Cyberattacks Essay

938 Words2 Pages

The United States’ healthcare system is a three-trillion-dollar industry consisting of doctors, nurses, hospitals, pharmaceutical companies, medical equipment providers, and health insurers. With so many components and millions of patients to care for, fast efficient health information systems are needed to reduce cost, store and modify patient information, and administer quality care (Akowuah, Yuan, Xu, Wang, 2012, pg. 40). Although health information systems have helped increase the healthcare industry’s efficiency and effectiveness, it has also exposed millions of patient’s identities and medical records to cyber-attacks. Managers in the healthcare field should be aware of cyberattacks, the laws that protect and secure patient’s privacy, …show more content…

Cyber-attacks cost the healthcare industry 5.6 billion dollars a year (Grealish, 2016). One of the largest attacks resulted in 80 million current and former Anthem Health Insurance customers’ records being accessed (Wallace, 2016). Cyberattacks come in many forms, data breaches, ransomware (a form of malware), online scams, etc. (Savage, 2016, p. 23). One case of ransomware (a takeover of a computer system until a ransom is paid) occurred when Hollywood Presbyterian Medical Center’s computer systems were held “hostage” for ten days, causing mass confusing throughout the hospital, and frustrating staff and patients (Savage, 2016, 23). Some patients were even sent to the other hospitals (Savage, 2016 p. 23). In order to regain control of their computer systems a ransom of $17,000 was paid to the attackers (Savage, 2016, p. 23). Scammers, however, cost healthcare providers and Medicare millions by billing them for fraudulent health services. Patient’s identities are also used to gain access to consultations and prescriptions drugs (Gealish, 2016). Events and practices like these demonstrate how disastrous cyberattacks are to the healthcare …show more content…

For instance, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), “standardizes the use of electronic health information and mandates the development of security standards and safeguards for the use of electronic health information” (Akowuah, Yuan, Xu, Wang, 2012, pg. 41). Although, HIPPA is federal mandated, in some cases state laws take precedence over federal privacy and security laws. For example, in states where there is child abuse, death, or injury state laws override HIPPA laws (Akowuah, Yuan, Xu, Wang, 2012, pg. 43). State laws also override federal laws when the state laws protect patient’s information more than federal laws, and during financial audits (Akowuah, Yuan, Xu, Wang, 2012, pg. 43). Therefore, managers must understand and thoroughly educate their healthcare personnel on the on all privacy and security laws, to know how to properly address cyber-attack and prevent

Open Document