Hospitals face cybersecurity risks in surprising new ways

June 17, 2022

While ransomware attacks have been stealing the headlines, threats can come from many sources making it critical for healthcare organizations to have a comprehensive cybersecurity strategy.

Cyber threats take many forms and while the degree of sophistication can vary, every cyberattack has the potential to impact the availability, integrity or confidentiality of your system and the data within it.  Cyber threats can happen anywhere within your organization or sneak in through third-party vendors.

Ransomware attacks are currently the number one threat to healthcare organizations. More than half of healthcare organizations were hit by a ransomware attack in 2021 and of those, 66% said the cybercriminals were successful in encrypting their data. Ransomware threat actors are getting more sophisticated and the cost to retrieve sensitive data from cybercriminals is rising.

While ransomware attacks have been stealing the headlines, threats can come from many sources making it critical for healthcare organizations to have a comprehensive cybersecurity strategy.  During a February 16, 2022, HealthLeaders webinar, Securing the Healthcare Enterprise in ‘The New Normal’, presenters Christine Wheaton, Chief Privacy and Security Officer at Henry Ford Health in Detroit, MI and Jacqueline Sullivan, VP of Security Operations Coordination for Minneapolis-based U.S. Bank, discussed some strategies that organizations can use to protect against cyber threats.

 

1. Comprehensive training

Tried and true cybersecurity practices still hold up. Make sure your workforce is getting periodic cybersecurity safety training and ensure staff members are aware of the risks around the data.

 

2. Proactive practices

When looking at a new solution, a new medical device, even a new web application solution, make sure your security and risk experts are involved from the start.  As part of the evaluation, your security and risk team can identify potential vulnerabilities and determine if they can be addressed.

 

3. Identify your weaknesses

Every organization has a unique environment with its own vulnerabilities. Establish a workflow between your security team who are identifying vulnerabilities and determining risk and your IT teams who manage the assets and who can remediate.

 

4. Vet your vendors

Ensure that third party vendors have adequate cybersecurity measures in place. Conduct a supplier risk assessment to identify potential areas of risk with third party vendors and the fourth party vendors that provide services and supplies to them.

For more information, read our guide to Protecting your healthcare organization from cyber criminals   featuring additional insights from Christine Wheaton and Jacqueline Sullivan.

 

Tyler Eppley is the vice president of healthcare payment solutions at U.S. Bank and has worked exclusively with providers for more than 15 years to optimize revenue cycle operations and improve the patient experience.

Related content

The latest on cybersecurity: Mobile fraud and privacy concerns

How a Health Savings Account (HSA) can benefit your retirement plan

Liquidity management: A renewed focus for European funds

Cryptocurrency custody 6 frequently asked questions

3 tips to maintain flexibility in supply chain management

5 questions you should ask your custodian about outsourcing

Insource or outsource? 10 considerations

10 ways a global custodian can support your growth

The benefits of a full-service warehouse custodian

Colleges respond to student needs by offering digital payments

6 timely reasons to integrate your receivables

Benefits of billing foreign customers in their own currency

Improve government payments with electronic billing platforms

Third-party vendor risk: protecting your company against cyber threats

Hospitals face cybersecurity risks in surprising new ways

Authenticating cardholder data reduce e-commerce fraud

Post-pandemic fraud prevention lessons for local governments

Webinar: Robotic process automation

Risk management strategies for foreign exchange hedging

Proactive ways to fight vendor fraud

Webinar: CRE technology trends

5 Ways to protect your government agency from payment fraud

Avoiding the pitfalls of warehouse lending

Fight the battle against payments fraud

Fraud prevention checklist

Cybercrisis management: Are you ready to respond?

Why Know Your Customer (KYC) — for organizations

The password: Enhancing security and usability

How to improve your business network security

Government agency credit card programs and PCI compliance

Cybersecurity – Protecting client data through industry best practices

BEC: Recognize a scam

Meeting healthcare strategy goals with electronic patient refunds

Standardizing healthcare payments

Consolidating payments for healthcare systems

Access, flexibility and simplicity: How governments can modernize payments to help their citizens

Modernizing fare payment without leaving any riders behind

Tap-to-pay: Modernizing fare payments pays off for transit agencies and riders

Webinar: Approaching international payment strategies in today’s unpredictable markets.

How real-time inventory visibility can boost retail margins

Escheatment resources: Reporting deadlines for all 50 states

Payment industry trends that are the future of POS

White Castle optimizes payment transactions

ABCs of APIs: Drive treasury efficiency with real-time connectivity

Managing the rising costs of payment acceptance with service fees

Three healthcare payment trends that will continue to matter in 2022

Want AP automation to pay both businesses and consumers?

Webinar: CSM corporation re-thinks AP

Increase working capital with Commercial Card Optimization

How to improve digital payments security for your health system

3 benefits of integrated payments in healthcare

Top 3 ways digital payments can transform the patient experience

Automate accounts payable to optimize revenue and payments

Automate escheatment for accounts payable to save time and money

Ways prepaid cards disburse government funds to the unbanked

Webinar: AP automation for commercial real estate

Understanding and preparing for the new payment experience

Safeguarding the payment experience through contactless

COVID-19 safety recommendations: Are you ready to reopen?

Higher education and the cashless society: Latest trends

5 winning strategies for managing liquidity in volatile times

3 ways to make practical use of real-time payments

The surprising truth about corporate cards

The future of financial leadership: More strategy, fewer spreadsheets

4 benefits to paying foreign suppliers in their own currency

Restaurant surveys show changing customer payment preferences

Unexpected cost savings may be hiding in your payment strategy

Digital trends poised to reshape hotel payments

Enhancing the patient experience through people-centered payments

Protecting cash balances with sweep vehicles

Alternative investments: How to track returns and meet your goals

Automating healthcare revenue cycle

Manufacturing: 6 supply chain optimization strategies

Overcoming the 3 key challenges of a lump sum relocation program

Webinar: CRE Digital Transformation – Balancing Digitization with cybersecurity risk

Streamline operations with all-in-one small business financial support

Checklist: What you’ll need for your first retail pop-up shop

How mobile point of sale (mPOS) can benefit your side gig

Small business growth: 6 strategies for scaling your business

Healthcare marketing: How to promote your medical practice

Rethinking common time management tips

6 common financial mistakes made by dentists (and how to avoid them)

How to apply for a business credit card

How jumbo loans can help home buyers and your builder business

How to accept credit cards online

How Everyday Funding can improve cash flow

Healthcare costs in retirement: Are you prepared?

Is your employer long term disability insurance enough?

What is Medicare? Understanding your coverage options

7 things to know about long-term care insurance

How to keep your assets safe

3 steps to prepare for a medical emergency

How to plan and save for adoption and in vitro fertility treatment costs

When your spouse has passed away: A three-month financial checklist

What documents do you need after a loved one dies?

How to save money in college: easy ways to spend less

Learn to spot and protect yourself from common student scams

7 ways to teach your children to be scam-savvy

Keep your finances safe and secure: Essential tips for preventing check fraud

Webinar: How to stay safe from cyberfraud

4 ways to outsmart your smart device

How to spot an online scam

Money muling 101: Recognizing and avoiding this increasingly common scam

What is financial fraud?

How-to guide: What to do if your identity is stolen

How you can prevent identity theft

Why a mobile banking app is a ‘must have’ for your next vacation

Mobile banking tips for smarter and safer online banking

3 awkward situations Zelle can help avoid

Dear Money Mentor: How do I set and track financial goals?

7 financial questions to consider when changing jobs

P2P payments make it easier to split the tab

Dear Money Mentor: How do I begin paying off credit card debt?

Myth vs. truth: What affects your credit score?

Disclosures

Start of disclosure content

Loan approval is subject to credit approval and program guidelines. Not all loan programs are available in all states for all loan amounts. Interest rate and program terms are subject to change without notice. Mortgage, Home Equity and Credit products are offered through U.S. Bank National Association. Deposit products are offered through U.S. Bank National Association. Member FDIC.