Skip to main content

The flu is poking holes in hospital cybersecurity, and a shot can’t save you

Hospital Cybersecurity
BSIP/Getty Images
BSIP/Getty Images

(in)Secure is a weekly column that dives into the rapidly escalating topic of cybersecurity.

When it comes to cybersecurity breaches, we tend to think of large corporations or governmental institutions that hold vast amounts of personal data. However, hospitals and medical centers are organizations that hold onto thousands of personal records. When they’re hit by epidemics as bad this year’s flu outbreak, they’re left completely vulnerable to a cyberattack that could touch their patients’ valuable medical records.

We spoke with Shane Whitlatch, an executive at the cybersecurity company FairWarning, whose clients are hospitals that have been or could one day be the victims of cybersecurity attacks. According to their information, something as harmless as checking in to a hospital when you have the flu could have huge ramifications on your cybersecurity — and you would never even know about it.

Digital Trends: This year’s flu outbreak was particularly bad. What kind of things happen at a hospital during something like a flu outbreak, that can have such a negative impact on a hospital’s cybersecurity?

Shane Whitlatch: The flu epidemic is just another crisis. There can be many different types, but what’s important in a crisis isn’t necessarily what happens right there during the actual event. What’s important is whether or not [the hospital] planned well before the crisis. Did you have processes, programs, and action items in place that prepare you so that when you do have a crisis — whether it’s a flu epidemic, a terrorist attack, or train accident — you aren’t left vulnerable to a cybersecurity attack.

“Are there steps I can skip so I process patient care faster and put less priority on security?”

It’s oversight. People start to skip steps. If I normally check in 10 patients an hour, but now I’m going to get double that, I need to move faster if I’m going to see these patients. Can I just stayed signed in? Do I have to badge in? Are there steps I can skip so that I process patient care faster and put less of a priority on security?

Criminals look for opportunities — and the during the flu outbreak, they know the focus is going to be on those events. So maybe there’s an opportunity for them there when employees are leaving sign-ins logged on to computers longer because they’re busy seeing more patients than they normally do. Maybe it means they’re sharing credentials more frequently because they’re focused on patient care. It just presents opportunity. If you don’t train your staff and you aren’t prepared — you’re going to not only hit by the crisis, but also by criminals who are looking to exploit those opportunities.

Is there a precedent for hospitals being hacked or attacked by cyber-criminals? Is that something that is happening regularly?

If it hasn’t happened yet, they probably just don’t know about it yet. So the answer is yes.

https://twitter.com/Merck/status/879716775021170689

We’ve got an example — and this is in the public record — of Hurley Medical Center in Flint Michigan. It had hacktivist attacks going after medical record associated with the water crisis up there. I think the answer is “yes,” but I’d like to let third-parties be the reference points for that.

In the case of something like a hack, what should people be worried about as patients?

There are some things that are obvious, and some that are less so. The most obvious thing is your insurance information. That’s what’s valuable. They wouldn’t steal the data if it wasn’t valuable. They can take your insurance information, change your mailing address, and sell that to someone who can’t get insurance. That’s the first thing — so pay attention to your EOB (explanation of benefits) letters that you get in the mail. If it says you got some treatment for something that was covered that you never received, that’s a problem. That could maximize your benefits and hit your deductible and you never even got care. Those are the obvious ones.

They wouldn’t steal the data if it wasn’t valuable.

The ones that aren’t so obvious we’ve heard from our customers are where people have changed information on the stolen medical records. If I’m using a stolen ID and I go to a local hospital somewhere — and let’s say I haven’t been treated there before and I have a fake ID — to get seek care for something like a broken arm, or something worse, which it usually is. But if my blood type is different than the person it was stolen from, the hospital might change your blood type on your medical record because they assumed the person didn’t know their blood type. That may not matter to you now, but if you get in a car accident and need a blood transfusion or something like that, they might put the wrong blood in. That’s a less obvious consequence — and it can be a deadly one.

Right now, do you feel like hospitals are aware of how important cybersecurity is?

Certainly, now more than before. Our customers, obviously, are aware of them and are fighting the good fight. What’s encouraging from what I’m hearing from them and from the executives themselves, is that the board is becoming more aware.

insecure flu cybersecurity hospital computer
Jose Luis Pelaez Inc/Getty Images
Jose Luis Pelaez Inc/Getty Images

That’s partially because of education and because of very public breaches. The Anthem breach was a major one. There are very large breaches that are making the news where board members are seeing it and starting to ask questions. It’s becoming more well-known outside of just IT security, but absolutely IT security is aware of it.

Is there anything that patients can do to protect their own medical information when they’re checking into a hospital or interacting with their health records in any way?

I’ll speak personally — I try not to share my social security number as best I can. It’s probably already stolen anyways. The other thing you can always do is ask for an accounting of disclosures, which gives you a record of everyone who’s touched your records — and that’s part of a federal law.

The other thing is just being vigilant about where you go to seek care and what you do with your information and who you share it with. Pay attention to the forms they have you sign. When they ask if they can share your information, don’t just blindly sign all of them. Ask questions about it. Be vigilant. And when you do that, it’s another form of educating the hospital staff that this privacy things does matter. It’s not just a poster on a wall.

Luke Larsen
Senior Editor, Computing
Luke Larsen is the Senior editor of computing, managing all content covering laptops, monitors, PC hardware, Macs, and more.
I can’t believe I’m recommending Forspoken on PS5 over PC
Frey using magic in Forspoken.

I'll almost always recommend a PC release over a console release. You have access to more graphics options, more opportunities to optimize your performance, and a community-driven support system for modifying or repairing your games. That's especially true as the current generation of consoles begin to show their age.

But there is still an unsung advantage of playing games on console over a PC, and Square Enix's Forspoken brings that advantage the PS5 has over PC into the spotlight.
Forspoken on PS5
Forspoken PS5 Quality vs. Performance vs. Ray Tracing

Read more
Typos can get you hacked in latest cybersecurity threat
A faceless hooded hacker busily types on a laptop.

Even a simple and common error like mistyping a domain name can lead to cybersecurity attacks, the latest in the ongoing barrage of malware. Known as URL hijacking or "typosquatting," this social engineering technique is built upon the knowledge that it's easy to hit the incorrect key and end up visiting the wrong website.

With very little effort, a hacker can copy images, fonts, and text to construct a malware website that looks like PayPal, Google Wallet, Microsoft Visual Studio, MetaMask, and other popular websites. These fake websites are also used in phishing campaigns of all sorts since the similarity of the domain name is useful for a whole variety of confidence stings.

Read more
Can’t get the Windows 11 22H2 update? There could be a good reason why
heres whats coming in windows 10 build 11099 hello

If you've been waiting for the Windows 11 22H2 update or just noticed that one computer hasn't been asking you to update while others have, there could be a very good reason for the delay. If you've been tempted to manually install the latest version by using the Update Now button or the Media Creation Tool, Microsoft recommends against it.

According to Microsoft, the Windows 11 22H2 update could interfere with signing in with Windows Hello in some circumstances. Microsoft notes that the trouble arises on devices that have Windows Hello enabled before installing the update. However, setting up Windows Hello afterward doesn't cause any issues.

Read more