Hospitals face cybersecurity risks in surprising new ways

June 17, 2022

While ransomware attacks have been stealing the headlines, threats can come from many sources making it critical for healthcare organizations to have a comprehensive cybersecurity strategy.

Cyber threats take many forms and while the degree of sophistication can vary, every cyberattack has the potential to impact the availability, integrity or confidentiality of your system and the data within it.  Cyber threats can happen anywhere within your organization or sneak in through third-party vendors.

Ransomware attacks are currently the number one threat to healthcare organizations. More than half of healthcare organizations were hit by a ransomware attack in 2021 and of those, 66% said the cybercriminals were successful in encrypting their data. Ransomware threat actors are getting more sophisticated and the cost to retrieve sensitive data from cybercriminals is rising.

While ransomware attacks have been stealing the headlines, threats can come from many sources making it critical for healthcare organizations to have a comprehensive cybersecurity strategy.  During a February 16, 2022, HealthLeaders webinar, Securing the Healthcare Enterprise in ‘The New Normal’, presenters Christine Wheaton, Chief Privacy and Security Officer at Henry Ford Health in Detroit, MI and Jacqueline Sullivan, VP of Security Operations Coordination for Minneapolis-based U.S. Bank, discussed some strategies that organizations can use to protect against cyber threats.

 

1. Comprehensive training

Tried and true cybersecurity practices still hold up. Make sure your workforce is getting periodic cybersecurity safety training and ensure staff members are aware of the risks around the data.

 

2. Proactive practices

When looking at a new solution, a new medical device, even a new web application solution, make sure your security and risk experts are involved from the start.  As part of the evaluation, your security and risk team can identify potential vulnerabilities and determine if they can be addressed.

 

3. Identify your weaknesses

Every organization has a unique environment with its own vulnerabilities. Establish a workflow between your security team who are identifying vulnerabilities and determining risk and your IT teams who manage the assets and who can remediate.

 

4. Vet your vendors

Ensure that third party vendors have adequate cybersecurity measures in place. Conduct a supplier risk assessment to identify potential areas of risk with third party vendors and the fourth party vendors that provide services and supplies to them.

For more information, read our guide to Protecting your healthcare organization from cyber criminals   featuring additional insights from Christine Wheaton and Jacqueline Sullivan.

 

Tyler Eppley is the vice president of healthcare payment solutions at U.S. Bank and has worked exclusively with providers for more than 15 years to optimize revenue cycle operations and improve the patient experience.

Related content

Liquidity management: A renewed focus for European funds

3 tips to maintain flexibility in supply chain management

5 questions you should ask your custodian about outsourcing

Insource or outsource? 10 considerations

The benefits of a full-service warehouse custodian

Cryptocurrency custody 6 frequently asked questions

10 ways a global custodian can support your growth

What is Medicare? Understanding your coverage options

Is your employer long term disability insurance enough?

How a Health Savings Account (HSA) can benefit your retirement plan

Healthcare costs in retirement: Are you prepared?

7 things to know about long-term care insurance

How to keep your assets safe

How to save money in college: easy ways to spend less

Learn to spot and protect yourself from common student scams

What is financial fraud?

Webinar: How to stay safe from cyberfraud

7 ways to teach your children to be scam-savvy

How to spot an online scam

Money muling 101: Recognizing and avoiding this increasingly common scam

How-to guide: What to do if your identity is stolen

Keep your finances safe and secure: Essential tips for preventing check fraud

How you can prevent identity theft

4 ways to outsmart your smart device

Mobile banking tips for smarter and safer online banking

P2P payments make it easier to split the tab

Why a mobile banking app is a ‘must have’ for your next vacation

Dear Money Mentor: How do I set and track financial goals?

7 financial questions to consider when changing jobs

3 awkward situations Zelle can help avoid

Dear Money Mentor: How do I begin paying off credit card debt?

How to plan and save for adoption and in vitro fertility treatment costs

3 steps to prepare for a medical emergency

When your spouse has passed away: A three-month financial checklist

What documents do you need after a loved one dies?

Myth vs. truth: What affects your credit score?

Streamline operations with all-in-one small business financial support

How mobile point of sale (mPOS) can benefit your side gig

Checklist: What you’ll need for your first retail pop-up shop

Small business growth: 6 strategies for scaling your business

Healthcare marketing: How to promote your medical practice

Rethinking common time management tips

How Everyday Funding can improve cash flow

How to accept credit cards online

How jumbo loans can help home buyers and your builder business

How to apply for a business credit card

6 common financial mistakes made by dentists (and how to avoid them)

Improve government payments with electronic billing platforms

Benefits of billing foreign customers in their own currency

6 timely reasons to integrate your receivables

Third-party vendor risk: protecting your company against cyber threats

The password: Enhancing security and usability

Webinar: Robotic process automation

Risk management strategies for foreign exchange hedging

5 Ways to protect your government agency from payment fraud

Proactive ways to fight vendor fraud

The latest on cybersecurity: Mobile fraud and privacy concerns

Hospitals face cybersecurity risks in surprising new ways

Government agency credit card programs and PCI compliance

Fraud prevention checklist

Fight the battle against payments fraud

Cybersecurity – Protecting client data through industry best practices

Cybercrisis management: Are you ready to respond?

Avoiding the pitfalls of warehouse lending

Authenticating cardholder data reduce e-commerce fraud

Why Know Your Customer (KYC) — for organizations

Post-pandemic fraud prevention lessons for local governments

How to improve your business network security

Webinar: CRE technology trends

BEC: Recognize a scam

White Castle optimizes payment transactions

Ways prepaid cards disburse government funds to the unbanked

Unexpected cost savings may be hiding in your payment strategy

The surprising truth about corporate cards

The future of financial leadership: More strategy, fewer spreadsheets

Tap-to-pay: Modernizing fare payments pays off for transit agencies and riders

Standardizing healthcare payments

COVID-19 safety recommendations: Are you ready to reopen?

Restaurant surveys show changing customer payment preferences

3 ways to make practical use of real-time payments

Modernizing fare payment without leaving any riders behind

3 benefits of integrated payments in healthcare

Higher education and the cashless society: Latest trends

Three healthcare payment trends that will continue to matter in 2022

Meeting healthcare strategy goals with electronic patient refunds

Enhancing the patient experience through people-centered payments

5 winning strategies for managing liquidity in volatile times

Digital trends poised to reshape hotel payments

Top 3 ways digital payments can transform the patient experience

Webinar: AP automation for commercial real estate

Consolidating payments for healthcare systems

Automate accounts payable to optimize revenue and payments

Access, flexibility and simplicity: How governments can modernize payments to help their citizens

Want AP automation to pay both businesses and consumers?

Understanding and preparing for the new payment experience

Safeguarding the payment experience through contactless

Payment industry trends that are the future of POS

4 benefits to paying foreign suppliers in their own currency

Managing the rising costs of payment acceptance with service fees

Increase working capital with Commercial Card Optimization

How to improve digital payments security for your health system

How real-time inventory visibility can boost retail margins

Escheatment resources: Reporting deadlines for all 50 states

Webinar: CSM corporation re-thinks AP

Automate escheatment for accounts payable to save time and money

Webinar: Approaching international payment strategies in today’s unpredictable markets.

ABCs of APIs: Drive treasury efficiency with real-time connectivity

Protecting cash balances with sweep vehicles

Alternative investments: How to track returns and meet your goals

Colleges respond to student needs by offering digital payments

Manufacturing: 6 supply chain optimization strategies

Webinar: CRE Digital Transformation – Balancing Digitization with cybersecurity risk

Automating healthcare revenue cycle

Overcoming the 3 key challenges of a lump sum relocation program

Start of disclosure content

Loan approval is subject to credit approval and program guidelines. Not all loan programs are available in all states for all loan amounts. Interest rate and program terms are subject to change without notice. Mortgage, Home Equity and Credit products are offered through U.S. Bank National Association. Deposit products are offered through U.S. Bank National Association. Member FDIC.