The Growing Number of Cybersecurity Vulnerabilities Inside Healthcare Supply Chain

Maurice L. McBride

Abstract


The healthcare supply chain is increasingly vulnerable to cybersecurity risks due to the integration of digital technology. The rise of digital records, telemedicine, and network connectivity has made it more susceptible to cyberattacks. The COVID-19 pandemic has further exacerbated this vulnerability, highlighting deficiencies in medical supplies, equipment, and services. The sector has implemented cybersecurity precautions, such as following HIPAA and GDPR, and collaborating with authorities and experts. However, the changing threat landscape necessitates continuous updates and changes. The study uses secondary data from the past three years to highlight the need for strong cybersecurity protocols to protect patient data, deliver services, and defend the supply chain from new threats. Future research should explore leveraging blockchain and AI-based cybersecurity, as well as strengthening government regulation, international cooperation, cybersecurity education, and patient empowerment.


Keywords


Healthcare; Cybersecurity; Privacy; Security; Supply Chain

Full Text:

PDF

References


Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues after Covid-19: A survey. Journal of King Saud University – Computer and Information Sciences, 34(10), 8176–8206. https://doi.org/10.1016/j.jksuci.2022.08.003

Argaw, S. T., Troncoso-Pastoriza, J. R., Lacey, D., Florin, M. V., Calcavecchia, F., Anderson, D., Burleson, W., Vogel, J. M., O'Leary, C., Eshaya-Chauvin, B., & Flahault, A. (2020). Cybersecurity of Hospitals: Discussing the challenges and working towards mitigating the risks. BMC Medical Informatics and Decision Making, 20(1). https://doi.org/10.1186/s12911-020-01161-7

Beaman, C., Barkworth, A., Akande, T. D., Hakak, S., & Khan, M. K. (2021). Ransomware: Recent advances, analysis, challenges, and future research directions. Computers & Security, 111(1). https://doi.org/10.1016/j.cose.2021.102490

Cartwright, A. J. (2023). The elephant in the room: cybersecurity in healthcare. Journal of Clinical Monitoring and Computing, p. 37. https://doi.org/10.1007/s10877-023-01013-5

Ducato, R. (2020). Data protection, scientific research, and the role of information. Computer Law & Security Review, 37(105412). Science Direct. https://doi.org/10.1016/j.clsr.2020.105412

Ghadge, A., Weiß, M., Caldwell, N. D., & Wilding, R. (2020). Managing cyber risk in supply chains: a review and research agenda. Supply Chain Management: An International Journal, 25(2), 223–240. https://doi.org/10.1108/scm-10-2018-0357

He, Y., Aliyu, A., Evans, M., & Luo, C. (2020). Healthcare Cyber Security Challenges and Solutions Under the Climate of COVID-19: A Scoping Review (Preprint). Journal of Medical Internet Research, 23(4). ncbi. https://doi.org/10.2196/21747

Neale, C., Kennedy, I., Price, B., Yu, Y., & Nuseibeh, B. (2022). The case for Zero Trust Digital Forensics. Forensic Science International: Digital Investigation, 40, 301352. https://doi.org/10.1016/j.fsidi.2022.301352

Neprash, H. T., McGlave, C. C., Cross, D. A., Virnig, B. A., Puskarich, M. A., Huling, J. D., Rozenshtein, A. Z., & Nikpay, S. S. (2022). Trends in Ransomware Attacks on US Hospitals, Clinics, and Other Health Care Delivery Organizations, 2016-2021. JAMA Health Forum, 3(12), e224873. https://doi.org/10.1001/jamahealthforum.2022.4873

Paul, M., Maglaras, L., Ferrag, M. A., & Almomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. ICT Express, 9(4). https://doi.org/10.1016/j.icte.2023.02.007

Sathiya, V., Nagalakshmi, K., Jeevamalar, J., Anand Babu, R., Karthi, R., Acevedo-Duque, Á., Lavanya, R., & Ramabalan, S. (2023). Reshaping healthcare supply chain using chain-of-things technology and key lessons experienced from the COVID-19 pandemic. Socio-Economic Planning Sciences, 85(101510), 101510. https://doi.org/10.1016/j.seps.2023.101510

Scott, B. K., Miller, G. T., Fonda, S. J., Yeaw, R. E., Gaudaen, J. C., Pavliscsak, H. H., Quinn, M. T., & Pamplin, J. C. (2020). Advanced Digital Health Technologies for COVID-19 and Future Emergencies. Telemedicine journal and e-health: the official journal of the American Telemedicine Association, 26(10), 1226–1233. https://doi.org/10.1089/tmj.2020.0140

Skertic, J. (2021). Cybersecurity Legislation and Ransomware Attacks in the United States, 2015-2019. Doctor of Philosophy (PhD), Dissertation, Political Science & Geography, Old Dominion University. https://doi.org/10.25777/c0vq-t159

Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Khan, R. A. (2020). Healthcare data breaches: Insights and implications. Healthcare, 8(2), 133. NCBI. https://doi.org/10.3390/healthcare8020133

Sobb, T., Turnbull, B., & Moustafa, N. (2020). Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions. Electronics, 9(11), 1864. mdpi. https://doi.org/10.3390/electronics9111864

Wang, Z., Zhang, Y., Chen, Y., Liu, H., Wang, B., & Wang, C. (2023). A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics. Processes, 11(3), 918. https://doi.org/10.3390/pr11030918

Wasserman, L., & Wasserman, Y. (2022). Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health, 4. https://doi.org/10.3389/fdgth.2022.862221

Wilner, A. S., Luce, H., Ouellet, E., Williams, O., & Costa, N. (2022). From public health to cyber hygiene: Cybersecurity and Canada’s healthcare sector. International Journal: Canada’s Journal of Global Policy Analysis, 76(4), 002070202110679. https://doi.org/10.1177/00207020211067946

Yuryna Connolly, L., Wall, D. S., Lang, M., & Oddson, B. (2020). An empirical study of ransomware attacks on organizations: assessing severity and salient factors affecting vulnerability. Journal of Cybersecurity, 6(1). https://doi.org/10.1093/cybsec/tyaa023

Zhang, Y. (2023). Privacy-Preserving with Zero Trust Computational Intelligent Hybrid Technique to English Education Model. Applied Artificial Intelligence, 37(1). https://doi.org/10.1080/08839514.2023.2219560




DOI: https://doi.org/10.53889/citj.v2i1.338

Article Metrics

Abstract view : 140 times
PDF - 78 times

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Cybersecurity and Innovative Technology Journal

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.