Skip to main content
Erschienen in: BMC Medical Informatics and Decision Making 1/2019

Open Access 01.12.2019 | Research article

The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review

verfasst von: Salem T. Argaw, Nefti-Eboni Bempong, Bruce Eshaya-Chauvin, Antoine Flahault

Erschienen in: BMC Medical Informatics and Decision Making | Ausgabe 1/2019

Abstract

Background

The health sector has quickly become a target for cyberattacks. Hospitals are especially sensitive to these sorts of attacks as any disruption in operations or even disclosure of patient personal information can have far-reaching consequences. The objective of this study was to map the available literature on cyberattacks on hospitals and to identify the different domains of research, while extracting the recommendations and guidelines put forth in the literature.

Methods

Four databases (PubMed, Web of Science, ProQuest, and Scopus) were searched using standardized and adapted search syntax in order to identify relevant manuscripts published between 1997 and 2017. These were screened by two reviewers and included or excluded based on inclusion and exclusion criteria. Data from articles were then extracted and analyzed.

Results

The search identified 818 records of which 97 were included. Of the 97, 32% were published in 2017 while around 40% of the articles were published prior to the last three years. Six domains of research emerged through the analysis, which are included here: context and trends in cybersecurity (27.8%), connected medical devices and equipment (29.9%), hospital information systems (14.4%), raising awareness and lessons learned (6.2%), information security methodology (15.4%), and specific types of attacks (6.2%).

Conclusion

There is a generally growing interest in the research field, but the available literature remains limited in number. There are important aspects of cybersecurity (e.g. cloud storage and access management) as well as specific medical fields that rely on various medical devices that have been neglected. Recommendations are available, but comprehensive guidelines and standardized best practice measures are still necessary.
Hinweise

Electronic supplementary material

The online version of this article (https://​doi.​org/​10.​1186/​s12911-018-0724-5) contains supplementary material, which is available to authorized users.
Abkürzungen
EHR
Electronic Health Records
EMR
Electronic Medical Records
FDA
Food and Drug Administration
HIS
Hospital Information System
IEC
International Electrotechnical Commission
IEEE
Institute of Electrical and Electronics Engineers
IT
Information Technology
NHS
National Health Services
PRISMA
Preferred Reporting Items for Systematic Reviews and Meta-Analysis
US
United States

Background

Violence against hospitals—manifested in physical attacks against patients, workers, and facilities [1] as well as in cyberattacks on hospitals—has been on the rise worldwide. Cyber violence has especially become rampant in recent years, affecting numerous hospitals in high-income countries such as the United States (US) [2, 3] as well as Norway [4] and even becoming a concern for lower-middle income countries such as Kenya [5]. Cyberattacks include a variety of threats from brute force and Denial-of-Service attacks to the use of phishing and malware or social engineering methods to compromise security [6].
Whilst a ransomware is only one type of malware threatening health facilities, a report by the US Department of Justice revealed that an average of 4000 ransomware attacks occurred daily across different sectors in 2016—a 300% increase since 2015 [7]. Another report revealed that the health field was among the top three sectors most affected by ransomware worldwide [8]. Besides ransomware, there has also been a four-fold increase in the number of malicious computer software attacks in the last two years [9] and the health sector has become one of the most targeted sectors globally [10].
This is a growing concern as hospitals worldwide are becoming increasingly dependent on their hospital information systems for administrative, financial, and medical operations—with the use of connected medical devices, cloud storage services, and network systems simultaneous rising. There is a widespread understanding of the need to balance utility and efficacy with privacy and security in innovation; however, technology is bolstering more quickly than the creation, application, and update of security measures [11]. The reality is that healthcare is lagging behind other sectors in securing data as well as in developing comprehensive employee training programs—even if findings show the latter as the most stressed strategy against breaches in the literature [1114].
Additionally, the healthcare sector is especially vulnerable to attacks because the nature of the work makes it extremely sensitive to any disruption in its services. A delay in hospital operations—much less a halt—can have devastating consequences on patient safety. A ransomware attack on Hollywood Presbyterian Medical Center in Los Angeles caused cancellations of procedures and redirection of in-coming ambulances over the span of 10 days [15, 16]. A different attack, on the British National Health Service (NHS), had similar effects on hospitals as well as additional debilitating effects on radiology and blood-product refrigeration of hospitals [16].
These sort of attacks heighten risks to patient safety as providers lose access to virtual records of comorbidities, allergies, and existing prescriptions [6, 7]. In addition to these effects on health delivery, breach and disclosure of sensitive health information can have detrimental effects on an individual’s social and professional life [17] as well as expose the patient to the risks of blackmailing [18]. Moreover, cybercriminals can commit a range of crimes from identity theft to medical fraud with patients’ personally identifiable information [11]. At the other end, the financial consequences to hospitals are substantial with direct costs from patient compensation and regulation fines as well as the long-term financial consequences that follow damage to their facilities’ reputation [19]. On a larger scale, the consequences of interrupted care delivery can affect the larger hospital network (i.e. spreading into ambulance, pharmacy, and health insurance company operations).
When considering the motives behind such attacks, financial gain is a reoccurring topic. The information accessed through health data breaches is of particular interest as it is highly valued on the dark web [20]; medical records are even worth more than social security numbers [21]. Additionally, since these records include dates of birth, residential addresses, and health information, the stolen data is durable and widely applicable to criminal activities [10]. Other motives include nation state (state sponsored), terrorist, retribution, and hacktivist interests [6] and sources of attacks can be external with local or remote actors and internal through deliberate or inadvertent acts [4].
The objective of this scoping review was to map the available peer-reviewed literature focused on cyberattacks against hospitals from the past two decades as well as to identify the different domains of research investigated in the literature, while considering the recommendations and guidelines put forth for the multidisciplinary community of concern (e.g. manufacturers, hospital managers, clinicians, patients, policy-makers, and government agencies). This review was the first step towards developing the focus and direction of the seventh edition Geneva Health Forum M8 Alliance Expert Meeting working group’s efforts on identifying the challenges and mitigating the risks of cyberattacks on hospitals. The research questions of this scoping review were as follows:
1.
What are the domains of research previously emphasized in the literature on cybersecurity of hospitals?
 
2.
What recommendations are put forth by the available literature?
 

Methods

Overview

This review was conducted using the methodological framework for scoping reviews proposed by Arksey and O’Malley [22] in conjunction with the advancements recommended by Levac et al. [23]. While this scoping review is not registered, it adheres to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Guidelines [24] where applicable.
Within this review, discussion of cybersecurity did not include non-malicious cybersecurity breaches. The focus was to concentrate specifically on cyber threats and cyberattacks targeted against hospitals. Additionally, the cybersecurity of hospitals included the cybersecurity of connected medical devices, hospital information systems (HIS), and health records. However, publications related to mHealth cybersecurity were considered out of the scope of this review, as mobile devices do not directly constitute the hospital infrastructure.

Search strategy

In order to broadly capture existing work, relevant literature was gathered using the following four search engines (pertinent databases have been listed in conjunction): PubMed (MEDLINE), Web of Science, ProQuest (CINAHL), and Scopus (EMBASE, Compendex). These were selected after brief analysis of previous work and preliminary search results. Searches were initially conducted in October 2017 and later updated in March 2018.
The methodology began with the identification of pertinent key terms and pre-existing keywords through preliminary searches. Terms related to hospitals, medical devices, HIS, electronic health records (EHR), and electronic medical records (EMR) were gathered along with terms pertaining to cyberattacks and cyber threats. Pertinent terms were selected after two separate internal discussions and then strung together with Boolean operators ([AND], [OR]). After several rounds of trial and error as well as discussion, a search syntax was established and then adapted to each database (see Additional file 1 for an example). Other records were later identified and included through methods such as hand searching and snowballing.

Selection of studies

After the identification phase of the PRISMA four-phase flow diagram [24], two reviewers separately screened all records for relevance using bibliographic data (i.e. title, type of publications, abstracts). Duplicated records were excluded and full-texts were then retrieved for review. If full-text versions were not initially available, articles were acquired through the interlibrary loan system.
The inclusion and exclusion criteria, which had been discussed and established following the preliminary search, were then applied to assess eligibility. Records in English published between January 01, 1997 and December 31, 2017 in peer-reviewed journals were selected for inclusion. Study location or country of publication did not affect inclusion—apart from country biases that may already exist in the databases. Primary literature, literature reviews, and editorial material as well as conference proceedings published in peer-reviewed journals were all included. Studies reporting qualitative and quantitative findings were equally selected.
Articles were excluded after full-text evaluation because of the following reasons: they did not discuss cyberattacks in relation to the hospital setting or they were focused on other forms of security outside of cyber. (The study selection process is illustrated in Fig. 1).

Data collection, extraction, and analysis

The full-texts of the selected articles were read and relevant data was then extracted into a standardized data extraction chart. Extracted data items included the source of the article, study design, title, author(s), year of publication, journal, author(s)‘s affiliation(s), funding source(s), area of focus, important findings, and pertinent recommendations. The aim of each study as well as a summary of the article was also integrated into the data extraction chart. Citations were organized using the Mendeley Reference Management Software.
The selected articles were categorized based on their study design after operational definitions were established (see Additional file 2). Additionally, the theme of the 97 articles were identified through analysis of the full-texts. These themes were then classified in order to identify common research domains. These domains were based upon exiting research topics in the field but were developed to capture the entirety of the scope of the field’s literature into concise categories.

Results

Overview

The literature identification phase resulted in 818 records: 795 (163 from PubMed, 173 from Web of Science, 134 from ProQuest, and 325 from Scopus) were identified through the selected databases before the deduplication step and 23 records were later identified through methods such as hand searching and snowballing. These records were screened, unduplicated, and assessed for eligibility. Subsequently, 97 articles were selected for inclusion into the review (see Fig. 1). Publications included in this scoping review have been marked with an asterisk (*) in the references section.
Investigation into funding sources revealed that 21 of the publications (21.6%) received at least part of their funding from governmental agencies such as the National Science Foundation or National Institutes of Health, while three publications used funding from companies, personal resources, or university consortiums. 74 of the 97 (76.3%) claimed no funding sources or did not report any. (See Additional file 3.) This was followed up with an analysis of the researchers behind the publications. It was found that universities and other teaching institutions were at least partly involved in the publication of 71 articles, while organizations and companies were at least partly behind 14 articles. The remaining articles came at least partly from researchers at insurance companies, government agencies, law firms, and research institutions among other sources (see Additional file 4).
Of the 97 articles, 31 were published in 2017, 15 in 2016, and 12 in 2015. From 1997 to 2010, there was less than or equal to four articles published per year. After 2005, there was a slow increase in publication rate, which then skyrocketed after 2012 (see Fig. 2). The majority (59.8%) of the literature was published in the last three years with at least two articles dating back to 1997. Thirty-two of the 97 articles offered practical recommendations and guidelines, often drawing from agencies and institutes such as the U.S. Food and Drug Administration (FDA), the International Electrotechnical Commission (IEC), and the Institute of Electrical and Electronics Engineers (IEEE).

Medical specialties

Fifteen of the selected articles (15.5%) were focused on cybersecurity as it relates specifically to certain medical specialties. Devices used in endocrinology—especially those used in the treatment of diabetes mellitus—represented one-third of these articles as did radiology. The cybersecurity of other devices and systems in the fields of neurology, cardiology, and mental health are also explored, but to a lesser extent (see Fig. 3).

Study designs and identified research domains

The literature is composed of various study designs. Ten of the articles (10.3%) are descriptive studies, 31 (31.9%) are summative reports, 28 (28.9%) are editorials, 20 (20.6%) are technical papers, 5 (5.2%) are literary reviews, and 3 (3.1%) are experimental studies. (See Additional file 2 for details and operational definitions).
Further analysis of the selected literature led to the development of six domains of research: context and trends in cybersecurity, connected medical devices and equipment, hospital information systems, raising awareness and lessons learned, information security methodology, and specific types of attacks (i.e. ransomware, phishing, and social engineering attacks). These are further examined below. The link between the different domains of research and the study designs are illustrated in Table 1.
Table 1
Identified domains of research and types of studies
Research domain
Brief description of research domain
Number of articles
Study design with reference
Context and trends in cybersecurity
Explores context of the field, formulates definitions of pertinent terms, offers generalized recommendations, and describes trends in cybersecurity.
27
- Literature review [11, 21]
- Descriptive study [27, 29, 68, 78]
- Summative report [28, 30, 65, 66, 70, 77, 79, 80]
- Editorial [10, 16, 25, 26, 67, 8187]
- Technical paper [88]
Connected medical devices and equipment
Discusses the development, research, and security of connected medical devices and equipment (includes implantable and wearable devices found in neurology, cardiology, endocrinology, mental health, and radiology)
29
- Summative report [6, 31, 33, 37, 38, 50, 75, 76, 8994]
- Editorial [32, 39, 74, 9599]
- Experimental study [40, 41]
- Technical paper [3436, 100, 101]
Hospital information systems (HIS)
Offers methods for evaluating HIS, discusses security concerns of electronic health records, and proposes specific recommendations. Also includes discussions on data security and cloud-based storage.
14
- Descriptive study [44, 102]
- Literature review [18, 45, 103]
- Summative report [9, 42, 43, 47, 104]
- Technical paper [48, 49]
- Editorial [46]
- Experimental study [105]
Raising awareness and lessons learned
Discusses previous attacks and lessons learned, as well as training programs for various players. Also proposes and evaluates methods for the dissemination of information.
6
- Descriptive study [53, 54]
- Editorial [14, 51, 52, 55]
Information security methodology
Discusses network security, multifactor authentication, encryption, password protection, updates and others.
15
- Technical paper [5658, 6062, 7173, 106108]
- Summative report [59, 109, 110]
Specific types of attacks (i.e. ransomware, phishing, and social engineering attacks)
Offers definitions, background information, and recommendations specific to these attack types in the context of hospitals.
6
- Descriptive study [111, 112]
- Editorial [15, 63, 64]
- Summative report [69]

Domains of research

A subset (27.8%) of the literature offers generalized discussion and description of cyber threats and attacks—the terms associated with the field, infrastructure of cyber defense (in terms of agencies and regulations)—and offers strategies for security. These articles track the evolution of cybercrime in the health field [21, 25] while exploring some motives for attacks, such as monetary drivers [26], and discussing probable consequences and challenges associated with the cybersecurity of hospitals [27]. Among the challenges raised is the limited budget of hospitals and the eminent priority to provide care to patients [10, 28]. One article in particular discusses patient’s continued trust in the healthcare system and the increasing frequency of cyberattacks [26]. There is also discussion on the effect of compartmentalization of nation’s healthcare systems into public and private entities, and how this affects security and differs from other public health surveillance systems [10, 26, 29, 30]. Several general recommendations are also made for hospitals [10, 16, 28, 30]. The articles in this domain include literature reviews, descriptive studies, summative reports, editorials, and a technical paper.

Connected medical devices and equipment

The security of connected medical devices and equipment was a major focus in the literature (29.9%). Study designs vary from experimental studies, technical papers, summative reports, and editorials. The articles discuss the FDA pre-market and post-market guidelines for medical devices, the British Standards Institution recommendations, and relevant IEC documents among several other sources of recommendations and guidelines [31, 32]. In addition, some of the articles propose frameworks for cybersecurity and blueprints for value-based presentation of security measures in the lifecycle and development of medical devices [3336]. Others discuss the tradeoffs of safety and security with availability and utility when weighting the advantages to patients’ quality of life with associated risks of connected medical devices [37, 38]. There is also discussions on the shared—as well as individual—responsibilities of manufacturers and user facilities for the security of these device [31, 34, 36, 39, 40]. In addition, some articles discuss the various sources of vulnerabilities in devices and equipment and analyze different cybersecurity research methods [6, 41].

Hospital information systems

Publications within this research domain encompasses 14.4% of the literature body. It includes articles from all of the study design categories identified in the review. The security concerns of HIS are discussed as well as the challenges of using widespread health information technology [42, 43]. One article presents a model for evaluating and comparing HIS at different hospitals and applies it to local healthcare facilities in Iran [44]. Other articles propose security techniques for EHR systems such as various types of firewalls, cryptography and cloud computing methodologies among others [45, 46]. Data security, storage, and specifically cloud-based storage are also prevalent topics of discussion in this domain [4549]. The literature presents data storage requirement and recommendations including but not limited to confidentiality and access control, integrity of data, availability and performance, and support for long retention and secure migration [46].

Raising awareness and lessons learned

With research revealing that humans are among the weakest link in cybersecurity [35, 50], the importance of raising awareness among end users is stressed throughout domains. Six (6.2%) of the selected articles—descriptive studies and editorials—focus specifically on this topic. A significant portion of the discussion in this domain is on previous attacks [51, 52] and lessons learned—emphasizing the importance of information sharing methodology [53]. Practical recommendations were also proposed for end users such as always changing the password on new devices, using strong passwords, refraining from leaving devices unattended, and avoiding connecting to public WiFi services [14]. More generally, hospitals are advised to enact mock exercises for providers and other hospital staff annually—integrating lessons learned from recent attacks [14]. In one article, researchers used a vocabulary and scenario-based test to evaluate hospital staff’s current understanding of cybersecurity in order to offer relevant and appropriate training [54]. While these sorts of engaging practices are recommended in order to keep staff vigilant, it is crucial for hospitals to have the leadership, governance, and information technology (IT) staff for cybersecurity [55].

Information security methodology

The third most prevalent research domain—making up 15.4% of the literature body—is information security methodology. These publications are technical papers and summative reports. Definitions, methods, and general information are discussed on a wide array of specific topics such as network security, multifactor authentication, security of medical imaging, password protection, and patching systems [5659]. Recommendations and techniques are also proposed in these articles for reducing data leakage [60], strengthening end users’ passwords [61], as well as utilizing intrusion prevention systems [62].

Specific types of attacks (i.e. ransomware, phishing, and social engineering attacks)

A small portion (6.2%) of the selected articles focus specifically on phishing, social engineering, and ransomware attacks. These articles are summative reports, descriptive studies, and several editorials that focus on describing and defining the attack type, recounting previous episodes of attacks, and proposing recommendations for mitigating risks. Cybersecurity events such as the February 2016 Hollywood Presbyterian Medical Center ransomware attack in Los Angeles, California and the March 2016 Medstar Health ransomware attack in Maryland, Baltimore as well as several phishing attacks are explored [63, 64].

Recommendations

Among the recommendations found in the 97 selected articles, researchers state that organizations should allocate more resources and funding to IT security [18, 57] and should define the cybersecurity duties of employees [11]. In addition, key guidelines are put forth that recommend risk assessment methods, intrusion prevention services and penetration testing, loss of data as well as log monitoring systems, firewall implementation, network auditing, and privilege restrictions as well as methods for regularly checking critical server files [30, 65].
On the topic of connected medical devices, recommendations were put forth for companies to implement reasonable measures such as access control on devices and security testing beyond the developmental phase [66]. They are also asked to enforce antivirus scans and the use of firewalls [40], and to have reporting mechanisms that users can apply to communicate cybersecurity issues [67]. Regulators are asked to propose best practices, but balance encouraging security with burdensome regulations [68]. Other researchers propose an independent nonprofit organization composed of medical, industry, and academic experts be charged with developing standards for device cybersecurity [66]. Furthermore, providers are advised to collaborate with security experts and to hold high standards of security research methods [41]. Additional recommendations emphasize information sharing systems as well as hospital risk management and contingency planning that takes medical devices into account [31].
Hospitals are additionally advised to develop training programs that are at least annually re-evaluated and amended based on recent events. Training is recommended in privacy policies, data leakage prevention, and workplace social media use, but is especially stressed in digital hygiene—good practices of digital security such as choosing strict privacy settings and strong password protection. End users should not use the same password for multiple accounts, trust suspicious emails, or leave computers unattended. Healthcare organizations are also advised to set and enforce proper policy for password protection and sharing of information. These training programs are to be developed with consideration of the perspectives and level of digital experience of a multidisciplinary team (i.e. providers, IT specialists, hospital managers) in order to truly be effective [14]. It is also recommended that hospitals should run IT security drills and mock system recovery exercises in order to keep all members vigilant [65, 69].
Specific recommendations are made for phishing attempts and social engineering attacks such as the need for specialized training programs for these attack types and others, filtering of both emails and websites, enforcement of frequent password changes—at the cost of convenience—and reasonable limitations on access to data [64]. Similar recommendations were put forth for ransomware attacks along with regular and (ideally, real-time offline) backups, encryption of sensitive data, and technical safeguards such as up-to-date antivirus software, automated patches, pop-up blockers, and prevention of USB usage [63, 69]. Along these lines, de-identification and data encryption, minimization of requested data, and deletion of unnecessary data are emphasized all throughout. In addition, the literature recommends timely update of third-party software and strict limits on downloads from untrusted sources. The possibility of national level health data warehouses was also discussed, but with a focus on the security and privacy measures that would be required beforehand [18].

Discussion

There is an increase in the pace of publication following 2012 with an exponential rise after 2016. This escalation in research pace may be related to the 2016 Hollywood Presbyterian ransomware attack, which was the first highly publicized cyberattack incident against a hospital. There were several other incidents following this, but the importance of cybersecurity in hospitals took the headlines once again in May 2017 when the WannaCry ransomware attack affected the NHS hospitals. There is reason to believe that the rate of publications will continue to grow as hospitals turn their attention to fortifying their cybersecurity systems [9, 26].
The review also revealed some breadth in the research field with publications focusing on various research domains (six identified) and medical specialties, but an overall lack of quantity of available literature. For instance, while topics such as health data encryption are explored, methodological and more real-world operational studies on the topic would have been expected. Other areas of research that were neglected in relation to the cybersecurity of connected medical devices, for example, are security of cloud storage, the use of USB ports, and the topic of identity and access management as well as ethics. Similarly, while medical specialties such as neurology [50], radiology [40, 7073], cardiology [41, 48, 74], endocrinology [25, 32, 33, 75, 76], and mental health [77] are represented, they are in the minority of the selected articles.
Analysis of study designs also demonstrates a large proportion of editorials (nearly 29%) and summative reports (nearly 32%). These documents focused on raising awareness and the general knowledge base of readers. This reveals that the target audience of these publications was a broad group of actors non-specialized in information security (i.e. clinicians, hospital administration staff, management teams, and policymakers). This finding illustrates that cybersecurity of hospitals is the concern of a larger and multidisciplinary group and that security measures cannot be successful without the active participation of the various professionals in a hospital. The finding also indicates that there may be further need for methodological studies specifically in information security.
Investigation into funding sources was made to explore conflicts of interests or the presence and possible influence of companies and industry representatives in the research field. However, companies directly funded only 1% of the publications and only around 14% of the research was at least partly conducted by companies or organizations. Nevertheless, there may be a stronger presence of cybersecurity companies, for example, in the research field than is depicted in academic, peer-reviewed journals, which was the scope of this paper.
Of the six research domains that emerged in this scoping review, the cybersecurity of connected medical devices and equipment presented as the most prevalent research area in the literature (29.9% of the selected articles). This may be as the security of connected devices is particularly challenging. These devices are discrete systems that necessitate integration into the hospital IT infrastructure and become ubiquitous in the network, but that often lack inherent protection in the form of firewall or antivirus due to power supply limitations [6, 11]. Connected devices and equipment are a large part of hospital operations and thus, their security is a vital topic.

Limitations

This review provides an up-to-date analysis on current research domains and available recommendations on the cybersecurity of hospitals. While there are two systematic reviews [11, 21] previously published in the field of cybersecurity in healthcare, they were focused on identifying trends in the number of cyberattacks on healthcare and themes in cybercrime, respectively. There has not been a review that investigates the body of literature on cyberattacks against hospitals or that assembles the recommendations put forth. This scoping review yielded an overview of the relatively new and quickly growing literature body and was able to cope with the pace of publications. A systematic follow-up could expand on these research domains and refine subject headings further.
There are a few limitations to this study. Selection of publications was limited to articles available in the English language, which could have excluded several important publications from countries with advanced cybersecurity methodology. Along the same lines, articles in peer-reviewed journals not listed in the four databases selected could have also been unintentionally excluded. This is also a field in which industry representatives outside of academia are highly engaged and limiting the review’s scope to peer-reviewed academic journals could have excluded additional relevant publications.

Conclusion

The objective of this study was to identify and map the scientific literature on cyberattacks on hospitals and to describe the different areas of research in this literature. Six domains of research (context and trends in cybersecurity, connected medical devices and equipment, hospital information systems, raising awareness and lessons learned, information security methodology, and specific types of attacks) were developed to map the literature. These domains of research can be refined and developed by the field in the future. While 97 articles were identified from the past two decades and studied, it was apparent that there was an overall lack of quantity in publications. However, the review indicated a generally growing interest in the production of studies and recommendations on the topic. As the frequency of cyber threats continues to grow, the value of comprehensive guidelines and standardized best practice measures will become unequivocal.

Acknowledgements

The authors would like to thank Kristen Namigai, Institute of Global Health at the University of Geneva, for her contribution in the initial phase of this review. They would also like to thank the initial members of the seventh edition of the Geneva Health Forum M8 Alliance Expert Meeting Group on Cybersecurity in Healthcare for their valuable feedback on a primitive version.

Funding

The authors received no financial support for the research, authorship, and/or publication of this article.

Availability of data and materials

All data generated or analyzed during this study are included in this published article and its additional files.
Not applicable
Not applicable

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://​creativecommons.​org/​publicdomain/​zero/​1.​0/​) applies to the data made available in this article, unless otherwise stated.
Literatur
1.
Zurück zum Zitat Health Care in Danger: Making the Case. Geneva: International Committee of the Red Cross; 2011. 4–22. Health Care in Danger: Making the Case. Geneva: International Committee of the Red Cross; 2011. 4–22.
5.
Zurück zum Zitat Muchai C, Kimani K, Mwangi M, Shiyayo B, Ndegwa D, Kaimba B, et al. Kenya Cyber Security Report 2015. Nairobi, Kenya: Serianu; 2015. 8–45. Muchai C, Kimani K, Mwangi M, Shiyayo B, Ndegwa D, Kaimba B, et al. Kenya Cyber Security Report 2015. Nairobi, Kenya: Serianu; 2015. 8–45.
7.
Zurück zum Zitat Protecting Your Networks from Ransomware. Washington, D.C.: The United States Department of Justice; 2016. 2–8. Protecting Your Networks from Ransomware. Washington, D.C.: The United States Department of Justice; 2016. 2–8.
9.
Zurück zum Zitat *Susło R, Trnka J, Drobnik J. Current threats to medical data security in family doctors’ practices. Fam Med Prim Care Rev. 2017;19:313–318.CrossRef *Susło R, Trnka J, Drobnik J. Current threats to medical data security in family doctors’ practices. Fam Med Prim Care Rev. 2017;19:313–318.CrossRef
11.
Zurück zum Zitat *Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technol Heal Care. 2017;25:1–10.CrossRef *Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technol Heal Care. 2017;25:1–10.CrossRef
12.
Zurück zum Zitat Ponemon Institute Study. “The Cyber Resilient Organization: Learning to Thrive Against Threats”. Traverse City: Ponemon Institute; 2017. p. 1–33. Ponemon Institute Study. “The Cyber Resilient Organization: Learning to Thrive Against Threats”. Traverse City: Ponemon Institute; 2017. p. 1–33.
13.
Zurück zum Zitat Huang J-W, Hou T-W. A cost-effective add-on-value card-assisted firewall over Taiwan’s NHI VPN framework. Med Inform Internet Med. 2007;32:103–16.CrossRef Huang J-W, Hou T-W. A cost-effective add-on-value card-assisted firewall over Taiwan’s NHI VPN framework. Med Inform Internet Med. 2007;32:103–16.CrossRef
14.
Zurück zum Zitat *Kim L. Cybersecurity awareness: Protecting data and patients. Nursing 2018 2017;47:65–67.CrossRef *Kim L. Cybersecurity awareness: Protecting data and patients. Nursing 2018 2017;47:65–67.CrossRef
17.
Zurück zum Zitat Waegemann CP. IT security: developing a response to increasing risks. Int J Biomed Comput. 1996;43:5–8.CrossRef Waegemann CP. IT security: developing a response to increasing risks. Int J Biomed Comput. 1996;43:5–8.CrossRef
18.
Zurück zum Zitat *Khan SI, Hoque ASML. Digital Health Data: A Comprehensive Review of Privacy and Security Risks and Some Recommendations. Comput Sci J Mold. 2016;24:273–292. *Khan SI, Hoque ASML. Digital Health Data: A Comprehensive Review of Privacy and Security Risks and Some Recommendations. Comput Sci J Mold. 2016;24:273–292.
20.
Zurück zum Zitat Alvarez M. Security trends in the healthcare industry. Somers: IBM; 2017. p. 2–18. Alvarez M. Security trends in the healthcare industry. Somers: IBM; 2017. p. 2–18.
21.
Zurück zum Zitat *Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: A systematic review. Technol Health Care. 2016;24:1–9.CrossRef *Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: A systematic review. Technol Health Care. 2016;24:1–9.CrossRef
22.
Zurück zum Zitat Arksey H, O’Malley L. Scoping studies: towards a methodological framework. Int J Soc Res Methodol. 2005;8:19–32.CrossRef Arksey H, O’Malley L. Scoping studies: towards a methodological framework. Int J Soc Res Methodol. 2005;8:19–32.CrossRef
24.
Zurück zum Zitat Moher D, Liberati A, Tetzlaff J, Altman DG, Group TP. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement (reprinted from annals of internal medicine). Phys Ther. 2009;89:873–80.PubMed Moher D, Liberati A, Tetzlaff J, Altman DG, Group TP. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement (reprinted from annals of internal medicine). Phys Ther. 2009;89:873–80.PubMed
25.
Zurück zum Zitat *Thiel S, Mitchell J, Williams J. Coordination or Collision? The Intersection of Diabetes Care, Cybersecurity, and Cloud-Based Computing. J Diabetes Sci Technol. 2017;11:195–197.CrossRef *Thiel S, Mitchell J, Williams J. Coordination or Collision? The Intersection of Diabetes Care, Cybersecurity, and Cloud-Based Computing. J Diabetes Sci Technol. 2017;11:195–197.CrossRef
26.
Zurück zum Zitat *Mansfield-Devine S. Leaks and ransoms – the key threats to healthcare organisations. Netw Secur. 2017;2017:14–19. *Mansfield-Devine S. Leaks and ransoms – the key threats to healthcare organisations. Netw Secur. 2017;2017:14–19.
28.
Zurück zum Zitat *Chee WSA. It Security in Biomedical Imaging Informatics: the Hidden Vulnerability. J Mech Med Biol. 2007;07:101–106.CrossRef *Chee WSA. It Security in Biomedical Imaging Informatics: the Hidden Vulnerability. J Mech Med Biol. 2007;07:101–106.CrossRef
29.
Zurück zum Zitat *Smith FL. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance. Heal Secur. 2016;14:305–314.CrossRef *Smith FL. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance. Heal Secur. 2016;14:305–314.CrossRef
30.
Zurück zum Zitat *Harries D, Yellowlees PM. Cyberterrorism: is the U.S. healthcare system safe? Telemed J E Health. 2013;19:61–66.CrossRef *Harries D, Yellowlees PM. Cyberterrorism: is the U.S. healthcare system safe? Telemed J E Health. 2013;19:61–66.CrossRef
31.
Zurück zum Zitat *Jones RW, Katzis K. Cybersecurity and the Medical Device Product Development Lifecycle. Stud Health Technol Inform. 2017;238:76–239. *Jones RW, Katzis K. Cybersecurity and the Medical Device Product Development Lifecycle. Stud Health Technol Inform. 2017;238:76–239.
32.
Zurück zum Zitat *Klonoff DC. Cybersecurity for Connected Diabetes Devices. J Diabetes Sci Technol. 2015;9:1143–1147.CrossRef *Klonoff DC. Cybersecurity for Connected Diabetes Devices. J Diabetes Sci Technol. 2015;9:1143–1147.CrossRef
33.
Zurück zum Zitat *Sackner-Bernstein J. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety. J Diabetes Sci Technol. 2017;11:198–202.CrossRef *Sackner-Bernstein J. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety. J Diabetes Sci Technol. 2017;11:198–202.CrossRef
34.
Zurück zum Zitat *Alvarenga A, Tanev G. Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design. Technol Innov Manag Rev. 2017;7:32. *Alvarenga A, Tanev G. Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design. Technol Innov Manag Rev. 2017;7:32.
35.
Zurück zum Zitat *Ondiege B, Clarke M, Mapp G. Exploring a New Security Framework for Remote Patient Monitoring Devices. Computers. 2017;6:11.CrossRef *Ondiege B, Clarke M, Mapp G. Exploring a New Security Framework for Remote Patient Monitoring Devices. Computers. 2017;6:11.CrossRef
36.
Zurück zum Zitat *Tanev G, Apiafi R. A Value Blueprint Approach to Cybersecurity in Networked Medical Devices. Technol Innov Manag Rev. 2015;5:17–25.CrossRef *Tanev G, Apiafi R. A Value Blueprint Approach to Cybersecurity in Networked Medical Devices. Technol Innov Manag Rev. 2015;5:17–25.CrossRef
37.
Zurück zum Zitat *Katzis K, Jones RW, Despotou G. The challenges of balancing safety and security in implantable medical devices. Stud Health Technol Inform. 2016;226:25–28.PubMed *Katzis K, Jones RW, Despotou G. The challenges of balancing safety and security in implantable medical devices. Stud Health Technol Inform. 2016;226:25–28.PubMed
38.
Zurück zum Zitat *Altawy R, Youssef AM. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access. 2016;4:959–979.CrossRef *Altawy R, Youssef AM. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access. 2016;4:959–979.CrossRef
39.
Zurück zum Zitat *FDA issues reminder on cybersecurity for networked medical devices. Biomedical instrumentation & technology/Association for the Advancement of Medical Instrumentation. 2010;Suppl:4. *FDA issues reminder on cybersecurity for networked medical devices. Biomedical instrumentation & technology/Association for the Advancement of Medical Instrumentation. 2010;Suppl:4.
40.
Zurück zum Zitat *Moses V, Korah I. Lack of security of networked medical equipment in radiology. Am J Roentgenol. 2015;204:343–353.CrossRef *Moses V, Korah I. Lack of security of networked medical equipment in radiology. Am J Roentgenol. 2015;204:343–353.CrossRef
41.
Zurück zum Zitat *Ransford B, Kramer DB, Foo Kune D, Auto de Medeiros J, Yan C, Xu W, et al. Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists. Pacing Clin Electrophysiol. 2017;40:913–917.CrossRef *Ransford B, Kramer DB, Foo Kune D, Auto de Medeiros J, Yan C, Xu W, et al. Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists. Pacing Clin Electrophysiol. 2017;40:913–917.CrossRef
42.
Zurück zum Zitat *Dimitrova TD. Risk and Protection of Medical Information Systems. Elektron Ir Elektrotechnika. 2010;9:109–112. *Dimitrova TD. Risk and Protection of Medical Information Systems. Elektron Ir Elektrotechnika. 2010;9:109–112.
43.
Zurück zum Zitat *Goldschmidt PG. HIT and MIS: implications of health information technology and medical information systems. Commun ACM. 2005;48:68.CrossRef *Goldschmidt PG. HIT and MIS: implications of health information technology and medical information systems. Commun ACM. 2005;48:68.CrossRef
44.
Zurück zum Zitat *Hajrahimi N, Dehaghani SMH, Sheikhtaheri A. Health information security: a case study of three selected medical centers in iran. Acta Inform Med. 2013;21:42–45.CrossRef *Hajrahimi N, Dehaghani SMH, Sheikhtaheri A. Health information security: a case study of three selected medical centers in iran. Acta Inform Med. 2013;21:42–45.CrossRef
45.
Zurück zum Zitat *Kruse CS, Smith B, Vanderlinden H, Nealand A. Security Techniques for the Electronic Health Records. J Med Syst. 2017;41:127.CrossRef *Kruse CS, Smith B, Vanderlinden H, Nealand A. Security Techniques for the Electronic Health Records. J Med Syst. 2017;41:127.CrossRef
46.
Zurück zum Zitat *Hasan R, Winslett M, Sion R. Requirements of Secure Storage systems for healthcare records. In: Secure Data Management - 4th VLDB Workshop, SDM 2007, Proceedings. Springer-Verlag Berlin Heidlberg; 2007. p. 174–180. *Hasan R, Winslett M, Sion R. Requirements of Secure Storage systems for healthcare records. In: Secure Data Management - 4th VLDB Workshop, SDM 2007, Proceedings. Springer-Verlag Berlin Heidlberg; 2007. p. 174–180.
47.
Zurück zum Zitat *Kierkegaard P. Medical data breaches: Notification delayed is notification denied. Comput Law Secur Rev. 2012;28:163–183.CrossRef *Kierkegaard P. Medical data breaches: Notification delayed is notification denied. Comput Law Secur Rev. 2012;28:163–183.CrossRef
49.
Zurück zum Zitat *Bamiah MA, Brohi SN, Chuprat S, Ab Manan J Lail. Trusted cloud computing framework for healthcare sector. J Comput Sci. 2014;10:240–250.CrossRef *Bamiah MA, Brohi SN, Chuprat S, Ab Manan J Lail. Trusted cloud computing framework for healthcare sector. J Comput Sci. 2014;10:240–250.CrossRef
52.
Zurück zum Zitat *Ehrenfeld JM. WannaCry, Cybersecurity and Health Information Technology: A Time to Act. J Med Syst. 2017;41:104.CrossRef *Ehrenfeld JM. WannaCry, Cybersecurity and Health Information Technology: A Time to Act. J Med Syst. 2017;41:104.CrossRef
54.
Zurück zum Zitat *Drevin L, Kruger H, Bell AM, Steyn T. A linguistic approach to information security awareness education in a healthcare environment. In: Bishop M, Futcher L, Miloslavskaya N, Theocharidou M, (eds) Information Security Education for a Global Digital Society. WISE 2017. IFIP Advances in Information and Communication Technology, vol 503. Springer, Cham; 2017. *Drevin L, Kruger H, Bell AM, Steyn T. A linguistic approach to information security awareness education in a healthcare environment. In: Bishop M, Futcher L, Miloslavskaya N, Theocharidou M, (eds) Information Security Education for a Global Digital Society. WISE 2017. IFIP Advances in Information and Communication Technology, vol 503. Springer, Cham; 2017.
55.
Zurück zum Zitat *Jarrett MP. Cybersecurity—A Serious Patient Care Concern. JAMA. 2017;318:1319.CrossRef *Jarrett MP. Cybersecurity—A Serious Patient Care Concern. JAMA. 2017;318:1319.CrossRef
56.
Zurück zum Zitat *Masys DR, Baker DB. Patient-Centered Access to Secure Systems Online (PCASSO): a secure approach to clinical data access via the World Wide Web. AMIA Symp Proc. 1997;340–343. *Masys DR, Baker DB. Patient-Centered Access to Secure Systems Online (PCASSO): a secure approach to clinical data access via the World Wide Web. AMIA Symp Proc. 1997;340–343.
57.
Zurück zum Zitat *Ries JE, Asaro P V, Guillen A, Ivanova J. The futility of common firewall policies: an experimental demonstration. AMIA Symp Proc. 2000;699–703. *Ries JE, Asaro P V, Guillen A, Ivanova J. The futility of common firewall policies: an experimental demonstration. AMIA Symp Proc. 2000;699–703.
58.
Zurück zum Zitat *Sankaranarayanan S, Udayasuriyan V. Biometric Secured Electronic Health Record. Int J E-Health Med Commun. 2016;7:1–27. *Sankaranarayanan S, Udayasuriyan V. Biometric Secured Electronic Health Record. Int J E-Health Med Commun. 2016;7:1–27.
59.
Zurück zum Zitat *Swanson SE. Access management: Living with firewalls. J Hosp Librariansh. 2001;1:25–40. *Swanson SE. Access management: Living with firewalls. J Hosp Librariansh. 2001;1:25–40.
60.
Zurück zum Zitat *Lechler T, Wetzel S. Conceptualizing the silent risk of inadvertent information leakages. Comput Electr Eng. 2017;58:67–75.CrossRef *Lechler T, Wetzel S. Conceptualizing the silent risk of inadvertent information leakages. Comput Electr Eng. 2017;58:67–75.CrossRef
62.
Zurück zum Zitat *Faysel MA. Evaluation of a Cyber Security System for Hospital Network. Stud Health Technol Inform. 2015;216:915.PubMed *Faysel MA. Evaluation of a Cyber Security System for Hospital Network. Stud Health Technol Inform. 2015;216:915.PubMed
64.
Zurück zum Zitat *Wright A, Aaron S, Bates DW. The Big Phish: Cyberattacks Against U.S. Healthcare Systems. J Gen Intern Med. 2016;31:1115–1118.CrossRef *Wright A, Aaron S, Bates DW. The Big Phish: Cyberattacks Against U.S. Healthcare Systems. J Gen Intern Med. 2016;31:1115–1118.CrossRef
65.
Zurück zum Zitat *Langer SG. Cyber-Security Issues in Healthcare Information Technology. J Digit Imaging. 2017;30:117–125.CrossRef *Langer SG. Cyber-Security Issues in Healthcare Information Technology. J Digit Imaging. 2017;30:117–125.CrossRef
66.
Zurück zum Zitat *Armstrong DG, Kleidermacher DN, Klonoff DC, Slepian MJ. Cybersecurity Regulation of Wireless Devices for Performance and Assurance in the Age of “Medjacking”. J Diabetes Sci Technol. 2016;10:435–438.CrossRef *Armstrong DG, Kleidermacher DN, Klonoff DC, Slepian MJ. Cybersecurity Regulation of Wireless Devices for Performance and Assurance in the Age of “Medjacking”. J Diabetes Sci Technol. 2016;10:435–438.CrossRef
67.
Zurück zum Zitat *Webb T, Dayal S. Building the wall: Addressing cybersecurity risks in medical devices in the U.S.A. and Australia. Comput Law Secur Rev. 2017;33:559–563.CrossRef *Webb T, Dayal S. Building the wall: Addressing cybersecurity risks in medical devices in the U.S.A. and Australia. Comput Law Secur Rev. 2017;33:559–563.CrossRef
68.
Zurück zum Zitat *Williams PAH. When trust defies common security sense. Health Informatics J. 2008;14:211–221.CrossRef *Williams PAH. When trust defies common security sense. Health Informatics J. 2008;14:211–221.CrossRef
69.
Zurück zum Zitat *Sittig DF, Singh H. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks. Appl Clin Inform. 2016;7:624–632.CrossRef *Sittig DF, Singh H. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks. Appl Clin Inform. 2016;7:624–632.CrossRef
70.
Zurück zum Zitat *Caruso RD. Part 1. Firewalls, Antivirus Software, and Internet Security Suites. Radiographics. 2003;23:1329–1337.CrossRef *Caruso RD. Part 1. Firewalls, Antivirus Software, and Internet Security Suites. Radiographics. 2003;23:1329–1337.CrossRef
71.
Zurück zum Zitat *Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM. Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl. 2017;76:10599–10633.CrossRef *Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM. Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl. 2017;76:10599–10633.CrossRef
72.
Zurück zum Zitat *Kumari PV, Thanushkodi K. A Secure Fast 2D-Discrete Fractional Fourier Transform Based Medical Image Compression Using Hybrid Encoding Technique. 2013 Int Conf Curr Trends Eng Technol. 2013;1–7. *Kumari PV, Thanushkodi K. A Secure Fast 2D-Discrete Fractional Fourier Transform Based Medical Image Compression Using Hybrid Encoding Technique. 2013 Int Conf Curr Trends Eng Technol. 2013;1–7.
73.
Zurück zum Zitat *Keese J, Motzo L. Pro-active approach to malware for healthcare information and imaging systems. Int Congr Ser. 2005;1281:943–947.CrossRef *Keese J, Motzo L. Pro-active approach to malware for healthcare information and imaging systems. Int Congr Ser. 2005;1281:943–947.CrossRef
74.
Zurück zum Zitat *Kramer DB, Fu K. Cybersecurity Concerns and Medical Devices Lessons from a Pacemaker Advisory. JAMA. 2017;318:2077–2078.CrossRef *Kramer DB, Fu K. Cybersecurity Concerns and Medical Devices Lessons from a Pacemaker Advisory. JAMA. 2017;318:2077–2078.CrossRef
75.
Zurück zum Zitat *O’Keeffe DT, Maraka S, Basu A, Keith-Hynes P, Kudva YC. Cybersecurity in Artificial Pancreas Experiments. Diabetes Technol Ther. 2015;17:664–666.CrossRef *O’Keeffe DT, Maraka S, Basu A, Keith-Hynes P, Kudva YC. Cybersecurity in Artificial Pancreas Experiments. Diabetes Technol Ther. 2015;17:664–666.CrossRef
76.
Zurück zum Zitat *Britton KE, Britton-Colonnese JD. Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors. J Diabetes Sci Technol. 2017;11:216–219.CrossRef *Britton KE, Britton-Colonnese JD. Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors. J Diabetes Sci Technol. 2017;11:216–219.CrossRef
77.
Zurück zum Zitat *Elhai JD, Frueh BC. Security of Electronic Mental Health Communication and Record-Keeping in the Digital Age. J Clin Psychiatry. 2015;77:22–27. *Elhai JD, Frueh BC. Security of Electronic Mental Health Communication and Record-Keeping in the Digital Age. J Clin Psychiatry. 2015;77:22–27.
78.
Zurück zum Zitat *Kwon J, Johnson ME. Security practices and regulatory compliance in the healthcare industry. J Am Med Informatics Assoc. 2013;20:44–51.CrossRef *Kwon J, Johnson ME. Security practices and regulatory compliance in the healthcare industry. J Am Med Informatics Assoc. 2013;20:44–51.CrossRef
79.
Zurück zum Zitat *Liu C-H, Chung Y-F, Chen T-S, Wang S-D. The Enhancement of Security in Healthcare Information Systems. J Med Syst. 2012;36:1673–1688.CrossRef *Liu C-H, Chung Y-F, Chen T-S, Wang S-D. The Enhancement of Security in Healthcare Information Systems. J Med Syst. 2012;36:1673–1688.CrossRef
80.
Zurück zum Zitat *Koppel R, Smith S, Blythe J, Kothari V. Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? Stud Health Technol Inform. 2015;208:215–220.PubMed *Koppel R, Smith S, Blythe J, Kothari V. Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? Stud Health Technol Inform. 2015;208:215–220.PubMed
82.
Zurück zum Zitat *Loughlin S, Fu K, Gee T, Gieras I, Hoyme K, Rajagopalan SR, et al. A roundtable discussion: Safeguarding information and resources against emerging cybersecurity threats. Biomed Instrum Technol. 2014;48:8–17. *Loughlin S, Fu K, Gee T, Gieras I, Hoyme K, Rajagopalan SR, et al. A roundtable discussion: Safeguarding information and resources against emerging cybersecurity threats. Biomed Instrum Technol. 2014;48:8–17.
83.
Zurück zum Zitat *Billingsley L, McKee SA. Cybersecurity in the Clinical Setting: Nurses’ Role in the Expanding “Internet of Things”. J Contin Educ Nurs. 2016;47:347–349.CrossRef *Billingsley L, McKee SA. Cybersecurity in the Clinical Setting: Nurses’ Role in the Expanding “Internet of Things”. J Contin Educ Nurs. 2016;47:347–349.CrossRef
84.
Zurück zum Zitat *Rios B. Cybersecurity expert: Medical devices have “a long way to go”. Biomed Instrum Technol. 2015;49:197–200.CrossRef *Rios B. Cybersecurity expert: Medical devices have “a long way to go”. Biomed Instrum Technol. 2015;49:197–200.CrossRef
85.
Zurück zum Zitat *Cheong IR, Kidd MR. Safe practices in cyberspace: a medical perspective on computer viruses. Med J Aust. 1997;166:44–46.PubMed *Cheong IR, Kidd MR. Safe practices in cyberspace: a medical perspective on computer viruses. Med J Aust. 1997;166:44–46.PubMed
87.
Zurück zum Zitat *Jensen RD, Copeland S, Domas S, Hampton R, Hoyme K, Jump M, et al. A Roundtable Discussion: Thawing Out Healthcare Technology’s ‘Special Snowflake’ Cybersecurity Challenges. Biomed Instrum Technol. 2017;51:10–16. *Jensen RD, Copeland S, Domas S, Hampton R, Hoyme K, Jump M, et al. A Roundtable Discussion: Thawing Out Healthcare Technology’s ‘Special Snowflake’ Cybersecurity Challenges. Biomed Instrum Technol. 2017;51:10–16.
88.
Zurück zum Zitat *Kasurinen J. Usability Issues of Virtual Reality Learning Simulator in Healthcare and Cybersecurity. Procedia Comput Sci. 2017;119:341–349.CrossRef *Kasurinen J. Usability Issues of Virtual Reality Learning Simulator in Healthcare and Cybersecurity. Procedia Comput Sci. 2017;119:341–349.CrossRef
89.
Zurück zum Zitat *Hyman WA. The integrating the healthcare environment-PCD-MEM medical device cyber security white paper: An overview. J Clin Eng. 2012;37:24–28.CrossRef *Hyman WA. The integrating the healthcare environment-PCD-MEM medical device cyber security white paper: An overview. J Clin Eng. 2012;37:24–28.CrossRef
90.
Zurück zum Zitat *Seymour DM, McCall KR, DiPaola L. Security and interconnection of medical devices to healthcare networks. Int Congr Ser. 2004;1268 C:131–134.CrossRef *Seymour DM, McCall KR, DiPaola L. Security and interconnection of medical devices to healthcare networks. Int Congr Ser. 2004;1268 C:131–134.CrossRef
92.
Zurück zum Zitat *Zhang M, Raghunathan A, Jha NK. Trustworthiness of Medical Devices and Body Area Networks. Proc IEEE. 2014;102:1174–1188.CrossRef *Zhang M, Raghunathan A, Jha NK. Trustworthiness of Medical Devices and Body Area Networks. Proc IEEE. 2014;102:1174–1188.CrossRef
93.
Zurück zum Zitat *Busdicker M, Upendra P. The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity. Biomed Instrum Technol. 2017;51:19–25.CrossRef *Busdicker M, Upendra P. The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity. Biomed Instrum Technol. 2017;51:19–25.CrossRef
94.
Zurück zum Zitat *Sametinger J, Rozenblit J, Lysecky R, Ott P. Security challenges for medical devices. Commun ACM. 2015;58:74–82.CrossRef *Sametinger J, Rozenblit J, Lysecky R, Ott P. Security challenges for medical devices. Commun ACM. 2015;58:74–82.CrossRef
95.
Zurück zum Zitat *Coronado AJ, Wong TL. Healthcare cybersecurity risk management: Keys to an effective plan. Biomed Instrum Technol. 2014;48:26–30.CrossRef *Coronado AJ, Wong TL. Healthcare cybersecurity risk management: Keys to an effective plan. Biomed Instrum Technol. 2014;48:26–30.CrossRef
97.
Zurück zum Zitat *Leavitt N. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers. Computer. 2010;43:11–14.CrossRef *Leavitt N. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers. Computer. 2010;43:11–14.CrossRef
98.
Zurück zum Zitat *Fu K. Inside risks Reducing risks of implantable medical devices. Commun ACM. 2009;52:25.CrossRef *Fu K. Inside risks Reducing risks of implantable medical devices. Commun ACM. 2009;52:25.CrossRef
100.
Zurück zum Zitat *Stine I, Rice M, Dunlap S, Pecarina J. A cyber risk scoring system for medical devices. Int J Crit Infrastruct Prot. 2017;19:32–46.CrossRef *Stine I, Rice M, Dunlap S, Pecarina J. A cyber risk scoring system for medical devices. Int J Crit Infrastruct Prot. 2017;19:32–46.CrossRef
101.
Zurück zum Zitat *Rauti S, Lahtiranta J, Parisod H, Hyrynsalmi S, Salanterä S, Aromaa ME, et al. A Proxy-Based Solution for Asynchronous Telemedical Systems. Int J E-Health Med Commun. 2017;8:70–83.CrossRef *Rauti S, Lahtiranta J, Parisod H, Hyrynsalmi S, Salanterä S, Aromaa ME, et al. A Proxy-Based Solution for Asynchronous Telemedical Systems. Int J E-Health Med Commun. 2017;8:70–83.CrossRef
102.
Zurück zum Zitat *He Y, Johnson, C. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template. Int J Med Inform. 2015;84:941–949.CrossRef *He Y, Johnson, C. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template. Int J Med Inform. 2015;84:941–949.CrossRef
103.
Zurück zum Zitat *Kamoun F, Nicho M. Human and Organizational Factors of Healthcare Data Breaches. Int J Healthc Inf Syst Informatics. 2014;9:42–60.CrossRef *Kamoun F, Nicho M. Human and Organizational Factors of Healthcare Data Breaches. Int J Healthc Inf Syst Informatics. 2014;9:42–60.CrossRef
104.
Zurück zum Zitat *Szewczak EJ, Snodgrass CR. Business Associates in the National Health Information Network: Implications for Medical Information Privacy. Int J E-Business Res. 2009;5:48–62.CrossRef *Szewczak EJ, Snodgrass CR. Business Associates in the National Health Information Network: Implications for Medical Information Privacy. Int J E-Business Res. 2009;5:48–62.CrossRef
105.
Zurück zum Zitat *Agaku IT, Adisa AO, Ayo-Yusuf OA, Connolly GN. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers. J Am Med Informatics Assoc. 2014;21:374–378.CrossRef *Agaku IT, Adisa AO, Ayo-Yusuf OA, Connolly GN. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers. J Am Med Informatics Assoc. 2014;21:374–378.CrossRef
106.
Zurück zum Zitat *Diamantopoulou V, Angelopoulos K, Flake J, Praitano A, Ruiz JF, Jurjens J, et al. Privacy Data management and awareness for public adminstrations: a case study from the healthcare domain. In: 5th Annual Privacy Forum, APF 2017. Springer International Publishing; 2017. p. 192–209. *Diamantopoulou V, Angelopoulos K, Flake J, Praitano A, Ruiz JF, Jurjens J, et al. Privacy Data management and awareness for public adminstrations: a case study from the healthcare domain. In: 5th Annual Privacy Forum, APF 2017. Springer International Publishing; 2017. p. 192–209.
107.
Zurück zum Zitat *Bhatti R, Grandison T. Towards improved privacy policy coverage in healthcare using policy refinement. In: Secure Data Management - 4th VLDB Workshop, SDM 2007, Proceedings. Springer-Verlag Berlin Heidlberg; 2007. p. 158–73. *Bhatti R, Grandison T. Towards improved privacy policy coverage in healthcare using policy refinement. In: Secure Data Management - 4th VLDB Workshop, SDM 2007, Proceedings. Springer-Verlag Berlin Heidlberg; 2007. p. 158–73.
108.
Zurück zum Zitat *Chien J-C, Wang J-P, Cho C-L, Chong F-C. Security Biosignal Transmission Based on Face Recognition for Telemedicine. Biomed Eng Appl Basis Commun. 2007;19:63–69.CrossRef *Chien J-C, Wang J-P, Cho C-L, Chong F-C. Security Biosignal Transmission Based on Face Recognition for Telemedicine. Biomed Eng Appl Basis Commun. 2007;19:63–69.CrossRef
109.
Zurück zum Zitat *Leetz W. Patching off-the-shelf software used in medical information systems. Int Congr Ser. 2005;1281:954–958.CrossRef *Leetz W. Patching off-the-shelf software used in medical information systems. Int Congr Ser. 2005;1281:954–958.CrossRef
110.
Zurück zum Zitat *Wu F, Eagles S. Cybersecurity for medical device manufacturers: Ensuring safety and functionality. Biomed Instrum Technol. 2016;50:23–34.CrossRef *Wu F, Eagles S. Cybersecurity for medical device manufacturers: Ensuring safety and functionality. Biomed Instrum Technol. 2016;50:23–34.CrossRef
111.
Zurück zum Zitat *Medlin BD, Cazier JA, Foulk DP. Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? Int J Inf Secur Priv. 2008;2:71–83.CrossRef *Medlin BD, Cazier JA, Foulk DP. Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? Int J Inf Secur Priv. 2008;2:71–83.CrossRef
112.
Zurück zum Zitat *Rose R V., Kass JS. Mitigating Cybersecurity Risks. Contin Lifelong Learn Neurol. 2017;23:553–556.CrossRef *Rose R V., Kass JS. Mitigating Cybersecurity Risks. Contin Lifelong Learn Neurol. 2017;23:553–556.CrossRef
Metadaten
Titel
The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review
verfasst von
Salem T. Argaw
Nefti-Eboni Bempong
Bruce Eshaya-Chauvin
Antoine Flahault
Publikationsdatum
01.12.2019
Verlag
BioMed Central
Erschienen in
BMC Medical Informatics and Decision Making / Ausgabe 1/2019
Elektronische ISSN: 1472-6947
DOI
https://doi.org/10.1186/s12911-018-0724-5

Weitere Artikel der Ausgabe 1/2019

BMC Medical Informatics and Decision Making 1/2019 Zur Ausgabe