In recent years, with the continuous application of technologies such as big data, artificial intelligence, and the Internet of Things in the field of medical and health services, while enjoying the convenient and efficient management brought by new technologies, medical institutions are also facing many "invisible" threats, among which Network security issues are becoming increasingly prominent.
Cyberattacks eyeing healthcare industry
In the first half of 2022 alone, there have been many serious cyber attacks on medical and health institutions around the world. In January, a large-scale data breach occurred in the public health system of Broward Health in Florida, USA, and the information of more than 1.35 million users was leaked, which may include information such as bank accounts, insurance conditions, and medical history; in the same month, the International Committee of the Red Cross was attacked by a network, The humanitarian information of more than 500,000 people was damaged; in May, the health system of Milan, Italy, was attacked by hackers. The computer systems of two hospitals were paralyzed, and the operation and management were greatly affected. Patients could only register for medical treatment through paper forms.
The domestic medical network terminal environment is also facing many challenges. For example, in the process of information construction of medical institutions, most of the equipment has not been replaced in a timely manner, resulting in redundant machines and systems in each department; The terminal performs security detection; when a certain network security risk occurs, the source of the incident cannot be understood in time, and the source of the security incident cannot be traced and held accountable.
Terminals, as "tangible" network nerve endings, widely exist in various scenarios of personal life and enterprise production. In fact, most cyber attacks come from the endpoint. Medical institutions generally have the problem of outdated equipment operating systems, and a large number of high-risk vulnerabilities are easily invaded by hackers and viruses; terminals in outpatient departments, inpatient departments, and nurse stations cannot be managed uniformly, making operation and maintenance difficult; in the intranet environment, the virus database is upgraded difficulty……