Intelligent Health.tech Issue 18 | Page 63

D I G I T A L D I A G N O S T I C S

In the past , hospitals prioritised locking filing cabinets over securing electronic medical records and concerns about patient privacy were confined to physical safeguarding . Fast forward to today , the digital landscape has transformed and healthcare systems have needed to be more secure than ever .

The realities of cybersecurity and regulatory compliance call for the evolution of the Healthcare Chief Information Security Officers ( CISO ) in order to meet the challenges posed by disruptive cyberthreats . Cyberattacks do more than threaten the bottom line , they can also impact the ability to deliver services and treatment to the public . The pressure that healthcare CISOs face highlights an increased awareness that the focus must shift from cybersecurity to cyber-resilience .
The cost of cybersecurity in healthcare
According to Security Intelligence , a healthcare data breach is among the costliest types of cyberattacks . The average cost of a data breach across different industries is £ 3.5 million , which compares to the average cost of a healthcare data breach at £ 8.59 million . Healthcare has also seen a significant increase in cost of 53.3 % over the past three years . Inside these numbers is money associated with detection and escalation activities , postbreach response and lost business .
As these costs rise , many healthcare organisations face the challenge of recruiting cybersecurity experts . In the 2022 HIMSS Healthcare Cybersecurity Survey , 61 % of security professionals claimed that a core challenge to achieving more robust cybersecurity was a lack of cybersecurity staff , especially when severe threats such as ransomware remain the key threat to organisations around the world .
Complicating matters further , in the average hospital there are dozens of connected devices per patient bed which can include patient monitors to infusion pumps that perform vital functions . Yet many of these devices are running on outdated system versions that are vulnerable to attack .
From CISO to patient , Achi Lewis , Area Vice President of EMEA for Absolute Software , delves into the complexities and importance of cybersecurity in healthcare .
Traditional endpoints such as tablets and laptops still need protection as well , as any data stolen from them can be uploaded to the dark web . These devices are likely to have private health information on them which needs protecting . Tracking and keeping an accurate inventory of technology is a critical security

NAVIGATING AN EVOLVING LANDSCAPE : THE HEALTHCARE CISO

www . intelligenthealth . tech 63