Author
Listed:
- Md Jawadur Rahim
- Muhammad Ihsan Ibn Rahim
- Ahlina Afroz
- Omolola Akinola
Abstract
The healthcare industry's reliance on digital technology to improve patient care, operations, and performance has exposed it to cybersecurity threats. The extensive capture, storage, and transmission of confidential data by healthcare institutions has led to a significant prevalence of cyber-attacks. The intersection of healthcare and information technology presents considerable challenges, with patient privacy, the security of medical devices, and the continuity of essential healthcare services all at risk. This study offers a contemporary contextual analysis of IT cybersecurity concerns within the healthcare sector. It employs a systematic methodology to delineate critical risk factors and threats, the strategies they might utilize to attain their compromise aims, and the repercussions they may impose on healthcare delivery. It also explores the measures and guidelines to address this risk. The study highlights the existence of many threats experienced by healthcare organizations, such as data theft and leakage, ransomware, cyber-attacks in different forms, and contaminated medical equipment. One prominent example is the WannaCry attack on the United Kingdom's National Health Service in 2017. According to the survey, there is a severe scarcity of qualified personnel in healthcare organizations who can defend against cyber threats effectively and efficiently, underscoring the urgent need for skilled professionals in cybersecurity. This analysis also discusses various considerations concerning achieving high availability and protecting data in healthcare businesses. It examines how emerging applications like IoMT enhance the quality of medical services for patients and the security challenges these devices pose. The report evaluates the sufficiency of existing regulatory guidelines in addressing emerging dangers, including HIPAA vulnerabilities. The current definitive framework underscores the critical importance of enhancing cybersecurity within healthcare IT. It elucidates optimal strategies for mitigating cyber hazards by promoting technological prevention, staff training, and adherence to organizational policies. The work emphasizes the necessity for ongoing research, the establishment of collaboration between medical professionals and IT security experts, and the formulation of effective strategies to protect patient information and ensure the continuity of healthcare delivery in the face of increasing cyber-attack threats in digitalization.
Suggested Citation
Md Jawadur Rahim & Muhammad Ihsan Ibn Rahim & Ahlina Afroz & Omolola Akinola, 2024.
"Cybersecurity Threats in Healthcare IT: Challenges, Risks, and Mitigation Strategies,"
Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023, Open Knowledge, vol. 6(1), pages 438-462.
Handle:
RePEc:das:njaigs:v:6:y:2024:i:1:p:438-462:id:268
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:das:njaigs:v:6:y:2024:i:1:p:438-462:id:268. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Open Knowledge (email available below). General contact details of provider: https://newjaigs.com/index.php/JAIGS/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.