{"id":165171,"date":"2023-06-05T08:25:06","date_gmt":"2023-06-05T13:25:06","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/06\/overcoming-the-chronic-condition-of-cybersecurity-in-healthcare"},"modified":"2023-06-05T08:25:06","modified_gmt":"2023-06-05T13:25:06","slug":"overcoming-the-chronic-condition-of-cybersecurity-in-healthcare","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/06\/overcoming-the-chronic-condition-of-cybersecurity-in-healthcare","title":{"rendered":"Overcoming The Chronic Condition Of Cybersecurity In Healthcare"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/overcoming-the-chronic-condition-of-cybersecurity-in-healthcare.jpg\"><\/a><\/p>\n<p>According to <a href=\"https:\/\/www.harmonyhit.com\/cio-survey-results-two-factors-driving-legacy-data-management-decisions\/\" target=\"_blank\" class=\"\" title=\"https:\/\/www.harmonyhit.com\/cio-survey-results-two-factors-driving-legacy-data-management-decisions\/\" rel=\"nofollow noopener noreferrer\" aria-label=\"81%\">81%<\/a> of hospital CIOs surveyed by my company, security vulnerability is the leading pain point driving legacy data management decisions. That\u2019s no surprise as healthcare continues to rank as one of the most cyber-attacked industries year over year. In a <a href=\"https:\/\/www.himss.org\/resources\/cybersecurity-and-security-incidents-healthcare-infographic\" target=\"_blank\" class=\"\" title=\"https:\/\/www.himss.org\/resources\/cybersecurity-and-security-incidents-healthcare-infographic\" rel=\"nofollow noopener noreferrer\" aria-label=\"study\">study<\/a> by the Health Information and Management Systems Society (HIMSS), 80% of healthcare organizations reported having legacy operating systems in place. Cybersecurity in healthcare is increasingly becoming a chronic condition.<\/p>\n<p>The <a href=\"https:\/\/www.cisa.gov\/stopransomware\/bad-practices\" target=\"_blank\" class=\"\" title=\"https:\/\/www.cisa.gov\/stopransomware\/bad-practices\" rel=\"nofollow noopener noreferrer\" aria-label=\"Cybersecurity and Infrastructure Security Agency (CISA)\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a>, which measures risk to critical national infrastructure, says legacy software ranks as a dangerous \u201cbad practice.\u201d That\u2019s because the use of unsupported or end-of-life legacy systems offers some of the easiest entry points for bad actors to gain access and cause havoc within a medical environment. With the average price tag for a healthcare data breach at an all-time high of <a href=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report\" target=\"_blank\" class=\"\" title=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report\" rel=\"nofollow noopener noreferrer\" aria-label=\"$10.1 million\">$10.1 million<\/a>, the overall cost to a breached organization is high in terms of economic loss and reputation repair.<\/p>\n<p>To fortify defenses against cyberattacks, here are some tips for addressing out-of-production software in healthcare facilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to 81% of hospital CIOs surveyed by my company, security vulnerability is the leading pain point driving legacy data management decisions. That\u2019s no surprise as healthcare continues to rank as one of the most cyber-attacked industries year over year. In a study by the Health Information and Management Systems Society (HIMSS), 80% of healthcare [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,34,39,1495],"tags":[],"class_list":["post-165171","post","type-post","status-publish","format-standard","hentry","category-biotech-medical","category-cybercrime-malcode","category-economics","category-health"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/165171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=165171"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/165171\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=165171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=165171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=165171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}