on preparedness and prior cyberattack response (Appendix 1).
The authors collected the data using the survey software pro-
gram Qualtrics XM (Qualtrics, Seattle, WA). Expert opinion
obtained through discussions with professionals working in hos-
pital emergency management, cybersecurity and response as well
as clinicians and individuals working at health-care facilities dur-
ing cyberattacks informed the questions for the survey. The sur-
vey was then distributed throughout University of California
(UC) hospital system emergency management listserv as well
as ASPR TRACIE Express, a national listserv of health-care emer-
gency preparedness personnel. The UC listserv reached 5 UC
hospitals with 1 respondent each. Invitees received 2 emails
requesting that only emergency managers complete the anony-
mous survey between April 2019 and May 2021. In this context,
emergency managers were defined as individuals functioning in a
role focused on reducing hazards, coping with disasters- and
supporting a structure to reduce vulnerability. All respondents
represented individual hospital systems within the United
States. Each participant completed the electronic survey in
English. Participants completed the survey online and
Qualtrics XM anonymized the data.
Due to the nature of open invitation by means of listserv, a
response rate is unavailable. Additionally, due to the de-identified
nature of the data, geographic distribution and characterization of
individual healthcare facilities was not possible. Incomplete
responses were not included in the final analysis.
Researchers received de-identified results. Researchers analyzed
the answers to each question separately. Authors used Microsoft
Excel (V16.49, Redmond, WA) to perform a quantitative analysis
of the data which demonstrated the proportions of respondents
represented by each answer.
Results
The authors collected 57 completed survey responses between
April 2019 and May 2021. These survey responses provided data
for the following results.
HVA
A majority of hospital systems surveyed included cybersecurity
disasters in their HVA (82.4%; 47/57), with 4 respondents unsure
as to whether there was an entry. Of those who affirmed there was a
cybersecurity disaster entry in their HVA, 57.4% ranked it as 1 of
their top 5 priorities (27/47).
Fourteen (29.7%) of the total 47 respondents with cybersecurity
disaster in their HVAs ranked it specifically as their third priority
overall.
EOP
While most hospital systems did include cybersecurity disaster
in their HVAs, more than half denied specifically mentioning
cybersecurity in their EOPs (52.6%; 30/57), with an additional
10.5% (6/57) stating they were unsure as to whether cybersecurity
was included (Figure 1). Of the 36.8% (21/57) of hospital
systems who included cybersecurity disaster in their EOPs, only
52.4% (11/21) of respondents used external resources to create
their emergency plan. Two respondents specifically referenced
the Cybersecurity and Infrastructure Security Agency (CISA)
under the Department of Homeland Security when creating their
EOP. One source listed the 2021 X-Force Threat Intelligence Index
from IBM as a reference, specifically citing the Vulnerabilities
Surpass Phishing as Most Common Infection Vectorsection.
Other external sources referenced included documents,”“cyber
threats,”“HHS and vendor support,and websites.
Fourteen of 30 (46.6%) of the hospital systems without cyber-
security disasters listed in their EOP plan to add an entry within the
upcoming year.
Cybersecurity Disaster Practice and Emergency Response
Activation
Fourteen of the 57 hospital systems (24.5%) endorsed previously
activating an emergency response for a cybersecurity incident
unrelated to information technology (IT) failure (Figure 2).
Of those, a majority had an existing cybersecurity disaster entry
in their EOPs and had previously performed a full-scale drill or
tabletop exercise relating to cybersecurity (57.1%; 8/14). Most of
these hospital systems (92.8%; 13/14) stated they additionally
included cybersecurity disasters in their HVA (Figure 3). Of
the 43 respondents who denied a prior emergency response
activation (ERA) for cybersecurity disaster, only 37.2% (16/43)
previously performed a full-scale drill or tabletop exercise related
to cybersecurity.
Discussion
A report published by CISA in 2021 described increases in ambu-
lance diversion, intensive care unit bed use, and mortality conse-
quent to hospital cyberattacks.6The frequency of cyberattacks on
2 N Sullivan et al.
https://doi.org/10.1017/dmp.2022.283 Published online by Cambridge University Press
health-care organizations exceeds any other sector.7Despite the
escalating risk and the potential for devastating consequences, this
survey demonstrates a lack of preparedness and mitigation strat-
egies among a large proportion of American hospitals.
Although a majority of systems surveyed included cyberattack
in their HVA, only slightly over half prioritized it as one of their top
hazards. This is consistent with a prior study of 27 health-care
emergency managers in West Virginia where only 30% of respon-
dents had an all-hazards plan and EOP for cybersecurity events.8
The EOP is the action component of a hospitals preparedness. It
allows for organizations to delineate roles, tasks, and workflow
during a threat to normal operations. Due to the unique nature
of cyberattacks, an all-hazards approach that is typically used in
disaster response is unlikely to suffice. Cyberattacks occur at the
speed of the Internet without warning, require specialists in
information security (IS) and greatly compromise the existing
clinical flow.9EOPs that take into account the cyber-specific haz-
ard provide additional guidance to providers and managers of an
emergent IT system shutdown.
Many factors contribute to the difficulty of fully addressing and
even evaluating preparedness among American hospitals for
cyberattack. The costs of identifying vulnerabilities and the sub-
sequent negative media attention likely inhibit hospital systems
from divulging a lack of preparation.
Furthermore, the relatively burgeoning threat of cyberattacks
and their evolving nature present a unique challenge to prepared-
ness in medicine. Often in the traditional medical environment,
practitioners use more antiquated, or legacycomputer technol-
ogy which is unsupported by vendors, resulting in greater
vulnerability. They often have limited training in simple cyber
Figure 1. Are cyber security disasters included in your Hazard Vulnerability Assessment? (n=57).
Figure 2. Has a cyber security incident ever resulted in an emergency response activation at your organization? If yes, did your organization have a cyber security disaster plan in
your Emergency Operation Plan prior to the incident? (n=57).
Disaster Medicine and Public Health Preparedness 3
https://doi.org/10.1017/dmp.2022.283 Published online by Cambridge University Press
hygiene. Limited budgets and overburdened health-care workers
also lead to the use of outdated technology and disincentivize
investing in adequate preparedness measures. In systems that
remain unaffected by cyberattack, IS personnel and emergency
managers may lack resources to pursue preventative measures
or knowledge regarding these specific threats.
Authors have dedicated entire books to hospital preparedness
and response procedures for cyberattacks. Likewise, the federal
government through multiple agencies offers hospital guidance
on hospital cyberattack emergency operations.10 This myriad of
resources may inform hospital hazard analyses and EOPs. In a hos-
pital, multiple pivotal response areas existemergency manage-
ment administration, clinical staff, and IS and IT staff among
them. Preparedness and mitigation require health-care organiza-
tions to hire and train IS/IT specialists to directly respond to cyber-
attacks but must also educate and drill clinical staff on downtime
procedures and clinical flow.
Limitations
More specific geographic and demographic data regarding the
respondents to this survey may provide further insight into the
applicability of the data. However, to protect the anonymity of
these sites, we cannot provide further identifying information.
The data gleaned from this survey is limited and may not fully
represent the spectrum of health-care institutions. Further
research may identify gaps in preparedness and highly successful
methods for mitigation. Data collected during real life breaches,
information sharing, and increased collaboration between hospital
emergency managers may also provide further insight into success-
ful responses.
References
1. Paganini P. Cyberattack reports quadrupled during Coronavirus
outbreak, FBI warns. Security Affairs. 2020. Cited July 12, 2020.
Accessed January 10, 2023. https://securityaffairs.co/wordpress/101879/
cyber-crime/fbi-coronavirus-attacks-spike.html
2. Tully J, Selzer J, Phillips JP, et al. Healthcare challenges in the era of
cybersecurity. Health Secur. 2020;18(3):228-231.
3. Perakslis ED. Cybersecurity in health care. N Engl J Med. 2014;371(5):
395-397.
4. Kruse CS, Frederick B, Jacobson T, et al. Cybersecurity in healthcare: a
systematic review of modern threats and trends. Technol Health Care.
2017;25(1):1-10.
5. Larsen EP, Rao AH, Sasangohar F. Understanding the scope of downtime
threats: a scoping review of downtime-focused literature and news media.
Health Informatics J. 2020;26(4):2660-2672.
6. CISA. Provide medical care is in critical condition: analysis and stake-
holder decision support to minimize further harm. Cybersecurity and
Infrastructure Security Agency. 2021. Accessed January 10, 2023. https://
www.cisa.gov/sites/default/files/publications/CISA_Insight_Provide_
Medical_Care_Sep2021.pdf
7. HealthITSecurity. Healthcare Accounts for 79% of All Reported Breaches,
Attacks Rise 45%. Cited January 24, 2022. Accessed January 10, 2023.
https://healthitsecurity.com/news/healthcare-accounts-for-79-of-all-
reported-breaches-attacks-rise-45
8. Branch LE, Eller WS, Bias TK, et al. Perceptions of hospital emergency
preparedness for cyber threats: a statewide survey. Cyber Threats and
Healthcare Organizations: A Public Health Preparedness Perspective
2018;1001:91. https://researchrepository.wvu.edu/cgi/viewcontent.cgi?
article=4749&context=etd
9. Dameff C, Farah J, Killeen J, et al. Cyber disaster medicine: a new frontier
for emergency medicine. Ann Emerg Med. 2020;75(5):642-647.
10. Office of the Chief Information Officer (OCIO). Cybersecurity. Cited
January 24, 2022. Accessed January 10, 2023. https://www.hhs.gov/
about/agencies/asa/ocio/cybersecurity/index.html
Figure 3. In your emergency operations plan do you have a specific entry for cyber security disaster? (n=57).
4 N Sullivan et al.
https://doi.org/10.1017/dmp.2022.283 Published online by Cambridge University Press
... The increases in ransomware attacks have threatened the healthcare industry, particularly hospitals 12 (Nifakos et al., 2021). The increasing cyber threats to the healthcare industry due to ransomware have consisted of infrastructure attacks, monetary theft, attacks on medical devices, and data loss 13 (Sullivan et al., 2023). ...
... The increases in ransomware attacks have threatened the healthcare industry, particularly hospitals 12 (Nifakos et al., 2021). The increasing cyber threats to the healthcare industry due to ransomware have consisted of infrastructure attacks, monetary theft, attacks on medical devices, and data loss 13 (Sullivan et al., 2023). ...
Conference Paper
Full-text available
The healthcare industry in particularly hospitals, has become a prime target for ransomware attacks due to its critical role in patient care and the increasing reliance on interconnected systems. This study evaluates the impact of ransomware attacks on U.S. hospitals, focusing on financial costs, operational disruptions, and patient safety risks. Operational disruptions such as canceled procedures, ambulance diversions, and extended system downtimes have severely impacted hospital functions, with neighboring facilities often overwhelmed by patient influxes. While some studies reported increased mortality rates and longer hospital stays due to delays and system failures, evidence on patient risk remains inconclusive.
... Additionally, a quarter (24.5%) of hospital systems reported having previously activated an emergency response for cybersecurity incidents. [5] Ransomware poses a novel threat to the healthcare sector, which is ill-equipped for cybersecurity challenges compared to other industries. Although healthcare prioritizes data privacy through HIPAA training, preparedness for ransomware downtime remains inadequate. ...
Article
With the rapid digitization of healthcare, the sector has become a prime target for cyber-attacks, threatening patient safety, availability of clinical systems, and data confidentiality and integrity. Nurses' direct interaction with patients makes them critical in identifying and mitigating risks associated with ransomware. Their awareness and proactive engagement are essential to enhancing patient safety and maintaining the overall integrity of healthcare operations. This paper justifies the need for nurse training in cybersecurity. It presents a syllabus for "Cybersecurity for Health Professionals," an innovative course designed to equip healthcare workers, primarily nurses, with essential cybersecurity knowledge and skills. This course can be delivered in several forms, as discussed in the paper.
... While there are many case reports and analyses for smaller events affecting hospitals (e.g. fire, traffic incidents, terroristic attacks, cybercrime), for Europe to our knowledge at the moment there is no analysis of which kind of events at the disaster level may predominantly affect hospitals [13][14][15][16][17] . ...
Article
Full-text available
The goal of this analysis is to describe seasonal disaster patterns in Central Europe in order to raise awareness and improve hospital disaster planning and resilience, particularly during peak events. Hospitals are essential pillars of a country’s critical infrastructure, vital for sustaining healthcare services and supporting public well-being—a key issue of national security. Disaster planning for hospitals is crucial to ensure their functionality under special circumstances. But the impact of climate change and seasonal variations in the utilization of hospital services are raising challenges. Therefore, the knowledge of perennial disaster patterns could help strengthen the resilience of hospitals. We conducted a cross-sectional analysis of the Emergency Events Database EM-DAT for disasters in Central Europe (Germany, France, Denmark, The Netherlands, Belgium, Luxembourg, Switzerland, Austria, Czech Republic, and Poland) between January 2000 and December 2023. Time distribution of disasters, patterns and longitudinal trends, were analyzed to discuss impact on disaster preparedness in hospitals. Out of 474 events, 83% were associated with a natural hazard and only 80 events (17%) were of technological cause. While technological disasters were spread equally over the whole year, the vast majority of disasters related to natural hazards (n = 394), i.e. storms (n = 178, 45%), floods (n = 101, 26%), and extreme temperatures (n = 93, 24%) peaked during summer and winter months. Fewer disasters were registered during autumn and especially spring seasons. More than 50% of the technological disasters were categorized in the transport accident subgroup. Technological disasters were spread equally over the whole year. Looking at the three most common disaster types, extreme temperatures, floods, and storms are clearly dominating and cause over 90% of the disasters due to natural hazards in central Europe. Overall, the number of events per year fluctuates without a clear trend, only the technological events appear to become less frequent with 70% (n = 56) of the registered disasters occurring in the first half of the study period (2000–2011). An overlap of hospital admissions due to seasonal effects and catastrophic events, mainly triggered by disasters of natural cause in vulnerable periods may lead to a partial collapse of the health care system. To close knowledge gaps, future comprehensive data collection is vital for informed decision-making. Awareness and preparedness are key: an "all-hazards" approach to manage diverse, potentially simultaneous seasonal threats is often the most versatile strategy for hospital emergency planning.
Chapter
Awareness and understanding of cyber-attacks on healthcare institutions and their profound impacts on patients, providers, health systems, and hospitals is critical for clinicians. This chapter will discuss the sources of these attacks, emphasizing the multi-faceted threats facing healthcare institutions. The role of clinicians and healthcare institutions is critical, and they must understand responsibilities in prevention, response, and patient support. There is also the collective effort required from many stakeholders including national trade organizations, critical infrastructure, defense policy, health regulators, technology producers, MedTech companies, health systems, and frontline defenders. Key areas for action include continuous education, training, effective communication, and collaboration to prevent cyber-attacks. Response strategies during and after cyber incidents are also covered, along with the importance of supporting patients through such crises. The chapter concludes with recommendations and additional resources for further reading.
Article
Full-text available
This study investigates the incidence and characteristics of cybersecurity data breaches across U.S. rural and urban hospitals from 2016 to 2022, employing a two-stage design. Stage 1 used logistic regression to determine whether a hospital had a breach, controlling for key variables. Stage 2 analyzed the subset of 212 hospitals that experienced a breach, focusing on breach type, and breach location. The results revealed that 3.46% of hospitals experienced a breach, with urban facilities showing a slightly higher rate (3.84%) than rural ones (2.64%). Larger, nonprofit, and non-affiliated hospitals and those in the Northeast faced higher breach odds. Once breached, no significant rural–urban differences emerged regarding breach characteristics, but year of breach, ownership type, and membership affiliation played key roles in how incidents manifested. These findings underscore the importance of targeted cybersecurity strategies, informing healthcare administrators, policymakers, and cybersecurity professionals in safeguarding patient data across diverse hospital settings.
Article
Over the last few years, numerous hospitals in France have been subject to increasingly frequent and severe cyberattacks that have disrupted healthcare provision to varying degrees. To mitigate this threat, especially in light of the forthcoming 2024 Olympic Games, Assistance Publique–Hôpitaux de Paris in Paris has been developing contingency plans that have been tested in simulated exercises called CRYPTolocker EXercice since May 2021. The latest simulated ransomware cyberattack that involved more than 200 participants took place on July 5, 2023, and lasted for 24 hours. Although cybersecurity contingency plans are confidential for obvious reasons, this article presents the multidisciplinary organization of the simulated attack based on previous experiences from other hospitals and general findings that are in the public domain. It was found that the procedures in place worked well overall, and countermeasures were quickly implemented to limit the severity of this simulated cyberattack. However, failings were observed in intra- and extra-hospital communication, and conflicting priorities between different categories of personnel (administrative, managerial, and clinical) hampered the information technology team in resolving various issues. Furthermore, it was found that mental fatigue, task saturation, and information overload may have overwhelmed senior managers at sporadic intervals. This often resulted in an action–reaction approach being used to find temporary solutions to immediate problems. Consequently, senior managers who participated in this simulated cyberattack were unable to think strategically and anticipate demands for middle- and long-term issues. This unprecedented exercise was an important learning experience for all participants, and the lessons learned will help further improve contingency planning and cyber resilience. It advised that all hospitals worldwide adopt and develop a similar multidisciplinary approach (taking into account their local contexts) to limit the deleterious effects of a potential cyberattack that undoubtedly will become more prevalent in the future.
Article
Full-text available
Cyber-Physical Systems (CPS) are vital of critical infrastructure such as energy, transportation, healthcare, and manufacturing. Increasingly, however, these systems are the target of sophisticated cyber threats, with dire economic and operational implications. The CPS security literature mainly covers theory models and technology-specific security and control measures, but known techniques have low implementation/efficiency/robustness. To address these gaps, in this paper we propose a generalizable, cost-effective, and AI-enabled adaptive security framework by coupling a real-time threat monitoring system with a blockchain-based security and machine learning-enabled intrusion detection model. Real-world attack scenarios, cost-benefit analysis and a supply-chain risk mitigation strategy contribute to improving resilience against ever-evolving cyber threats. The results showcase that the framework enhances cyber resilience, scalability, and adaptability in CPS environments, providing appropriate protection for critical infrastructure. The research provides a field in the making practical, scalable, and economically viable cybersecurity solution to achieve better preparedness for cyberattacks.
Article
Full-text available
The study presented focuses on evaluating password security compliance within a private hospital in Phuket, employing the Unified Theory of Acceptance and Use of Technology (UTAUT) framework. Descriptive statistics reveal that 416 healthcare professionals participated in the survey, with 55% female. Age analysis showed that nearly half (48.6%) of participants were under 30, and 85.3% held a bachelor's degree. Most respondents adhered to recommended password security practices, including using passwords with 8-10 characters and incorporating numbers, uppercase letters, and special characters. However, a significant vulnerability was observed as 83.41% of respondents used the same password across multiple accounts. Statistical analysis using Structural Equation Modeling (SEM) indicated that performance expectancy (PE), effort expectancy (EE), and social influence (SI) significantly influenced behavioral intention (BI) to comply with password security practices. PE had the highest impact (β = 0.56, p < 0.001), followed by EE (β = 0.26, p < 0.001), and SI (β = 0.21, p = 0.002). Facilitating conditions (FC) significantly affected actual usage (USE) with a moderate impact (β = 0.12, p = 0.036). Age and experience moderated the relationships between these constructs, suggesting that younger and less experienced employees were more influenced by ease of use and performance expectations, while older staff relied more on facilitating conditions. This study contributes to the understanding of how various factors influence password security compliance in healthcare, emphasizing the need for tailored interventions based on demographic differences to enhance security practices effectively.
Article
Zusammenfassung Kliniken gehören per definitionem zur kritischen Infrastruktur eines Landes. Vermehrt sind in den vergangenen Jahren Krankenhäuser Ziel von Hackerangriffen mit der Folge einer wochen- bis sogar monatelangen Beeinträchtigung ihrer Handlungsfähigkeit geworden. Gemäß der „Nationalen Strategie zum Schutz Kritischer Infrastrukturen (KRITIS-Strategie)“ sind Kliniken gesetzlich verpflichtet, dagegen Vorsorge zu treffen. Dazu sollten IT-abhängige Prozesse in einer Klinik evaluiert, definiert und Ausfallkonzepte erarbeitet werden, um auf einen Cyberangriff vorbereitet zu sein. Spezifisch auf einen EDV-Ausfall zugeschnittene Notfallpläne sollten in allen IT-abhängigen Bereichen einer Klinik erstellt und vorgehalten werden. Zudem sollten papierbasierte Ersatzlösungen, wie z. B. Anforderungsbelege für Diagnostik- oder Konsilleistungen, abteilungsspezifische Notfalldokumente und Patientendokumentationskurven an einem gut zugänglichen und den Mitarbeitenden des jeweiligen Bereichs bekannten Ort vorgehalten werden. Die vollständige Wiederherstellung eines Kliniknetzwerks nach einem Cyberangriff erfordert häufig eine umfassende Wiederherstellung zahlreicher IT-Systeme. Dies kann u. U. Wochen bis Monate dauern. Wenn das Krankenhaus über solide Pläne zur Cyber-Notfallvorsorge verfügt, die regelmäßige Scans und Backups in Echtzeit umfassen, können eine Stabilisierung und ein schnelleres Wiederanlaufen des Betriebs möglich sein.
Article
Full-text available
Electronic health record downtimes are any period where the computer systems are unavailable, either for planned or unexpected events. During an unexpected downtime, healthcare workers are rapidly forced to use rarely-practiced, paper-based methods for healthcare delivery. In some instances, patient safety is compromised or data exposed to parties seeking profit. This review provides a foundational perspective of the current state of downtime readiness as organizations prepare to handle downtime events. A search of technical news media related to healthcare informatics and a scoping review of the research literature were conducted. Findings ranged from theoretical exploration of downtime to empirical direct comparison of downtime versus normal operation. Overall, 166 US hospitals experienced a total of 701 days of downtime in 43 events between 2012 and 2018. Almost half (48.8%) of the published downtime events involved some form of cyber-attacks. Downtime contingency planning is still predominantly considered through a top-down organizational focus. We propose that a bottom-up approach, involving the front-line clinical staff responsible for executing the downtime procedure, will be beneficial. Significant new research support for the development of contingency plans will be needed.
Article
Full-text available
Background: The adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats. Objective: The objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature. Methods: The reviewers conducted three separate searches through the CINAHL and PubMed (MEDLINE) and the Nursing and Allied Health Source via ProQuest databases. Using key words with Boolean operators, database filters, and hand screening, we identified 31 articles that met the objective of the review. Results: The analysis of 31 articles showed the healthcare industry lags behind in security. Like other industries, healthcare should clearly define cybersecurity duties, establish clear procedures for upgrading software and handling a data breach, use VLANs and deauthentication and cloud-based computing, and to train their users not to open suspicious code. Conclusions: The healthcare industry is a prime target for medical information theft as it lags behind other leading industries in securing vital data. It is imperative that time and funding is invested in maintaining and ensuring the protection of healthcare technology and the confidentially of patient information from unauthorized access.
Article
As a result of the extensive integration of technology into the healthcare system, cybersecurity incidents have become an increasing challenge for the healthcare industry. Recent examples include WannaCry, a nontargeted ransomware attack on more than 150 countries worldwide that temporarily crippled parts of the National Health Service in the United Kingdom, and the 2016 ransomware attack on Los Angeles's Hollywood Presbyterian Medical Center. The attacks cost millions of dollars in lost revenue and fines, as well as significant reputational damage. Efforts are needed to devise tools that allow experts to more accurately quantify the actual impact of such events on both individual patients and healthcare systems as a whole. While the United States has robust disaster preparedness and response systems integrated throughout the healthcare and government sectors, the rapidly evolving cybersecurity threat against healthcare entities is outpacing existing countermeasures and challenges in the "all-hazards" disaster preparedness paradigm. Further epidemiologic research of clinical cybersecurity attacks and their effects on patient care and clinical outcomes is necessary to prevent and mitigate future attacks.
Article
To date, cybercrime against health care has manifested as data loss, monetary theft, and attacks on medical devices and infrastructure. To find feasible solutions, organizations need to understand the interplay among threats, vulnerabilities, risks, and resilience.
Cyberattack reports quadrupled during Coronavirus outbreak, FBI warns. Security Affairs. 2020
  • P Paganini
Paganini P. Cyberattack reports quadrupled during Coronavirus outbreak, FBI warns. Security Affairs. 2020. Cited July 12, 2020. Accessed January 10, 2023. https://securityaffairs.co/wordpress/101879/ cyber-crime/fbi-coronavirus-attacks-spike.html
Provide medical care is in critical condition: analysis and stakeholder decision support to minimize further harm. Cybersecurity and Infrastructure Security Agency
  • . Cisa
Perceptions of hospital emergency preparedness for cyber threats: a statewide survey. Cyber Threats and Healthcare Organizations: A Public Health Preparedness Perspective
  • Branch
  • Le
  • Eller
  • Ws
  • Bias
  • Tk
Healthcare Accounts for 79% of All Reported Breaches, Attacks Rise 45%
  • Healthitsecurity
HealthITSecurity. Healthcare Accounts for 79% of All Reported Breaches, Attacks Rise 45%. Cited January 24, 2022. Accessed January 10, 2023. https://healthitsecurity.com/news/healthcare-accounts-for-79-of-allreported-breaches-attacks-rise-45
Perceptions of hospital emergency preparedness for cyber threats: a statewide survey
  • L E Branch
  • W S Eller
  • T K Bias
Branch LE, Eller WS, Bias TK, et al. Perceptions of hospital emergency preparedness for cyber threats: a statewide survey. Cyber Threats and Healthcare Organizations: A Public Health Preparedness Perspective 2018;1001:91. https://researchrepository.wvu.edu/cgi/viewcontent.cgi? article=4749&context=etd