Skip to main content

The flu is poking holes in hospital cybersecurity, and a shot can’t save you

Hospital Cybersecurity
BSIP/Getty Images
BSIP/Getty Images

(in)Secure is a weekly column that dives into the rapidly escalating topic of cybersecurity.

When it comes to cybersecurity breaches, we tend to think of large corporations or governmental institutions that hold vast amounts of personal data. However, hospitals and medical centers are organizations that hold onto thousands of personal records. When they’re hit by epidemics as bad this year’s flu outbreak, they’re left completely vulnerable to a cyberattack that could touch their patients’ valuable medical records.

We spoke with Shane Whitlatch, an executive at the cybersecurity company FairWarning, whose clients are hospitals that have been or could one day be the victims of cybersecurity attacks. According to their information, something as harmless as checking in to a hospital when you have the flu could have huge ramifications on your cybersecurity — and you would never even know about it.

Digital Trends: This year’s flu outbreak was particularly bad. What kind of things happen at a hospital during something like a flu outbreak, that can have such a negative impact on a hospital’s cybersecurity?

Shane Whitlatch: The flu epidemic is just another crisis. There can be many different types, but what’s important in a crisis isn’t necessarily what happens right there during the actual event. What’s important is whether or not [the hospital] planned well before the crisis. Did you have processes, programs, and action items in place that prepare you so that when you do have a crisis — whether it’s a flu epidemic, a terrorist attack, or train accident — you aren’t left vulnerable to a cybersecurity attack.

“Are there steps I can skip so I process patient care faster and put less priority on security?”

It’s oversight. People start to skip steps. If I normally check in 10 patients an hour, but now I’m going to get double that, I need to move faster if I’m going to see these patients. Can I just stayed signed in? Do I have to badge in? Are there steps I can skip so that I process patient care faster and put less of a priority on security?

Criminals look for opportunities — and the during the flu outbreak, they know the focus is going to be on those events. So maybe there’s an opportunity for them there when employees are leaving sign-ins logged on to computers longer because they’re busy seeing more patients than they normally do. Maybe it means they’re sharing credentials more frequently because they’re focused on patient care. It just presents opportunity. If you don’t train your staff and you aren’t prepared — you’re going to not only hit by the crisis, but also by criminals who are looking to exploit those opportunities.

Is there a precedent for hospitals being hacked or attacked by cyber-criminals? Is that something that is happening regularly?

If it hasn’t happened yet, they probably just don’t know about it yet. So the answer is yes.

https://twitter.com/Merck/status/879716775021170689

We’ve got an example — and this is in the public record — of Hurley Medical Center in Flint Michigan. It had hacktivist attacks going after medical record associated with the water crisis up there. I think the answer is “yes,” but I’d like to let third-parties be the reference points for that.

In the case of something like a hack, what should people be worried about as patients?

There are some things that are obvious, and some that are less so. The most obvious thing is your insurance information. That’s what’s valuable. They wouldn’t steal the data if it wasn’t valuable. They can take your insurance information, change your mailing address, and sell that to someone who can’t get insurance. That’s the first thing — so pay attention to your EOB (explanation of benefits) letters that you get in the mail. If it says you got some treatment for something that was covered that you never received, that’s a problem. That could maximize your benefits and hit your deductible and you never even got care. Those are the obvious ones.

They wouldn’t steal the data if it wasn’t valuable.

The ones that aren’t so obvious we’ve heard from our customers are where people have changed information on the stolen medical records. If I’m using a stolen ID and I go to a local hospital somewhere — and let’s say I haven’t been treated there before and I have a fake ID — to get seek care for something like a broken arm, or something worse, which it usually is. But if my blood type is different than the person it was stolen from, the hospital might change your blood type on your medical record because they assumed the person didn’t know their blood type. That may not matter to you now, but if you get in a car accident and need a blood transfusion or something like that, they might put the wrong blood in. That’s a less obvious consequence — and it can be a deadly one.

Right now, do you feel like hospitals are aware of how important cybersecurity is?

Certainly, now more than before. Our customers, obviously, are aware of them and are fighting the good fight. What’s encouraging from what I’m hearing from them and from the executives themselves, is that the board is becoming more aware.

insecure flu cybersecurity hospital computer
Jose Luis Pelaez Inc/Getty Images
Jose Luis Pelaez Inc/Getty Images

That’s partially because of education and because of very public breaches. The Anthem breach was a major one. There are very large breaches that are making the news where board members are seeing it and starting to ask questions. It’s becoming more well-known outside of just IT security, but absolutely IT security is aware of it.

Is there anything that patients can do to protect their own medical information when they’re checking into a hospital or interacting with their health records in any way?

I’ll speak personally — I try not to share my social security number as best I can. It’s probably already stolen anyways. The other thing you can always do is ask for an accounting of disclosures, which gives you a record of everyone who’s touched your records — and that’s part of a federal law.

The other thing is just being vigilant about where you go to seek care and what you do with your information and who you share it with. Pay attention to the forms they have you sign. When they ask if they can share your information, don’t just blindly sign all of them. Ask questions about it. Be vigilant. And when you do that, it’s another form of educating the hospital staff that this privacy things does matter. It’s not just a poster on a wall.

Editors' Recommendations

Luke Larsen
Senior Editor, Computing
Luke Larsen is the Senior editor of computing, managing all content covering laptops, monitors, PC hardware, Macs, and more.
23% of PC gamers probably can’t play Alan Wake 2. Here’s why
Alan looks surprised in Alan Wake 2.

We've known for months that Alan Wake 2 will be one of the most demanding games on PC, but new details show just how taxing the upcoming title from developer Remedy will actually be. According to a now-deleted tweet from a Remedy employee, somewhere around 23% of PC players won't be able to play the game.

To be clear, the employee didn't say that number explicitly. In response to the outcry over the Alan Wake 2 system requirements, the employee shared that only cards with mesh shaders are officially supported, meaning any Nvidia 10-series or AMD RX 5000-series GPUs or older aren't officially supported.

Read more
I can’t get excited about AMD’s next version of FSR anymore
Hero art for Forspoken

AMD's FidelityFX Super Resolution 3 is available after nearly a year of waiting. The company announced the feature around November of last year, in a swift response to Nvidia's, at the time, new Deep Learning Super Sampling 3 (DLSS 3). AMD's pitch was simple. The company was going to deliver the same performance-multiplying feature that generates frames instead of rendering them, and it would work with any graphics card.

Now it's here, and on paper, FSR 3 does exactly what AMD claimed. It's clear AMD has a lot more work to do to make FSR 3 work properly, though. And after almost a year of waiting for the feature to arrive, it's hard betting on promises for what FSR 3 could be in the future.
Where are the games?

Read more
Security or performance? With this AMD vulnerability, you can’t have both
Render of an AMD Ryzen chip.

Recently, a cybersecurity researcher discovered a dangerous vulnerability within AMD's Zen 2 processors. Dubbed "Zenbleed," the vulnerability allows attackers to gain access to your computer and steal all of the most sensitive information, including passwords and encryption keys. While this doesn't affect AMD's best processors, it's still a dangerous vulnerability with a wide reach, as it's present in all Zen 2 CPUs, including consumer chips and data center EPYC processors. AMD has a fix on the way, but it might come at a price.

The bug was first spotted by Tavis Ormandy, a researcher working with Google Information Security, who made it public at the end of July. Since then, the researcher has also released a proof of concept code that shows how it works. This, while useful, might help attackers exploit this vulnerability until AMD comes up with a fix.

Read more