Cybersecurity Lessons From the Change Healthcare Attack

被引:0
|
作者
Neprash, Hannah T. [1 ]
Dameff, Christian [2 ,3 ]
Tully, Jeffrey [4 ]
机构
[1] Univ Minnesota, Sch Publ Hlth, Div Hlth Policy & Management, 420 Delaware St SE,MMC 729, Minneapolis, MN 55455 USA
[2] Univ Calif San Diego, Dept Emergency Med, San Diego, CA USA
[3] Univ Calif San Diego, Dept Comp Sci & Engn, San Diego, CA USA
[4] Univ Calif San Diego, Dept Anesthesiol, San Diego, CA USA
关键词
D O I
10.1001/jamainternmed.2024.3162
中图分类号
R5 [内科学];
学科分类号
1002 ; 100201 ;
摘要
This Viewpoint describes the consequences of the ransomware attack on Change Healthcare and the need for increased cybersecurity measures in the health care infrastructure.
引用
收藏
页码:1283 / 1284
页数:2
相关论文
共 50 条
  • [31] RISK MANAGEMENT Cybersecurity's Human Factor: Lessons from the Pentagon
    Winnefeld, James A. Sandy, Jr.
    Kirchhoff, Christopher
    Upton, David M.
    HARVARD BUSINESS REVIEW, 2015, 93 (09) : 126 - 126
  • [32] Towards a Healthcare Cybersecurity Certification Scheme
    Hovhannisyan, Kristine
    Bogacki, Piotr
    Colabuono, Consuelo Assunta
    Lofu, Domenico
    Marabello, Maria Vittoria
    Maxwell, Brady Eugene
    2021 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2021), 2021,
  • [33] Investigating Blockchain Technology for HealthCare CyberSecurity
    Davis, D.
    MEDICAL PHYSICS, 2022, 49 (06) : E784 - E784
  • [34] Cybersecurity and healthcare: how safe are we?
    Martin, Guy
    Martin, Paul
    Hankin, Chris
    Darzi, Ara
    Kinross, James
    BMJ-BRITISH MEDICAL JOURNAL, 2017, 358
  • [35] LESSONS FROM A JOURNEY INTO CHANGE
    MURPHY, CU
    EDUCATIONAL LEADERSHIP, 1991, 48 (08) : 63 - 67
  • [36] Learning From Lessons for Change
    Stannard, Daphne
    AORN JOURNAL, 2020, 112 (05) : 502 - 504
  • [37] . Legislation and the Negative Impact on Cybersecurity in Healthcare
    Daniels, Jesse
    Bhatia, Sajal
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 691 - 697
  • [38] Cybersecurity: A Survey of Vulnerability Analysis and Attack Graphs
    Lahcen, Rachid Ait Maalem
    Mohapatra, Ram
    Kumar, Manish
    MATHEMATICS AND COMPUTING (ICMC 2018), 2018, 253 : 97 - 111
  • [39] Can I Really Protect My Broadcast Plant From a Cybersecurity Attack?
    Pecena W.M.
    SMPTE Motion Imaging Journal, 2023, 132 (02): : 57 - 64
  • [40] Using the Cybersecurity Kill Chain for Attack and Defence
    Cooper M.
    ITNOW, 2022, 64 (02) : 38 - 41