Healthcare is among the industries most vulnerable to cyberattacks. As it continues to evolve rapidly and shifting to digitally enabled healthcare services, cybercriminals seek to exploit the vulnerabilities and security weaknesses that are coupled with these changes. As a result of the technological advancements, the healthcare industry is facing a myriad of highly sophisticated threats such as ransomware. The purpose of this research was to identify the evolving ransomware attacks on healthcare providers, their implications, and recommended methods to mitigate future attacks in such a critical industry. The research involved the use of various sources, including security reports from leading cybersecurity companies, research laboratories, scholarly articles, technical whitepapers, and professional journals. The research found healthcare providers are a prime target for ransomware for multiple reasons, including the rapidly expanding attack surface, lack of adequate cyber defenses, exploiting the human factor, and the heightened sense of urgency to restore confidential patient data or medical systems. The research found that ransomware breaches can have serious consequences such as reputation damage, disruption of medical care, undermining of patient safety, data privacy loss, and financial costs. This research examined some notable ransomware attacks in the healthcare industry since 2016 such as Hollywood Presbyterian Medical Center and Virtual Care Provider Incorporated. The research identified the most common infection methods, the different categories of ransomware, and the lifecycle of ransomware infection. The research recommended that healthcare providers should implement multiple layers of cyber defenses and social engineering awareness program to mitigate ransomware attacks.
|School Location:||United States -- New York|
|Source:||MAI 82/3(E), Masters Abstracts International|
|Subjects:||Information Technology, Computer science, Health care management|
|Keywords:||Cybersecurity, Healthcare, Malware, Mitigation, Ransomware, Social engineering|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be