© 2018 by HolistiCyber. All rights reserved.

  • LinkedIn Social Icon
  • Twitter Social Icon
  • Facebook Social Icon
  • Instagram



In a detailed report, researchers found that the healthcare sector suffered more than half of cyber-attacks in 2017. Ransomware, phishing attacks represent only part of these common attacks. Hospitals and other healthcare organizations did not even know that they were targeted by such malware attacks, indicating that they need to consider advanced malware detection and prevention technologies to accurately assess the risks to their digital infrastructure.

One example of such an attack vector is when a doctor or other healthcare worker is persuaded to open an email sent by an attacker and click a link or attachment that downloads malware to his computer, a so-called “phishing” attack. The attacker can then use this software to gain access to the healthcare organization’s financial, administrative and clinical information systems. Attackers also can use the network to spread into connected medical devices and equipment, such as ventilators, X-ray and MRI machines, medical lasers and even electric wheelchairs. Essentially, any medical device connected to a network is potentially at risk from being taken over and exploited by hackers. In addition, hospitals are converting from paper records to digitized Electronic Health Records (EHRs), The problem is that this unencrypted information is vulnerable to hacker attacks.

These examples led to the conclusion that the reputation of and trust in healthcare organizations depends on their understanding of the true extent of threats and taking sufficient measures to guard against them. 

HolistiCyber helps hospitals and other healthcare organizations identify, asses and mitigate these risks.

Understanding the need for increased security of the patient records, while taking into consideration the ever-changing environment and increased number of medical devices and their complexity, HolistiCyber offers:

  • Assessment of their potential cyber-attack vectors.

  • Implemention of specific safeguards to ensure compliance with HIPAA and other healthcare legislation.

  • Improving the healthcare institution’s ability to adapt to continuous change and new cyber challenges.