In the past two months, dozens of temporary coronavirus field hospitals have cropped up across the world, creating a unique set of cyber security challenges.
“They’re remote, they sit outside of a defense-in-depth architecture and the very nature of their purpose –care in a time of crisis- means security is a lower priority.”
As a result, cyber criminals can potentially snatch personal health information, spread ransomware, or cause medical device abnormalities, leading to life-threatening circumstances.
And, in addition to presenting an independent risk, field hospitals also present a risk to the primary medical facilities that they’re affiliated with, as they often retain insecure endpoints.
“…these temporary medical units [field hospitals] leave the connected medical environment more exposed than ever before,” says one industry expert.
Best cyber practices for protecting field hospitals include:
- Running through cyber attack drills (in the way that you’d run through a fire drill)
- Ensuring that your system is backed up in an offline location, as to circumnavigate the effects of a ransomware attack
- Securing all endpoints and segmenting your network
- Protect cloud-based EHR systems and maintain compliance with HIPPA
- Embeding security into IoT infrastructure, such as monitoring devices and smart beds
For more information on protecting hospitals from cyber attacks, read this blog post.