Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Sensitive medical records are at risk!
Security Awareness

Sensitive medical records are at risk!

In mid-July of this year, a network was attacked that organizes the medical records of eleven hospitals and four geriatric care institutions from Rhineland-Pala...

Jan Hörnemann Jan Hörnemann Chief Operating Officer · Prokurist
Updated: October 9, 2024 3 min read read
ISO 27001 Lead Auditor (PECB/TÜV) T.I.S.P. (TeleTrusT) ITIL 4 (PeopleCert) BSI IT-Grundschutz-Praktiker (DGI) Ext. ISB (TÜV) BSI CyberRisikoCheck CEH (EC-Council)

TL;DR

In July 2019, a cyberattack hit a healthcare network serving eleven hospitals and four geriatric care institutions in Rhineland-Palatinate and Saarland, resulting in data theft and partial encryption. Medical records are especially valuable on the black market because, unlike passwords or credit cards, they cannot be changed. Only 6% of German hospitals treat enough inpatient cases to qualify as critical infrastructure (KRITIS) and receive corresponding IT security funding - leaving 94% with fewer resources. The Marburger Bund has called for all hospitals handling sensitive health data to be classified as critical infrastructure regardless of case volume.

Table of Contents (3 sections)

In mid-July of this year, a network was attacked that organizes the medical records of eleven hospitals and four geriatric care institutions from Rhineland-Palatinate and Saarland. Data security is a problem for many hospitals and comparable institutions.

Hacking attack on hospitals

Often sensitive data is not only stolen, but the attacker also tries to extort a ransom. The term Ransomware stands for a hacking attack that encrypts the databases and can thus build up blackmail. The attackers proceeded similarly in mid-July. The network, which was hacked by a security hole, could be encrypted to a large extent after the data was stolen. Whether the attackers demanded a ransom has not been publicly disclosed. Institutions that work with sensitive medical records are locative for attackers. This is because this data is particularly valuable on the black market because it cannot be altered. A credit card or password can be changed or blocked. Information from medical records, on the other hand, cannot be changed and are therefore very sensitive data that can potentially be used against you.

Security of my medical records

We already reported in detail on the safety of our own health data at the beginning of this year. The sensitive data processed by large hospitals or smaller practices should be protected. However, it is often difficult for smaller institutions to keep IT security up to date due to a lack of capital. The capital that the various institutions are entitled to for data security depends on how many inpatient cases are treated in one year. The threshold is 30,000 cases, because from this number on an institution is considered a critical infrastructure (KRITIS). Since this number only reaches 6% of all hospitals in Germany, 94% of the other institutions have less money available to keep data security up to date.

The Solution

The simplest solution would be to lower the brand so that a higher percentage is classified as critical infrastructure. Another option would be to remove the brand and classify any institution working with sensitive health data as a critical infrastructure. This is exactly the approach the Marburger Bund is pursuing: "It doesn't matter in which hospital patients are treated - their highly sensitive disease-related data are equally well protected against unauthorized access everywhere," demands Rudolf Henke, 1st Chairman of the Marburger Bund, in view of the recent hacker attacks on clinics in Rhineland-Palatinate and Saarland. Since this possibility would take up considerably more money, it has not yet been possible to agree on how IT security in hospitals can be kept up to date.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Jan Hörnemann
Jan Hörnemann

Chief Operating Officer · Prokurist

E-Mail

M.Sc. Internet-Sicherheit (if(is), Westfälische Hochschule). COO und Prokurist mit Expertise in Informationssicherheitsberatung und Security Awareness. Nachwuchsprofessor für Cyber Security an der FOM Hochschule, CISO-Referent bei der isits AG und Promovend am Graduierteninstitut NRW.

11 Publikationen
ISO 27001 Lead Auditor (PECB/TÜV) T.I.S.P. (TeleTrusT) ITIL 4 (PeopleCert) BSI IT-Grundschutz-Praktiker (DGI) Ext. ISB (TÜV) BSI CyberRisikoCheck CEH (EC-Council)
Certified ISO 27001ISO 9001AZAV