2023
DOI: 10.1093/jalm/jfac119
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity and Information Assurance for the Clinical Laboratory

Abstract: Background Network-connected medical devices have rapidly proliferated in the wake of recent global catalysts, leaving clinical laboratories and healthcare organizations vulnerable to malicious actors seeking to ransom sensitive healthcare information. As organizations become increasingly dependent on integrated systems and data-driven patient care operations, a sudden cyberattack and the associated downtime can have a devastating impact on patient care and the institution as a whole. Cyberse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…In addition, cyber attackers use different means to commit a cyberattack, and the employees have no skills or awareness to recognize them. They share and respond honestly, which leads to cybersecurity issues [ 52 ]. Therefore, in adopting information systems in healthcare organizations, the skills of the system users play a significant role.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, cyber attackers use different means to commit a cyberattack, and the employees have no skills or awareness to recognize them. They share and respond honestly, which leads to cybersecurity issues [ 52 ]. Therefore, in adopting information systems in healthcare organizations, the skills of the system users play a significant role.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cybercriminals exploit weaknesses in IoMT devices when the firmware is not frequently updated, exposing healthcare users' devices to zero-day attacks since attackers may easily hack and steal sensitive patient medical data [85]. According to Capuano et al [90] and Patel et al [91], zero-day vulnerabilities in smart healthcare are security weaknesses in healthcare software, hardware, firmware, or systems that are unknown to healthcare service providers but are exploited by cybercriminals and for which no patch has been publicly released. The method that adversaries use to exploit healthcare software or system vulnerabilities is a zero-day exploit.…”
Section: Zero-day Vulnerabilitiesmentioning
confidence: 99%
“…Medical IoT devices integrate sensors and actuators into SHSs, providing multiple benefits to healthcare professionals and patients regarding efficiency, convenience, and enhanced patient care. However, these devices are prone to critical susceptibilities that cyber criminals may exploit, posing significant risks to patient privacy, security, and safety [91].…”
Section: Medical Iot Device Vulnerabilitiesmentioning
confidence: 99%
“…As healthcare organizations increasingly rely on digital technologies, the importance of cybersecurity cannot be overstated. The principles of cybersecurity in healthcare encompass a broad range of practices and strategies designed to safeguard sensitive health information from cyber threats and breaches (Patel et al, 2023). One of the primary principles of cybersecurity in healthcare is ensuring the confidentiality, integrity, and availability (CIA) of patient data.…”
Section: Literature Review Core Principles Of Cybersecurity In Health...mentioning
confidence: 99%