Literature DB >> 34644601

How to Respond to a Ransomware Attack? One Radiation Oncology Department's Response to a Cyber-Attack on Their Record and Verify System.

Amy S Harrison1, Paul Sullivan2, Alex Kubli2, Kathleen M Wilson2, Amy Taylor2, Nicholas DeGregorio2, Joseph Riggs2, Maria Werner-Wasik2, Adam Dicker2, Yevgeniy Vinogradskiy2.   

Abstract

The digitization of healthcare for patient safety and efficiency introduced third party networks into closed hospital systems increasing the probability of cyberattacks and their consequences(1). In April 2021, a major vendor of a Radiation Oncology (RO) record and verify system (RVS) suffered a ransomware attack, affecting our department and many others across the United States. This article summarizes our response to the ransomware event including workflows, team member roles, responsibilities, communications and departmental recovery. The RVS created or housed accurate patient dose records for 6 locations. The immediate response to the ransomware attack was to shut down the system including the ability to treat patients. With the utilization of the hospital EMR and pre-existing interfaces with RVS, the department was able to safely continue patient radiotherapy treatments innovatively utilizing a direct Digital Imaging and Communications in Medicine (DICOM) transfer of patient data to the linear accelerators and implementing paper charting. No patients were treated in the first 24 hours of the attack. Within 48 hours of the ransomware event, 50% of patients were treated, and within 1 week, 95% of all patients were treated using direct DICOM transfer and paper charts. The RVS was completely unavailable for 2.5 weeks and full functionality was not restored for 4.5 weeks. A phased approach was adopted for re-introduction of patient treatments back into the RVS. Human capital costs included communication, outreach, workflow creation, quality assurance and extended clinical hours. Key lessons learned were to have a back-up of essential information, employ 'dry run' emergency training, having consistent parameter requirements across different vendor hardware and software, and having a plan for the recovery effort of restoring normal operations once software is operational. The provided report presents valuable information for the development of cyber-attack preparedness for RO departments.
Copyright © 2021 American Society for Radiation Oncology. Published by Elsevier Inc. All rights reserved.

Entities:  

Mesh:

Year:  2021        PMID: 34644601     DOI: 10.1016/j.prro.2021.09.011

Source DB:  PubMed          Journal:  Pract Radiat Oncol        ISSN: 1879-8500


  5 in total

1.  Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.

Authors:  Aleksandra Mileva; Aleksandar Velinov; Vesna Dimitrova; Luca Caviglione; Steffen Wendzel
Journal:  Entropy (Basel)       Date:  2022-01-25       Impact factor: 2.524

2.  Impact of and Response to Cyberattacks in Radiation Oncology.

Authors:  Carl J Nelson; Emilie T Soisson; Puyao C Li; Nataniel H Lester-Coll; Havaleh Gagne; Matthew A Deeley; Christopher J Anker; Lori Ann Roy; H James Wallace
Journal:  Adv Radiat Oncol       Date:  2022-06-18

3.  Readiness for Radiation Treatment Continuity: Survey on Contingency Plans Against Cyberattacks.

Authors:  ByongYong Yi; Amit Sawant; Shifeng Chen; Sung-Woo Lee; Baoshe Zhang
Journal:  Adv Radiat Oncol       Date:  2022-09-16

4.  A National Cyberattack Affecting Radiation Therapy: The Irish Experience.

Authors:  Aileen Flavin; Eve O'Toole; Louise Murphy; Ruth Ryan; Brendan McClean; Clare Faul; Carol McGibney; Stephen Coyne; Geraldine O'Boyle; Cormac Small; Caroline Sims; Maeve Kearney; Mary Coffey; Anita O'Donovan
Journal:  Adv Radiat Oncol       Date:  2022-08-06

5.  The Impact of a Cyberattack at a Radiation Oncology Department: Immediate Response and Future Preparedness.

Authors:  Michael Oliver; Andrew Pearce; Laurie Stillwaugh; Konrad Leszczynski
Journal:  Adv Radiat Oncol       Date:  2022-06-17
  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.