Sittig Dean F, Singh Hardeep
University of Texas Health Science Center at Houston , School of Biomedical Informatics and UT-Memorial Hermann Center for Health Care Quality and Safety, Houston, Texas.
Houston Veterans Affairs Center for Innovations in Quality, Effectiveness and Safety, Michael E. DeBakey Veterans Affairs Medical Center, Houston, Texas; Section of Health Services Research, Department of Medicine, Baylor College of Medicine, Houston, Texas.
Appl Clin Inform. 2016 Jun 29;7(2):624-32. doi: 10.4338/ACI-2016-04-SOA-0064. eCollection 2016.
Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.
最近,全球范围内发生了几起涉及医院的备受瞩目的勒索软件攻击事件。勒索软件旨在破坏或禁用用户的计算机,除非用户支付赎金。一旦攻击发动,用户有三种选择:1)尝试从备份中恢复数据;2)支付赎金;或者3)丢失数据。在本手稿中,我们讨论一种应对勒索软件的社会技术方法,并概述组织为保护电子健康记录(EHR)系统及底层计算基础设施可采取的四个总体步骤。首先,医疗信息技术专业人员需要通过正确安装和配置连接计算机和网络来确保系统得到充分保护。其次,医疗保健组织需要通过实施以用户为中心的策略来确保更可靠的系统防御,包括对正确和完整使用计算机及网络应用程序进行模拟和培训。与此同时,组织需要持续监控计算机和应用程序的使用情况,以便检测可疑活动,并在安全问题造成损害之前识别并解决它们。最后,组织需要对勒索软件攻击做出充分响应并迅速恢复,同时采取行动防止未来再次发生此类攻击。我们还详细阐述了包括美国国家标准与技术研究院(NIST)在内的其他权威来源的建议。与应对其他复杂的社会技术医疗信息技术挑战的方法类似,预防、减轻此类攻击以及从中恢复的责任由医疗信息技术专业人员和终端用户共同承担。