| Literature DB >> 34746516 |
Christine Joyce1, Faustin Laurentiu Roman2, Brett Miller3, John Jeffries4, Robert C Miller3.
Abstract
PURPOSE: Modern image guided radiation therapy is dependent on information technology and data storage applications that, like any other digital technology, are at risk from cyberattacks. Owing to a recent escalation in cyberattacks affecting radiation therapy treatments, the American Society for Radiation Oncology's Advances in Radiation Oncology is inaugurating a new special manuscript category devoted to cybersecurity issues. METHODS AND MATERIALS: We conducted a review of emerging cybersecurity threats and a literature review of cyberattacks that affected radiation oncology practices.Entities:
Year: 2021 PMID: 34746516 PMCID: PMC8555435 DOI: 10.1016/j.adro.2021.100796
Source DB: PubMed Journal: Adv Radiat Oncol ISSN: 2452-1094
Pandemic-Related Crime Phishing Themes
Exploitation of individuals looking for details on disease tracking, testing, and treatment Impersonation of medical bodies, including the World Health Organization and U.S. Centers for Disease Control and Prevention Financial assistance and government stimulus packages Tailored attacks against employees working from home Scams offering personal protective equipment Passing mention of coronavirus disease of 2019 within previously used phishing lure content (eg, deliveries, invoices, and purchase orders) |
Cybersecurity Risks in 2021
Phishing, including business e-mail compromises Ransomware attacks, including distributed denial of service Hacking of unpatched software and external services (remote desktop protocol, virtual private network, file transfer protocol, databases) Software vulnerabilities, misconfigurations Lack of security logging and monitoring Third-party supplier's security (cloud, Internet of Things, apps) Inadequate processes (eg, patching, backup, change management) Technical debt/legacy software and increased attack surface User-based mistakes and cyber awareness (technical, operational, and user literacy) Threat identification and incident response |
Recommendations for Critical Controls
Require multifactor authentication for all identities and alert on unusual behavior Update software, including operating systems, applications, and firmware on IT network assets, in a timely manner Implement endpoint detection and response tools and systems that can block and alert on malicious activity Enable strong e-mail protection filters to prevent phishing e-mails from reaching end users; filter e-mails containing executable files and macros from reaching end users Maintain offline, encrypted backups of data, and regularly test backups Implement a user awareness training program, and simulate attacks for phishing, ransomware, and other attack types Review network segmentation and limit administrative access based on least privilege principles Set antivirus/antimalware programs to conduct regular scans of IT network assets using up-to-date signatures Filter network traffic to prohibit ingress and egress communications with known malicious Internet protocol addresses Conduct regular cyber risk assessments on both external and internal assets Review timely advisories sent by local and national cyber security and information sharing and analysis centers Review third-party services risks, specifically those related to remote access and IT management Practice business continuity and incident response plans Increase vigilance in monitoring, detecting, and responding to suspicious activity Implement centralized logging and managed security operation services Ongoing staff education regarding cybersecurity threats, adapted to the nature of the most current threats |
Abbreviations: IT = information technology.