414
views
1
recommends
+1 Recommend
1 collections
    0
    shares

      One-Click Submission System Now Available for SO Preprints, learn more on how this works in our blog post and don't forget to check the video, too!

      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Case Study: Responding to Cybersecurity Threats in the Healthcare Sector

      Preprint
      In review
      research-article
        1 ,
      ScienceOpen Preprints
      ScienceOpen

            Abstract

            The healthcare sector in the United States faced an unprecedented cybersecurity threat in October 2020, leading to a cascade of events without established protocols for response. This case study examines the response to the cyberattack in the Boston area (Region 4C), evaluating actions, outcomes, strengths, weaknesses, and strategies for future incidents. Initiated by credible threats reported by federal agencies, the incident escalated rapidly as hospitals encountered suspicious emails and ransomware attacks. Regional emergency management coordination, led by Conference of Boston Teaching Hospitals Emergency Management (COBTH), along with Boston Public Health Commission and Mayor’s Office of Emergency Management, played crucial roles in mitigating the crisis. Challenges such as communication disruptions and lack of cybersecurity personnel lists were swiftly addressed through establishment of redundant communication channels and information security officer lists. Strengths included pre-existing emergency preparedness measures, collaboration between healthcare entities and agencies, and timely information dissemination. Utilization of National Incident Management System (NIMS), Incident Command System (ICS), and Hospital Incident Command System (HICS) facilitated coordinated response. Despite the incident's resolution without patient care impacts, post-incident analysis identified areas for improvement. Recommendations include developing plans for communication downtime, creating cybersecurity officer lists, and enhancing redundant communication methods. Lessons learned emphasize the importance of proactive technology readiness and continual refinement of response protocols for future cyber threats.

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            14 May 2024
            Affiliations
            [1 ] Anna Maria College;
            Author notes
            Author information
            https://orcid.org/0009-0000-6927-1018
            Article
            10.14293/PR2199.000866.v1
            1dc6e38b-bbe8-4628-9972-0e7ffccd6631

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 14 May 2024
            Categories

            Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
            Medicine

            Comments

            Comment on this article