In recent years, as medical devices have become more connected, cybersecurity experts have sounded the alarm on their vulnerabilities.
Nearly half of consumers believe their personal health information is more secure on their personal electronic devices – smartphones, laptops and tablets – than it is on their health care providers’ computer systems.
This high level of mistrust in health entities’ handling of personal data is among the findings of a recent survey of 1,000 consumers by the cybersecurity firm Morphisec. Benjamin Harris of HealthcareITNews reported on the survey. Continue reading
Melanie Evans has been covering hospitals for many years, including for Modern Healthcare and now The Wall Street Journal. But she was not an expert on cybersecurity when the WannaCry ransomware cryptoworm began making its way through computer systems across the globe in May.
Evans eventually found a great and largely uncovered story about cyberattacks and the lack of public reporting disclosures at hospitals: “Why some of the worst cyberattacks in health care go unreported.” Continue reading
The first rule of health care cybersecurity is you don’t talk about health care cybersecurity.
In reporting on cybersecurity threats, journalists will likely encounter resistance from hospitals, health systems and health insurers to speaking publicly about their readiness and strategies around cybersecurity. Continue reading
The cyberattack that hit British hospitals and hundreds of other organizations in more than 100 countries last week continues to unfold and has been called unprecedented in its scope.
For health care journalists, there are important questions to ask hospitals, other health care organizations – and even their own media organizations – about their level of preparedness and response plans for such an attack. Continue reading
Imagine you’re researching a story about a new medical device undergoing federal review. You send an email to a source seeking details. But unbeknownst to you, your email has been infected with malware. When your message is opened, the software secretly scours your source’s computer for insider information.
It’s a hypothetical situation – but not far-fetched, says Geoffrey King, a lawyer and lecturer who previously ran the Internet and technology policy program at the Committee to Protect Journalists. Continue reading