2021
DOI: 10.3390/healthcare9101335
|View full text |Cite
|
Sign up to set email alerts
|

Hospitals’ Cybersecurity Culture during the COVID-19 Crisis

Abstract: The coronavirus pandemic led to an unprecedented crisis affecting all aspects of the concurrent reality. Its consequences vary from political and societal to technical and economic. These side effects provided fertile ground for a noticeable cyber-crime increase targeting critical infrastructures and, more specifically, the health sector; the domain suffering the most during the pandemic. This paper aims to assess the cybersecurity culture readiness of hospitals’ workforce during the COVID-19 crisis. Towards t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…Medical organizations face a battle in protecting their systems and digital equipment against a variety of cyber threats [41]- [43]. Because of this, the authors mention that blockchain technology preserves the security and privacy of data against cyber-attacks, this technology is based on a blockchain [44]- [51] this technology comprises several nodes which hide confidential information of the organization and prevents them from being disclosed to malicious nodes [52]- [56] advanced encryption and has a rapid response plan for such incidents [57]- [59], he blockchain alerts to any possible cyber-attack by preventing hackers from altering the stored information [60]- [65]. On the other hand, the authors recommend the ontology tool that is equipped with rules, classifying security threats and automatically recommending controls that can be applied in the face of a threat [66], [67].…”
Section: What Technologies Are Immersed In the Healthcare Sector To A...mentioning
confidence: 99%
“…Medical organizations face a battle in protecting their systems and digital equipment against a variety of cyber threats [41]- [43]. Because of this, the authors mention that blockchain technology preserves the security and privacy of data against cyber-attacks, this technology is based on a blockchain [44]- [51] this technology comprises several nodes which hide confidential information of the organization and prevents them from being disclosed to malicious nodes [52]- [56] advanced encryption and has a rapid response plan for such incidents [57]- [59], he blockchain alerts to any possible cyber-attack by preventing hackers from altering the stored information [60]- [65]. On the other hand, the authors recommend the ontology tool that is equipped with rules, classifying security threats and automatically recommending controls that can be applied in the face of a threat [66], [67].…”
Section: What Technologies Are Immersed In the Healthcare Sector To A...mentioning
confidence: 99%
“…Not all hospitals are willing to do this, and few research exercises take place ‘in the wild’ which limits their effectiveness. Other attempts to investigate phishing susceptibility within hospitals have used alternative means of measurement such as a phishing questionnaire 2 Whilst research projects offer more control over the demographics of participants and control over experimental conditions which facilitates statistical comparisons of participants by demographic and/or experimental conditions, they are not a reliable measure of behaviour ‘in the wild’.…”
Section: Discussion and Lessons Learntmentioning
confidence: 99%
“…The COVID-19 pandemic saw an increase in phishing attacks in general 1 and targeted at the healthcare sector specifically. 2 Phishing is a form of deception in which the attacker sends a fraudulent message designed to trick a human target into revealing sensitive information or to enable malicious software such as ransomware to infiltrate the target's infrastructure. Phishing is typically carried out through email, 3 , 4 though less common forms exist through SMS (Smishing) or Voice calls (Vishing).…”
Section: Introductionmentioning
confidence: 99%
“…However, the wide-ranging pre-existing levels of awareness amongst public users of connected places use a one-size-fits-all approach for the explanation of security and privacy issues, which is challenging. For example, many members of the public have a good understanding of network and data security processes but with low awareness of threats [26], or the information being shared by their devices in a connected place [8,18].…”
Section: Public Perceptions Influencing Public Security Behaviorsmentioning
confidence: 99%
“…Taher et al [28] suggest students' privacy concerns in 'smart campus buildings' are influenced by their experiences and knowledge in other computing contexts, and that similar consent controls would be desirable. Other authors commented on the influence of the personal experience of cyberattack in cyberspace, as opposed to in a (a) cyber-physical environment (connected place [28]); (b) demographic differences (age, gender [18,29]); and (c) pre-existing awareness of cybersecurity vulnerabilities and controls [26]. However, none of these findings are comprehensively investigated enough to draw any applicable conclusions from.…”
Section: Public Perceptions Influencing Public Security Behaviorsmentioning
confidence: 99%