Healthcare IT organizations often lack budget and personnel to address security needs Credit: Thinkstock About 32% of hospitals and 52% of non-acute providers — such as outpatient clinics, rehabilitation facilities and physicians’ offices — are not encrypting data in transit, according to a new survey.Additionally, only 61% of acute providers and 48% of non-acute providers are encrypting data at rest.This “leaves the door wide open to potential tampering and corruption of the data, in addition to a large potential for a breach,” the report stated. “If a computer, laptop, thumb drive, or backup were to be stolen, any person would be able to access such information.” HIMSSThe survey, conducted by the Healthcare Information and Management Systems Society (HIMSS), a Chicago-based trade group for the health information technology sector, also revealed that many of the facilities’ networks don’t even have firewalls. “The results are surprising,” the HIMSS report stated, because only 78% of acute care facilities (healthcare systems and hospitals) and 90% of non-acute facilities are using firewalls; some 85% of acute care facilities and 90% of non-acute providers are using antivirus and anti-malware software. HIMSSWhen asked to project the motivations of cyber criminals based on the threats experienced, the vast majority of healthcare organization respondents (77%) cited medical identity theft as the primary motivation.“With tens of thousands of malware variants being generated each day, this lack of defense may leave an organization wide open to compromise,” the report stated. “Without the use of a firewall… providers likely lack the ability to prevent or mitigate virus, malware, and other forms of malicious or undesirable software.” Firewalls monitor and filter network traffic, so not having them may leave an organization susceptible to compromise. “Simply put, firewalls are a basic component of network security,” the report stated.The HIMSS Cybersecurity Survey received responses between February 15 and May 15, 2016 from 119 acute care providers and 31 non-acute care facilities, which included physicians’ offices and home health agencies.Number one on healthcare providers’ cybersecurity concerns was ransomware attacks, through which cyber criminals hack into a healthcare database and hold it hostage until a ransom is paid. Ransomware attacks were cited by 69% of respondents as a significant threat to healthcare IT system security. HIMSSHealthcare organizations have reason to be wary. Cyberattacks will cost hospitals more than $305 billion over the next five years, and one in 13 patients will have their data compromised by a hack, according to industry consultancy Accenture.A study by the Brookings Institution predicts that one in four data breaches this year will hit the healthcare industry.The recent study by Brookings showed that since late 2009, the medical information of more than 155 million Americans has been exposed without their permission through about 1,500 breaches. HIMSSThe percentage of acute and non-acute healthcare facilities that have implemented various forms of IT security.The new HIMSS study showed that healthcare IT organizations rely on a limited portfolio of security tools, which may be due to providers lacking appropriate personnel and/or budgets to address their needs.Acute care providers, the study found, appear to have a greater array of security technologies in their portfolio than do non-acute providers.Many healthcare organizations are also struggling with network patch and vulnerability management. Only 61% of acute cate providers and 42% of non-acute providers say they have a patch and vulnerability management program, the survey found.“Essentially, where technology exists, there are vulnerabilities. Such vulnerabilities can sometimes have a high likelihood of exploitation,” the study stated. “Without a program in place, there can be a large time window for hackers to exploit an unpatched system (especially if systems are patched or upgraded on a reactive, ad hoc basis). Time is money, including for hackers, and they are likely to go after low hanging fruit.” Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe