{"id":2960,"date":"2022-10-19T05:23:13","date_gmt":"2022-10-19T05:23:13","guid":{"rendered":"\/cybersecurity-blog\/?p=2960"},"modified":"2022-12-21T06:43:49","modified_gmt":"2022-12-21T06:43:49","slug":"how-to-protect-hospitals-from-cyberattacks","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/","title":{"rendered":"How to Protect Hospitals From Cyberattacks"},"content":{"rendered":"\n<p>When we think about hospitals, we usually don\u2019t think about IT. But there\u2019s a huge digital infrastructure behind healthcare. From digitized patient records to early diagnosis neural networks: modern medicine is at least as dependent on computers working properly as any other industry.&nbsp;<br><\/p>\n\n\n\n<p>Cybercriminals know this too and repeatedly target healthcare providers, impacting their ability to treat patients:&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">One of the largest hospital chains in the U.S. was hit with a suspected ransomware cyberattack this week, leading to delayed surgeries, hold ups in patient care and rescheduled doctor appointments across the country. <a href=\"https:\/\/t.co\/m4rWh1GSHi\">https:\/\/t.co\/m4rWh1GSHi<\/a><\/p>&mdash; NBC News (@NBCNews) <a href=\"https:\/\/twitter.com\/NBCNews\/status\/1578418905168723969?ref_src=twsrc%5Etfw\">October 7, 2022<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Amid the pandemic, telemedicine adoption surged. For example, telehealth adoption in the US <a href=\"https:\/\/www.mckinsey.com\/industries\/healthcare-systems-and-services\/our-insights\/telehealth-a-quarter-trillion-dollar-post-covid-19-reality\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">increased<\/a> from just 11% to 46% in 2020. The shift to remote healthcare happened at a time when hospitals were battling Covid, the strain was at its highest and their staff was exhausted.&nbsp;<br><\/p>\n\n\n\n<p>Cybercriminals took advantage. According to a report by Protenus, there was a 44% year-over-year increase in incidents involving healthcare organizations in 2022. Over 50 million patient records were leaked in 905 attacks.<br><\/p>\n\n\n\n<p>As it turned out, a combination of common and unique security challenges meant that hospitals were unprepared for the rapidly rising <a href=\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-threats-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">cyber threat<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5 hospital cybersecurity challenges<\/h2>\n\n\n\n<p>Here are some of the reasons that make hospitals especially susceptible to hacking:&nbsp;<\/p>\n\n\n\n<p><strong>1. Personal devices<\/strong><\/p>\n\n\n\n<p>Doctors and nurses access confidential information on personal devices.<strong> <\/strong>This boosts productivity and convenience, but also <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC7333072\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">creates<\/a> cybersecurity risks. Without a unified security policy, each gadget is a potential attack vector.&nbsp;<\/p>\n\n\n\n<p><strong>2. Vulnerabilities in medical equipment&nbsp;<\/strong><\/p>\n\n\n\n<p>McAfee researchers found troubling vulnerabilities in B. Braun infusion pumps that can allow attackers to hijack them and deliver doses of medication remotely. Some cardiac devices are also <a href=\"https:\/\/www.reuters.com\/article\/us-health-heart-pacemaker-cyber-idUSKCN1G42TB\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">susceptible<\/a> to cyberattacks.<\/p>\n\n\n\n<p><strong>3. Bad Practises<\/strong><\/p>\n\n\n\n<p>CISA identified the use of bad practices in hospitals.<strong> <\/strong>Standard or known passwords, end-of-life software, and lack of 2FA are all <a href=\"https:\/\/www.cisa.gov\/BadPractices\">examples<\/a> of bad cybersecurity practices.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>4. High impact of attacks<\/strong><\/p>\n\n\n\n<p>Attacks directly impact the ability of hospitals to provide healthcare<strong>. <\/strong>A <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/CISA_Insight_Provide_Medical_Care_Sep2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">study<\/a> by CISA found that there is a direct correlation between hospital cyberattacks and mortality rates. Cyber incidents disable testing and diagnostic equipment and increase staff workloads. This makes healthcare providers ideal ransomware victims, as the pressure to resume operations is extreme.&nbsp;<\/p>\n\n\n\n<p><strong>5. High value of patient records<\/strong><\/p>\n\n\n\n<p>Patient records are worth a lot of money.<strong> <\/strong>These files contain confidential information like social security numbers and medical history. Sources don\u2019t agree on the exact price, but they sell from $10 to $1000 with an average of around $100. And whole databases can go for hundreds of thousands of dollars. Because of this, hospitals face data breaches and insider threats.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Top 6 hospital cyber threats<\/h2>\n\n\n\n<p>These are the most common threats faced by healthcare providers, but it\u2019s not the full list.&nbsp;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/vRhhkaTLOWe02n_Yjn6iV7cUDrnjyWOXKTrQaQPjNXw3LO_NaJsRJ7X3MjCWjSwoKjmjHpGCbDQLbEx2ENe02IhgfhJUe2cU9kiygDFRymO2xyCulr-T_dvP_E8c-Ya-D04zmB8ALnTKPuoyART1Z6qwrjhSh7SZcwN7l2lzgd3gzDEAWXj3TR2_wQ\" alt=\"Top 6 hospital cyber threats\" width=\"841\" height=\"1159\"\/><\/figure><\/div>\n\n\n\n<p><strong>1. Ransomware.&nbsp;<\/strong><\/p>\n\n\n\n<p>Ransomware attacks lock medical professionals out of workstations and disrupt the ability to issue urgent care by encrypting vital files. The healthcare industry is in the top 3 sectors <a href=\"https:\/\/newsroom.trendmicro.com\/2022-08-31-Trend-Micro-Warns-of-75-Surge-in-Ransomware-Attacks-on-Linux-as-Systems-Adoptions-Soared#:~:text=According%20to%20Trend%20Micro%20data,three%20sectors%20targeted%20with%20malware\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">targeted<\/a> by this type of malware.<\/p>\n\n\n\n<p><strong>2. DDoS attacks<\/strong><\/p>\n\n\n\n<p>Criminals flood hospital servers with junk traffic, disrupting access to patient records and disabling medical equipment. Sometimes DDoS is combined with ransom attacks and other malware. Roughly 75% of all multi-vector threats are <a href=\"https:\/\/business.comcast.com\/community\/browse-all\/details\/2021-comcast-business-ddos-threat-report\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">concentrated<\/a> in healthcare, government, education, and finance.<\/p>\n\n\n\n<p><strong>3. XSS attacks&nbsp;<\/strong><\/p>\n\n\n\n<p>In cross-site scripting invasion, hackers create fake internal login pages and steal credentials of medical workers to access confidential data.&nbsp;<\/p>\n\n\n\n<p><strong>4. Phishing<\/strong><\/p>\n\n\n\n<p>Attackers use email or messaging apps to trick the victim into giving away credentials or downloading malware. One study <a href=\"https:\/\/informatics.bmj.com\/content\/26\/1\/e100031\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">found<\/a> that nearly 3% of email traffic to National Health Service trust is potentially malicious. This represents 100,000 phishing emails per year for just one organization.&nbsp;<\/p>\n\n\n\n<p><strong>5. Zero-day exploits<\/strong><\/p>\n\n\n\n<p>Zero-day exploits are previously unknown vulnerabilities that hackers use to gain entry into a system. They exist in IoT medical devices and end-of-life or unsupported software.<\/p>\n\n\n\n<p><strong>6. Insider threats<\/strong><\/p>\n\n\n\n<p>Medical workers can cause data breaches by accidentally or intentionally accessing and copying databases. Confidential files can be taken off-site on digital hard drives or leaked from personal devices that can access patient records.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What can hospitals do?<\/h2>\n\n\n\n<p>Here are a few methods you can use to protect your hospital against malware and prevent breaches:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Track emerging cyber threats. <\/strong>Malware is constantly evolving, and one of the best ways to defend against it is to be proactive and know what\u2019s out there. <a href=\"https:\/\/www.cisa.gov\/uscert\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">CISA<\/a>, <a href=\"https:\/\/www.imperva.com\/cyber-threat-index\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Imperva<\/a>, and <a href=\"https:\/\/any.run\/malware-reports\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=hospitals\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a> have malware and vulnerability databases that update frequently.&nbsp;<\/li><li><strong>Hold regular risk assessment meetings. <\/strong>Heads of departments should periodically hold meetings to analyze potential attack vectors.<\/li><li><strong>Plan for a breach, so you know what to do when it happens. <\/strong>You don\u2019t want to be caught off guard during an incident. Prepare a response plan that outlines ownership and responsibility, communication, containment, eradication, and recovery.<\/li><li><strong>Educate employees about phishing. <\/strong>Teach staff about the dangers of malicious links and files and how to identify phishing.&nbsp;<\/li><li><strong>Filter spam emails. <\/strong>This won\u2019t block 100% of malicious emails, but it will reduce their amount \u2014 and risk associated with phishing \u2014 significantly.&nbsp;&nbsp;<\/li><li><strong>Use 2FA. <\/strong>Two Factor Authentication requires users to provide an OTP code sent to a different device during login. This simple measure is often enough to prevent unauthorized access.<\/li><li><strong>Log privileged activities. <\/strong>For example, giving an account additional rights is a privileged activity. Monitor these actions to identify insider threats or system breaches early.&nbsp;<\/li><li><strong>Disable USB ports.<\/strong> Flash drives can be used to smuggle patient records from hospital grounds. Disabling USB ports on workstations ensures that copying data to a hard drive is impossible.<\/li><li><strong>Control what applications can do.<\/strong> For example, configure workstations so that Excel can run, but can\u2019t access PowerShell. This will protect against backdoor malware.<\/li><li><strong>Disable credentials caching. <\/strong>Many applications and web browsers store login credentials locally, which allows hackers to steal them without admin rights.&nbsp;<\/li><li><strong>Backup data to a dedicated server. <\/strong>Set up a server that isn\u2019t part of the main network and use it to store backups. This will secure it from any damage and ensure that data won\u2019t be lost in ransomware attacks.&nbsp;<\/li><li><strong>Restrict employee permissions. <\/strong>A good rule of thumb to go by: if an employee doesn\u2019t need this information for their work, they shouldn\u2019t be able to access it.&nbsp;<\/li><li><strong>Implement an offboarding process. <\/strong>Limit which data departing employees can access.<\/li><li><strong>Clear suspicious files with ANY.RUN. <\/strong>Cybersecurity staff can identify threats with <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=hospitals\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a> in a matter of minutes. It is easy to use and can reveal dangerous links and files.&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Helping hospital staff identify malicious files and links<\/h2>\n\n\n\n<p>In 2020, over 400 healthcare facilities operated by Universal Health Services (UHS), a Fortune 500 company, were <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/uhs-hospitals-hit-by-reported-country-wide-ryuk-ransomware-attack\/\" target=\"_blank\">attacked<\/a> by a ransomware strain known as <a href=\"https:\/\/any.run\/malware-trends\/ryuk?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=hospitals\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Ryuk<\/a>.&nbsp;<br><\/p>\n\n\n\n<p>The incident happened overnight, causing a complete shutdown. Ambulances en route had to be redirected to other hospitals, and patients awaiting surgery could not receive treatment. Financial losses <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/universal-health-services-lost-67-million-due-to-ryuk-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">amounted<\/a> to $67 million, and it took almost a month to restore all systems to working condition.<br><\/p>\n\n\n\n<p>Ryuk is known for targeted attacks against organizations. It is often dropped by an <a href=\"https:\/\/any.run\/malware-trends\/emotet?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=hospitals\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Emotet<\/a> trojan, which arrives in phishing emails. All Emotet needs to infect a system is for a user to interact with the Microsoft Office file and follow on-screen instructions to enable macros.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p>A simple step can prevent this infection. ANY.RUN can detect both Ryuk and Emotet in 2 minutes. Let\u2019s say, we received a suspicious email. It\u2019s something about billing, but it\u2019s littered with spelling errors and there\u2019s a Microsoft Office file attached. These are all telltale signs of <a href=\"https:\/\/any.run\/cybersecurity-blog\/phising-types-of-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">phishing<\/a>. Our spidey sense is tickling, but it could still be legit, right?<br><\/p>\n\n\n\n<p>So against our better judgment, we open the file. Everything seems fine. But it really isn\u2019t. We might not immediately know this, but Emotet is already dropping its payload in the background. Soon all our files will be encrypted, we will be locked out and the only option to restore lost data will be paying a ransom. <br><\/p>\n\n\n\n<p>Or, instead of guessing, we can just upload this file to ANY.RUN and check if it\u2019s malicious.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/24auuDMWzwcRrnVZgXO5SgaJ_AwHnE7ej7XEmAvDamJSi3WDACshgIZagBDmkq-Xfg8_isw3uaO2HpCP8r0CbqDKTRCQ4OHg06qqRmALLkPB718KbsQ5YJ9i954a3zV_le2B7K-D3OqMV8PZlWnYulNHiIWJoVNZsSmP7bL7BGJoAoMY_XYZnGtmcg\" alt=\"Emotet sample in ANY.RUN \"\/><figcaption>Emotet sample in ANY.RUN <\/figcaption><\/figure>\n\n\n\n<p>If there\u2019s a payload, ANY.RUN executes it in a safe virtual environment and records all activity for us to see. Playing the <a href=\"https:\/\/app.any.run\/tasks\/3fda5a0b-09c4-492d-b79d-64a2d01d220f?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=hospitals\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">video<\/a> on the task page makes it clear that as soon as Excel is opened, there\u2019s an attempt to drop an executable file \u2014 which in this case, is Emotet. This behavior is instantly flagged as malicious.&nbsp;<br><\/p>\n\n\n\n<p>And in this <a href=\"https:\/\/app.any.run\/tasks\/c46b2377-354e-4440-852a-16c7369709a3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=hospitals\">example<\/a>, ANY.RUN automatically identifies the executable as Ryuk.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/JVPPidWFWzq_FSFPanX6GkM0Vf2wnCY3Q_rpVDx6BwCggL67mjkkzAiYCJ6VFv0wxxh_R_VaPPzV8MzCXGGEgWkxpGg-SjHSdHPu5V8UlKRnj9aE8aGybCmjUQ35dt9Bh3KdhwZXeSATQjI8gGMpAggmDtesMQa_tOGpVQNMeBH2rDnSt33fusP5PQ\" alt=\"Ryuk sample  in ANY.RUN \"\/><figcaption>Ryuk sample  in ANY.RUN <\/figcaption><\/figure>\n\n\n\n<p>Ryuk has its own peculiarities: it stops the Windows Audio Endpoint Builder that leads to audio services malfunctioning on an infected system. And it also stops the Security Accounts Manager.&nbsp;In the case of Ryuk, the extortion amount can reach $200,000.<br><\/p>\n\n\n\n<p>Like most other <a href=\"https:\/\/any.run\/cybersecurity-blog\/ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ransomware<\/a>, Ryuk deletes shadow copies to prevent the restoration of files. Ransom notes are created in each folder with encrypted files during the encryption process.<br><\/p>\n\n\n\n<p>By the way, ANY.RUN can also check links in the same way.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Computer viruses may pose a direct danger to people\u2019s lives. At least when they attack a hospital and prevent patients from receiving urgent care. Unfortunately, cybercriminals don\u2019t care, and healthcare remains one of the most targeted industries for ransomware and data breaches.&nbsp;<br><\/p>\n\n\n\n<p>It won\u2019t be a day, a week, or a year until many cybersecurity challenges plaguing healthcare providers are solved. But it is possible to reduce risks by following best practices. Sure, some malware is sophisticated. But many tactics used by attackers are basic. They exploit negligence and carelessness. We can avoid these threats with a little effort.&nbsp;<br><\/p>\n\n\n\n<p>Isn\u2019t it our responsibility to <strong>first do no harm<\/strong>?<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we think about hospitals, we usually don\u2019t think about IT. But there\u2019s a huge digital infrastructure behind healthcare. From digitized patient records to early diagnosis neural networks: modern medicine is at least as dependent on computers working properly as any other industry.&nbsp; Cybercriminals know this too and repeatedly target healthcare providers, impacting their ability [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2962,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[10],"class_list":["post-2960","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Hospitals From Cyberattacks - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"To defend hospitals from cybercriminals, you should know what threats you might face and how to fight and prevent them. Read on to find out all about it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"How to Protect Hospitals From Cyberattacks\",\"datePublished\":\"2022-10-19T05:23:13+00:00\",\"dateModified\":\"2022-12-21T06:43:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/\"},\"wordCount\":1603,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/\",\"name\":\"How to Protect Hospitals From Cyberattacks - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-10-19T05:23:13+00:00\",\"dateModified\":\"2022-12-21T06:43:49+00:00\",\"description\":\"To defend hospitals from cybercriminals, you should know what threats you might face and how to fight and prevent them. Read on to find out all about it.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Protect Hospitals From Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Hospitals From Cyberattacks - ANY.RUN&#039;s Cybersecurity Blog","description":"To defend hospitals from cybercriminals, you should know what threats you might face and how to fight and prevent them. Read on to find out all about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"How to Protect Hospitals From Cyberattacks","datePublished":"2022-10-19T05:23:13+00:00","dateModified":"2022-12-21T06:43:49+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/"},"wordCount":1603,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/","url":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/","name":"How to Protect Hospitals From Cyberattacks - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-10-19T05:23:13+00:00","dateModified":"2022-12-21T06:43:49+00:00","description":"To defend hospitals from cybercriminals, you should know what threats you might face and how to fight and prevent them. Read on to find out all about it.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-protect-hospitals-from-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"How to Protect Hospitals From Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2960"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2960"}],"version-history":[{"count":3,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2960\/revisions"}],"predecessor-version":[{"id":4142,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2960\/revisions\/4142"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/2962"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}