Skip to main content

The flu is poking holes in hospital cybersecurity, and a shot can’t save you

Hospital Cybersecurity
BSIP/Getty Images
BSIP/Getty Images

(in)Secure is a weekly column that dives into the rapidly escalating topic of cybersecurity.

When it comes to cybersecurity breaches, we tend to think of large corporations or governmental institutions that hold vast amounts of personal data. However, hospitals and medical centers are organizations that hold onto thousands of personal records. When they’re hit by epidemics as bad this year’s flu outbreak, they’re left completely vulnerable to a cyberattack that could touch their patients’ valuable medical records.

We spoke with Shane Whitlatch, an executive at the cybersecurity company FairWarning, whose clients are hospitals that have been or could one day be the victims of cybersecurity attacks. According to their information, something as harmless as checking in to a hospital when you have the flu could have huge ramifications on your cybersecurity — and you would never even know about it.

Digital Trends: This year’s flu outbreak was particularly bad. What kind of things happen at a hospital during something like a flu outbreak, that can have such a negative impact on a hospital’s cybersecurity?

Shane Whitlatch: The flu epidemic is just another crisis. There can be many different types, but what’s important in a crisis isn’t necessarily what happens right there during the actual event. What’s important is whether or not [the hospital] planned well before the crisis. Did you have processes, programs, and action items in place that prepare you so that when you do have a crisis — whether it’s a flu epidemic, a terrorist attack, or train accident — you aren’t left vulnerable to a cybersecurity attack.

“Are there steps I can skip so I process patient care faster and put less priority on security?”

It’s oversight. People start to skip steps. If I normally check in 10 patients an hour, but now I’m going to get double that, I need to move faster if I’m going to see these patients. Can I just stayed signed in? Do I have to badge in? Are there steps I can skip so that I process patient care faster and put less of a priority on security?

Criminals look for opportunities — and the during the flu outbreak, they know the focus is going to be on those events. So maybe there’s an opportunity for them there when employees are leaving sign-ins logged on to computers longer because they’re busy seeing more patients than they normally do. Maybe it means they’re sharing credentials more frequently because they’re focused on patient care. It just presents opportunity. If you don’t train your staff and you aren’t prepared — you’re going to not only hit by the crisis, but also by criminals who are looking to exploit those opportunities.

Is there a precedent for hospitals being hacked or attacked by cyber-criminals? Is that something that is happening regularly?

If it hasn’t happened yet, they probably just don’t know about it yet. So the answer is yes.

https://twitter.com/Merck/status/879716775021170689

We’ve got an example — and this is in the public record — of Hurley Medical Center in Flint Michigan. It had hacktivist attacks going after medical record associated with the water crisis up there. I think the answer is “yes,” but I’d like to let third-parties be the reference points for that.

In the case of something like a hack, what should people be worried about as patients?

There are some things that are obvious, and some that are less so. The most obvious thing is your insurance information. That’s what’s valuable. They wouldn’t steal the data if it wasn’t valuable. They can take your insurance information, change your mailing address, and sell that to someone who can’t get insurance. That’s the first thing — so pay attention to your EOB (explanation of benefits) letters that you get in the mail. If it says you got some treatment for something that was covered that you never received, that’s a problem. That could maximize your benefits and hit your deductible and you never even got care. Those are the obvious ones.

They wouldn’t steal the data if it wasn’t valuable.

The ones that aren’t so obvious we’ve heard from our customers are where people have changed information on the stolen medical records. If I’m using a stolen ID and I go to a local hospital somewhere — and let’s say I haven’t been treated there before and I have a fake ID — to get seek care for something like a broken arm, or something worse, which it usually is. But if my blood type is different than the person it was stolen from, the hospital might change your blood type on your medical record because they assumed the person didn’t know their blood type. That may not matter to you now, but if you get in a car accident and need a blood transfusion or something like that, they might put the wrong blood in. That’s a less obvious consequence — and it can be a deadly one.

Right now, do you feel like hospitals are aware of how important cybersecurity is?

Certainly, now more than before. Our customers, obviously, are aware of them and are fighting the good fight. What’s encouraging from what I’m hearing from them and from the executives themselves, is that the board is becoming more aware.

insecure flu cybersecurity hospital computer
Jose Luis Pelaez Inc/Getty Images
Jose Luis Pelaez Inc/Getty Images

That’s partially because of education and because of very public breaches. The Anthem breach was a major one. There are very large breaches that are making the news where board members are seeing it and starting to ask questions. It’s becoming more well-known outside of just IT security, but absolutely IT security is aware of it.

Is there anything that patients can do to protect their own medical information when they’re checking into a hospital or interacting with their health records in any way?

I’ll speak personally — I try not to share my social security number as best I can. It’s probably already stolen anyways. The other thing you can always do is ask for an accounting of disclosures, which gives you a record of everyone who’s touched your records — and that’s part of a federal law.

The other thing is just being vigilant about where you go to seek care and what you do with your information and who you share it with. Pay attention to the forms they have you sign. When they ask if they can share your information, don’t just blindly sign all of them. Ask questions about it. Be vigilant. And when you do that, it’s another form of educating the hospital staff that this privacy things does matter. It’s not just a poster on a wall.

Luke Larsen
Luke Larsen is the Senior editor of computing, managing all content covering laptops, monitors, PC hardware, Macs, and more.
Here’s why you can’t sign up for ChatGPT Plus right now
A person sits in front of a laptop. On the laptop screen is the home page for OpenAI's ChatGPT artificial intelligence chatbot.

CEO Sam Altman's sudden departure from OpenAI weekend isn't the only drama happening with ChatGPT. Due to high demand, paid subscriptions for OpenAI's ChatGPT Plus have been halted for nearly a week.

The company has a waitlist for those interested in registering for ChatGPT to be notified of when the text-to-speech AI generator is available once more.

Read more
‘Compact Mode’ can’t fix the Xbox app. Here’s what could
Asus ROG Ally with the Windows lock screen.

Microsoft is testing out a new "Compact Mode" for its Xbox app on Windows 11. The mode is currently available to Xbox Insiders, and it shrinks the sidebar in the Xbox app to provide a clearer view into the main window.

It's not a big deal on its own, but it's clearly a move by Microsoft to make Windows 11 easier to use on devices like the Asus ROG Ally and Lenovo Legion Go. It's a step in the right direction, but we need more radical changes to the Xbox app if Microsoft has any hope of making it a destination for not only Xbox Game Pass, but handheld PC gaming devices.
Do it my way

Read more
23% of PC gamers probably can’t play Alan Wake 2. Here’s why
Alan looks surprised in Alan Wake 2.

We've known for months that Alan Wake 2 will be one of the most demanding games on PC, but new details show just how taxing the upcoming title from developer Remedy will actually be. According to a now-deleted tweet from a Remedy employee, somewhere around 23% of PC players won't be able to play the game.

To be clear, the employee didn't say that number explicitly. In response to the outcry over the Alan Wake 2 system requirements, the employee shared that only cards with mesh shaders are officially supported, meaning any Nvidia 10-series or AMD RX 5000-series GPUs or older aren't officially supported.

Read more