{"id":197,"date":"2025-04-22T16:13:47","date_gmt":"2025-04-22T16:13:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/briannalyon\/?p=197"},"modified":"2025-04-22T16:13:47","modified_gmt":"2025-04-22T16:13:47","slug":"healthcare-under-cyber-attack","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/briannalyon\/2025\/04\/22\/healthcare-under-cyber-attack\/","title":{"rendered":"Healthcare under cyber attack"},"content":{"rendered":"\n<p><br>We can agree that protecting our healthcare system is a top priority when it<br>comes to cybersecurity. It is listed as one of our critical infrastructures. With everything<br>moving from paper to electronic copies, we can see how detrimental it would be for a<br>cyber-attack to occur on any business, let alone a hospital. Hospitals contain PII and<br>PHI. Data like social security numbers, insurance information, and payment details,<br>could make for a very high target for hackers to consider. Hackers could also degrade<br>the operations of a hospital. In the NPR article, Cyberattack led to harrowing lapses at<br>Ascension Hospitals, clinicians say \u201cdelayed or lost lab results, medication errors, and<br>an absence of routine safety checks via technology\u201d (Pradhan &amp; Wells). We are<br>dealing with mistakes that could result in fatalities and the horrible scars they would<br>have on families and employees alike. To ensure safe cybersecurity we must be<br>more active, especially with the advancement of technology and hackers.<br>One of the problems with healthcare systems and long downtimes that<br>contribute to the degradation of the work at hospitals is the lack of an emergency<br>plan. One of the main ways to combat the issue of downtime due to hackers is<br>going \u201cback to paper\u201d (Pradhan &amp; Wells). This could cause issues within the hospital<br>like losing or missing paperwork, slower work times, false or inaccurate paperwork,<br>etc. \u201cIn 2023, the health sector experienced the largest share of ransomware<br>attacks of 16 infrastructure sectors considered vital to national security or safety\u201d<br>(Pradhan &amp; Wells). Knowing this I believe healthcare systems should be treated<br>with a higher level of security due to the increased threat. To me, it seems that the<br>standards for healthcare systems are not treated as seriously and the funding for<br>cybersecurity is a lack thereof. Hospitals are businesses and just like any business<br>they should have a solid and strong cybersecurity system. This ensures the<br>protection of data and lessens the opportunities for hackers to attack.<br>DNA Data in health care<br>(1) Now that we talked about the detrimental effects hackers have in<br>healthcare, we can get more specific. The health industry has a lot of personal data<br>on computers. Even more so with coding our DNA. Using our DNA and turning it<br>into Binary Code (Coldeway). What\u2019s the point? The point just like how we don\u2019t use<br>paper anymore, is that it is quicker and more efficient. It\u2019s easier to read compare<br>and analyze across millions of other DNA samples (Coldeway). The problem is now<br>we have more personal data that hackers could have access to and that hackers<br>could be motivated more by. I believe that companies shouldn\u2019t have the authority to<br>code your DNA. The DNA is mine, not for companies to do with what they please.<br>DNA should be taken and used for only what is needed. Not to store and upload to<br>a computer to compare and analyze. How do I know that they are being responsible<br>and using the correct cybersecurity methods?<br>(2) As I said before, healthcare is a high target and has gone through many<br>attacks. They have highly sensitive material that makes them a Prime target. The<br>exposure of our DNA could be life-threatening. The responsibility of the healthcare<br>system is extreme. Being detailed in the Framework Core is essential. As<br>technology becomes more advanced (DNA coding), we need a stronger core. We<br>should start at the top of the Core PROTECT (Barrett). Things like stronger<br>encryption, access controls, and regular updates should be taken more seriously<br>even though it may seem mundane. Also, it seems that we lack proper training in<br>cybersecurity especially in employees who have no connection with it (nurses,<br>doctors). A breach in one person\u2019s identity is a serious offense and should result in<br>a more serious punishment if evidence is found to have holes in its cybersecurity<br>fundamentals. Audits may be necessary, especially with the heaviness of PII and<br>PHI.<br>Conclusion<br>Every business has an important role to take when it comes to the protection of<br>data. As a society, we should ensure the protection of everyone\u2019s data, especially in the<br>healthcare field. As technology grows and businesses start using cyber for more and<br>more practices, we should also improve our security. Using the Framework Core is a<br>good start. Cyber is becoming more incorporated into our every day and one thing that<br>can ensure the right practices is good training. Whether that be personal or professional<br>it can lead to a positive cyber environment.<br>Works Cited<br>Barrett, M. P. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version<br>1.1. https:\/\/doi.org\/10.6028\/nist.cswp.04162018<br>Coldewey, D. (2017, August 10). Malicious code written into DNA infects the computer that<br>reads it. TechCrunch. https:\/\/techcrunch.com\/2017\/08\/09\/malicious-code-written-into-dna-<br>infects-the-computer-that-reads-it\/<br>Pradhan, R., &amp; Wells, K. (2024, June 19). Cyberattack led to harrowing lapses at Ascension<br>Hospitals, clinicians say. NPR. https:\/\/www.npr.org\/2024\/06\/19\/nx-s1-5010219\/ascension-<br>hospital-ransomware-attack-care-lapses<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We can agree that protecting our healthcare system is a top priority when itcomes to cybersecurity. It is listed as one of our critical infrastructures. With everythingmoving from paper to electronic copies, we can see how detrimental it would be for acyber-attack to occur on any business, let alone a hospital. Hospitals contain PII andPHI&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/briannalyon\/2025\/04\/22\/healthcare-under-cyber-attack\/\">Read More<\/a><\/div>\n","protected":false},"author":30434,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/posts\/197"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/users\/30434"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"predecessor-version":[{"id":198,"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/posts\/197\/revisions\/198"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/briannalyon\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}