Author:
Willing Markus,Dresen Christian,Haverkamp Uwe,Schinzel Sebastian
Abstract
Abstract
Background
Modern healthcare devices can be connected to computer networks and many western healthcare institutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence that cybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively, the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods
To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitals and especially University Medical Center UMCs.
Results
The results show a strong correlation between the networking degree and the number of medical devices. The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual key users of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, Nuclear Medicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medical devices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strong correlation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquired hospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion of competencies on an organizational level facilitates the right behavior here. Most hospitals rated themselves predominantly positively in the self-assessment but also stated the usefulness of IT security insurance.
Conclusions
Concluding our results, hospitals are already facing the consequences of omitted measures within their growing pool of medical devices. Continuously relying on historically grown structures without adaption and trusting manufactures to solve vectors is a critical behavior that could seriously endanger patients.
Publisher
Springer Science and Business Media LLC
Subject
Health Informatics,Health Policy,Computer Science Applications
Reference56 articles.
1. Beavers J, Pournouri S. In: Jahankhani H, Kendzierskyj S, Jamal A, Epiphaniou G, Al-Khateeb H, (eds).Recent Cyber Attacks and Vulnerabilities in Medical Devices and Healthcare Institutions. Cham: Springer; 2019, pp. 249–267. https://doi.org/10.1007/978-3-030-11289-9\_11.
2. Martin G, Martin P, Hankin C, Darzi A, Kinross J. Cybersecurity and healthcare: how safe are we?BMJ. 2017; 358. https://doi.org/10.1136/bmj.j3179.
3. Chinthapalli K. The hackers holding hospitals to ransom. BMJ. 2017; 357. https://doi.org/10.1136/bmj.j2214.
4. Dyer O. Hackers demand ransom to release encrypted us medical records. BMJ. 2016; 353. https://doi.org/10.1136/bmj.i1876.
5. Statistisches Bundesamt. Gesundheit: Grunddaten der Krankenhäuser 2017. 2018. https://www.destatis.de/DE/Themen/Gesellschaft-Umwelt/Gesundheit/Krankenhaeuser/Publikationen/ Downloads-Krankenhaeuser/grunddaten-krankenhaeuser-2120611177004.pdf;jsessionid= 0CAA26E928B3E074ECE37B118AAA064D.internet742?\__blob=publicationFile. Accessed 15 Jan 2020.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献