Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • ICS Security in Healthcare: Why Software Vulnerabilities Pose a Threat to Patient Safety
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ICS Security in Healthcare: Why Software Vulnerabilities Pose a Threat to Patient Safety

4 years ago Tripwire Guest Authors
ICS Security in Healthcare: Why Software Vulnerabilities Pose a Threat to Patient Safety

The lack of healthcare cybersecurity is one of the most significant threats to the sanctity of the global healthcare industry. This is made evident by the fact that in 2020 more than 18 million patient records were affected by successful cyber-attacks on the U.S. healthcare system.

Health professionals should not take this issue lightly, as financial assets and intellectual property are at risk. Additionally, IT professionals must address healthcare data security issues, i.e., Electronic Health Records (EHRs), while also committing to helping patients overcome the aftermath of healthcare security breaches. In 2021 alone, more than 40 million individual records were breached, and these numbers are increasing.

Let’s see how ICS security vulnerabilities can threaten patient and hospital safety.

The Need for Industrial Control Systems (ICS) in Healthcare Environments

Hospitals routinely deal with high-value sensitive information from patients, doctors, diagnosticians, and other stakeholders. This includes assets with high monetary value like personal identity information, patient’s health information, bank accounts, and credit card numbers.

For our well-being, these systems and processes must function optimally at all times. However, if malicious actors access our healthcare ecosystems, a lot could go wrong, from compromised pacemakers and insulin pumps, to comprehensive data breaches.

Any lack of medical device security can wreak havoc on a healthcare organization. However, the threat often comes from within, in the form of human error, unplanned alterations, and outages, all of which can be dangerous. At the same time, defective software should also get some of the blame. Software vulnerabilities and faulty code on medical devices can endanger patient safety and cybersecurity.

This has led to a greater need for the implementation of Industrial Control System (ICS) security in health care. While “ICS” is an umbrella term that brings to mind factories, and utilities, the ubiquity of these devices in health care facilities raises the need for more security in this area.

Strong ICS security for medical devices would enable health care providers to take defensive measures to reduce the risk of exploitation. Best practices include minimizing the exposure of these devices to the network, isolating control systems entirely where possible, and using VPNs for any administrative tasks.

Prioritizing Patient Safety and Protection

Personal Health Information (PHI) is protected by The Health Insurance Portability and Accountability Act (HIPAA), which states that any person’s past, present, and future information provided to a health care provider must be collected, stored, shared, and maintained under HIPAA conventions.

Hospitals need tight cybersecurity, as the U.S. government has warned of new malware attacks on health care systems. These attacks are increasing at an alarming rate, and they pose a severe threat to hospitals and patients by blocking access to important medical information. In Q3 of 2021, 68 ransomware attacks were carried out against healthcare institutions.

Ransom groups target healthcare more frequently because they believe that by attacking this industry, they can get money quickly due to the urgent need for medical data and the widespread notoriety created by such an attack.

Moreover, cybercriminals also threaten to publish or sell the data online, which is leading to more companies willing to pay the ransom than ever before. Federal authorities are continually working to educate the healthcare sector about ransomware prevention.

Medical Device Misconfigurations – A Significant Threat to ICS

Ensuring the safety of patients who use medical devices begins with asset management, i.e., registration of all medical IoT devices in a healthcare setting.

It is vital to understand medical IoT security configurations and any vulnerabilities that may compromise patient safety. Misconfigurations, when left unaddressed, can lead to privacy breaches, especially at public database portals.  It is all the more important when you consider that many of these devices are old, outdated, and using end-of-life operating systems. It can get very difficult to update device configurations or apply security patches.

Mobile devices have eased access and data sharing, but this has also led to a greater risk of privacy breaches, identity theft, ransomware, and other cyber-attacks. Many healthcare institutes allow login to portals from mobile devices. These mobile devices are not secured or do not have any security standards. Unsecured devices have high chances of ransomware, malware, and privacy breach attacks.

Systems that enable medical IoT device administration should be protected with multi-factor authentication, and reliable authorization methods in order to gain access. 

It is also important to note that hospitals worldwide use medical devices with the default passwords they came with. This is a clear invitation for an attacker to take control of devices and manipulate their behavior, putting patient safety at risk.

Additionally, many of these connected medical devices are left with SSH, FTP, and other standard management protocols open for anyone with the means to access them. In fact, sometimes they are even connected to the internet, unprotected and without any firewall to stop access.

In many cases downloading malicious applications and software from unverified and non-trusted sources is a big reason for privacy breaches on mobile devices. These attacks can compromise the security of employee data within the medical portal or application.

The Cost of Ignoring Cybersecurity for Hospitals

Over 600 ransomware attacks on U.S. healthcare institutions cost more than $21 billion in 2021. Another report estimates the average cost of a healthcare cyber-attack at $6.45 million. Malicious attacks on hospitals cost $4.45 million on average.

Weak and outdated cybersecurity systems can be a primary reason for such breaches and financial losses. It is better to invest in new and more reliable technology for cybersecurity than to lose tons of money in such attacks.

Protect Your Hospital and Healthcare Institutions

Hospitals and medical entities are very attractive targets for malicious actors and cyber attackers. It is essential to protect these institutions’ sensitive data against potential cyber risks.  An inability to take necessary measures, and failure to secure hospital and patient data under HIPAA can result in penalties and legal action against responsible persons and departments.

There is no denying that the implementation of internet-connected medical devices has been lightning fast, leaving no time for IT experts to automate the management or update processes of these devices.

It is imperative that healthcare service providers take their ICS security seriously, fix or update software as necessary, and move on to true smart devices. These practices can help them manage and mitigate risk in existing infrastructure to ensure that patient privacy and safety goals are met.


About the Author: Isla Sibanda is an ethical hacker and cybersecurity specialist based out of Pretoria. For over twelve years, she’s worked as a cybersecurity analyst and penetration testing specialist for several reputable companies – including Standard Bank Group, CipherWave, and Axxess.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” ICS Security in Healthcare: Why Software Vulnerabilities Pose a Threat to Patient Safety” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Critical Severity, Encryption, Finance, Goverment, Hacker, High Severity, Malware, Medium Severity, Privacy, Ransomware, TripWire

Continue Reading

Previous Zero-Day ‘Follina’ Bug Lays Older Microsoft Office Versions Open to Attack
Next Microsoft Releases Workarounds for Office Vulnerability Under Active Exploitation

More Stories

  • Data Breach

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability

http://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html

22 hours ago [email protected] (The Hacker News)

Recent Posts

  • Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
  • The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
  • Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
  • CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT