Literature DB >> 34868621

Assessing resilience of hospitals to cyberattack.

Hadi Ghayoomi1, Kathryn Laskey2, Elise Miller-Hooks1, Charles Hooks3, Mersedeh Tariverdi4.   

Abstract

OBJECTIVE: This paper investigates the impact on emergency hospital services from initiation through recovery of a ransomware attack affecting the emergency department, intensive care unit and supporting laboratory services. Recovery strategies of paying ransom to the attackers with follow-on restoration and in-house full system restoration from backup are compared.
METHODS: A multi-unit, patient-based and resource-constrained discrete-event simulation model of a typical U.S. urban tertiary hospital is adapted to model the attack, its impacts, and tested recovery strategies. The model is used to quantify the hospital's resilience to cyberattack. Insights were gleaned from systematically designed numerical experiments.
RESULTS: While paying the ransom was found to result in some short-term gains assuming the perpetrators actually provide the decryption key as promised, in the longer term, the results of this study suggest that paying the ransom does not pay off. Rather, paying the ransom, when considered at the end of the event when services are fully restored, precluded significantly more patients from receiving critically needed care. Also noted was a lag in recovery for the intensive care unit as compared with the emergency department. Such a lag must be considered in preparedness plans.
CONCLUSION: Vulnerability to cyberattacks is a major challenge to the healthcare system. This paper provides a methodology for assessing the resilience of a hospital to cyberattacks and analyzing the effects of different response strategies. The model showed that paying the ransom resulted in short-term gains but did not pay off in the longer term.
© The Author(s) 2021.

Entities:  

Keywords:  Cyberattack; digital health solutions; discrete event simulation; healthcare management; hospital emergency services; numerical experiments; ransomware; resilience

Year:  2021        PMID: 34868621      PMCID: PMC8638073          DOI: 10.1177/20552076211059366

Source DB:  PubMed          Journal:  Digit Health        ISSN: 2055-2076


Introduction

In recent years, hospitals and other health care facilities have become increasingly reliant on information technologies. From electronic health records (EHRs) to radiology, nearly all critical functions exploit communications technologies, rendering almost every aspect of daily operations vulnerable to cyberattack. Even as early as 2017, 94% of hospitals relied on EHR data for patient-related processing. Moreover, in 2015, there were an estimated 4.5 billion Internet of Medical Things (IoMT) devices across the world, accounting for 30.3% of all IoT devices worldwide. By 2020, this was expected to rise to 20–30 billion IoMT devices. In fact, it is estimated that 83% of all medical devices are now connected and vulnerable to some form of cyberattack. In medical settings, compromised records and or devices can create slowdowns or termination of procedures, preventing care for patients with critical needs and with potential for fatalities. Such medjacking events may also include modification of the dosages of sensitive medicines or the shutting down of devices while in use in a procedure. Estimates of the cost to the U.S. from cyberattack on primary, secondary and tertiary healthcare facilities will cost over $6 billion annually. Despite their vulnerability to cybercrime and the criticality of their impacts on patient care, as of 2019 only 13% of hospitals in the U.S. conducted annual incident response drills for cyberattack scenarios. In 2017, a major cyberattack called WannaCry infected 25 acute trusts (organizational/managerial units for hospitals) in the United Kingdom, locking devices and disrupting patient care. In follow-on analysis, it was determined that all or almost all units of the National Health Service failed cybersecurity assessments.[6-8] In the U.S., the Food and Drug Administration (FDA) identified 11 types of vulnerabilities wherein an external force could remotely control medical devices. With approximately 200 million medical devices at risk in 2019, health care was declared a major cyber-crime target. There are several mechanisms of vulnerability that are specific to hospitals as discovered through a literature review and interviews of hospital cybersecurity experts (S. Larsen, interview, April 2020, unreferenced; M. Wilkes, interview, August 2020, unreferenced; B. Woods, interview, August 2020, unreferenced). These are well described by Ayala and are synthesized in Table 1. Of special concern are attacks that can disable systems and encrypt data precluding their use as caused by, for example, ransomware, distributed denial of service (DDoS) and theft of sensitive data. Also concerning, during the most critical stages of the COVID-19 pandemic, within 2020, a time when hospitals worldwide were overwhelmed, cyberattacks against them doubled. Some varieties of cyberattacks, such as Business Email Compromise (BEC), have less effect on performance of the hospitals or the patients they serve, but can still come at a cost In fact, the overall cost of BEC in the U.S. in 2018 was US$3.6 billion. In 2018, the healthcare sector was the sixth largest target for this type of attack, accounting for 5% of the total targeted victims.
Table 1.

Vulnerable areas of hospital, potential malicious activities and effects.

Vulnerable Hospital AreaMalicious Activity and EffectsPossible Effect
Magnetic Resonance Imaging (MRI) Increase MRI strengthDamage to patient and machine
Mute hazardous condition alarmsTechnician is unaware of hazards
CT scan or X-ray Increase recommended radiationRadiation sickness
Encrypt internal filesTurn off, ransom demand for unlock
Medical Ventilator Change pressure, volume, or flow alarmPatient in danger
Medical Device Data Systems (MDDS) Lock transfer of dataDelay in the processes
Medical laboratory Change or remove lab resultsRetaking the tests and delays
Building control system (BCS) Turn off building utilities (e.g. electric, water)Delays and danger for patients
Change operating parameters (e.g. temp, oxygen level)Danger for patients
Crash system and changing access informationLocking all processes
Shut down air handling unitsReleasing hazardous materials
Inter/Cloud IT networks Hack routers, records, websitesDelay in patient treatment
Vulnerable areas of hospital, potential malicious activities and effects. Table 2 compiles information about recent attacks on hospitals, their types, and impacts. Whether the focus of the attack or as a secondary outcome, many of the listed cyberattacks involve data breaches. These breaches may aim for monetary gain or to harm the reputation of a person, facility, company or government. They also compromise patient privacy and safety. Table 2 highlights the prevalence of recent ransomware attacks. Because of their prevalence and impacts, hospitals often carry insurance for such attacks.
Table 2.

Significant cyberattacks that affected hospital performance.

  Case Type Year Reported Effects Financial Cost Duration (days)
Pre-2020 samples WannaCry, half of Britain's NHSIncluding 16 major health centers[6,29]Ransomware2017200,000 PCs and 1200 equipment$125M14
Cancellation of 20,000 appointments
Boston Children's Hospital[3032]DDoS attack2014Websites, internal and external network$300,00014
Montpellier University hospital[30,33]Phishing2019649 -6000 Pc and equipmentNot reported,5–7
Hollywood Presbyterian Medical Center[26,34]Ransomware2016Full shutdown in PC, Email, Equipment, NetworksDemanded 9000 bitcoins10
2020 and later Champaign-Urbana Public Health District's[27,35]Ransomware2020Internal and external network accessNot reported<14
Vermont Hospital[36,37]Ransomware2020Hacking HER, delays in various departments$1.5 M per day<7
UVM Health cyberattack[27,38]Ransomware20205000 PC, network. Shutdown IT and Med Centers $63 M40
Postponed services during the incident
Maryland hospital 39 Ransomware2020Network shutdown, continue operationsNot reported2
 Postponed scheduled appointment
Six U.S. hospitals[27,40]Ransomware2020Networks. using Paper record2000 new PC7–14
demanded $1M
Diverted ambulances during the downtime
Postponed elective procedures and services.
Significant cyberattacks that affected hospital performance. Table 3 summarizes potential impacts of cyberattacks on hospital operations derived from reports in the literature and interviews with experts in hospital cybersecurity. The metrics include common performance measures in queueing networks. These measures allow hospital managers to quantify the impact of cyberattacks.
Table 3.

Goal and impact of a cyberattack and their measurement.

Impacts PerformanceEffectReasonMeasure
No Data breach 41 Malicious access to databasesPatient record
Business email compromise 42 Misusing information from hacked databasesDollars
Telehealth fraud 43 Hacking web/apps/databases, scamsNumber of cases
Yes Slowing down processes 44 Paper work, Int/Ext net hack, web/email/app access hackProcessing times
Increasing mortality 45 Changing critical equipment functionsMortality rate
Hospital/Unit lockdown and transfer out 46 Risk of poor treatment, equipment shutdownNumber of transfers out
Cancelling scheduled surgeries 47 Rescheduling after full recoveryNumber of cancelations
Increasing patients’ waiting times and queue lengthsProcesses time increaseWaiting time
Causing patients to leave without being seenWaiting time increaseAve queue length
Decreasing staff utilizationDecreasing number of patients due to cancellations/ closures/bottlenecks 48 Staff/ stuff utilization
Increasing staff/stuff utilizationhigher workload due toslower processes/paperwork etc.Unit performance (utilization)
Increasing recovery period after attackImproper backups, not using cloud based DBs, unsophisticated IT ExpertRecovery period
Decreasing daily treated patients in the hospital 49 Increasing processing times, hospital closurehospital daily treated patients
Table 4.

Critical and Non-critical units.

CriticalityMajor UnitSubunits
Critical UnitsEmergency EntryTriage, Fast-track, Trauma, ED & ED services
ICUICU
Labs & EquipmentLabs, Radiology, MRI, CT scan
Non-Critical UnitsOperating Theaters, Pre-op, Post-opPre-op, OR, SICU, PACU
Admitted & DischargedStepdown, IGW
Goal and impact of a cyberattack and their measurement. Critical and Non-critical units. Like in other industries, companies often find that paying the ransom could be less impactful on operations and profit margins than attempting a recovery of the compromised IT systems without the decryption key needed to remove the malware. The Vermont Hospital estimates that the cost due to delays in hospital operations from an attack in 2020 was on the order of $1.5 million per day. If the difficult choice is made to pay the ransom, there is no guarantee that the attackers will hold up their end of the deal. In fact, approximately 80% of small to medium size companies globally that have chosen to pay the ransom do not receive the promised decryption key after payment and sometimes a second ransom is demanded even if a first is paid. Moreover, even if the decryption key is quickly provided and all data is recovered, the system remains compromised and untrustworthy. A full recovery of the system remains necessary. While there is a solid understanding of how an attack can impact various aspects of hospital service provision, there is less understanding of how these impacts affect hospital capacity to serve patients. The most closely related works are primarily qualitative, and quantitative works are generally focused on the vulnerability of specific equipment types. The authors were unable to find any comparable quantitative analyses in the archived literature that similarly seeks to quantify the impacts of a cyberattack on unit-level or whole-hospital performance. At a whole-hospital level, an alternative in the literature to the type of analysis described here is the tabletop exercise. The approach taken in this paper is to perform computational experiments using a computer simulation of the effects of a cyberattack on hospital performance. Advantages of this approach include the ability to perform multiple runs to obtain precise statistical estimates of key performance metrics, and the ability to design and conduct computational experiments to assess the effects of different response policies. This paper introduces resilience measures for assessing a hospital's ability to cope with and recover from a cyberattack accompanied by a demand for a ransom (a ransomware attack). Specifically, this paper studies the potential impacts of these attacks on the ability of a hospital to sustain patient care under a cyberattack that targets critical care, including processes within the emergency department (ED), including trauma, the intensive care unit (ICU), laboratories, and interventional radiology. The resilience of the hospital to an attack under two potential recovery actions is assessed. These actions include: (a) undertaking a full recovery using the hospital's onsite backup or recovery solution assuming it remains uncompromised and, thus, available and (b) paying the ransom and completing a full recovery once access is restored. Resilience is considered over a 16-day period covering the period from event inception through full recovery conclusion. Full recovery from a cyberattack typically requires extensive, system-by-system restoration, including software installation and recovery of data from backups, to ensure all remnants of malware have been removed and the systems are restored to pre-attack status. If the hospital has a strong cybersecurity preparedness framework that includes regular and real-time scans and backups, drills (including active disaster recovery drills that engage the disaster recovery sites) by the response team, and a highly skilled response team, then rapid in-house recovery may be feasible. If the cybersecurity preparedness plan is weak or nonexistent, then full recovery will necessitate bringing in outside experts, and is likely to be extremely costly both in time and money. A whole-hospital, patient-based, and resource-constrained discrete-event simulation (DES) model of a typical urban tertiary hospital was adapted to model a cyberattack, its impacts, and recovery strategies as described in the following section. The model replicates a typical 200-bed urban tertiary (trauma level I or II) hospital. The hospital model was created in prior work and extended for hazard events that affect demand, accessibility and/or functionality of the hospital. Shahverdi et al. modeled hazard events including flood, earthquake, large-scale mass casualty incident and a pandemic. In Shahverdi et al. the hospital model was expanded to incorporate COVID-19 patient care. While the impact of a wide variety of hazard event types on hospital capability and capacity were studied, cyberattack was not previously considered in these models. Modifications needed to model the effects of the cyberattack on hospital operations and the effectiveness of recovery efforts taken to mitigate its impacts are presented herein. Results of systematically designed numerical experiments using this expanded model were analyzed (Results Section). The results indicate that substantially more emergency patients can be served within the first week of the attack by paying the ransom (assuming the attacker provides the decryption key immediately upon payment) to reduce ED closure by one day. Moreover, hospital resilience, measured in terms of the total 7-day hospital throughput as a percentage of the expected total during ordinary conditions, increases 7 percentage points when it is presumed that the ransom will be immediately paid and the resulting ED closure will be shortened by one day. Generally, the benefits of a reduction in ED entrance closure by one day are significant and warrant consideration of other plans for subverting the attack, such as cloud-based backups with restoration guarantees. In the short term, it may appear that paying the ransom is an appropriate or necessary action. The experimental results show, however, that when looking further out, the benefits dissipate. By the end of 11 days from the attack, the benefits in terms of total patients treated of paying the ransom reduce to zero compared with using only internal resources to overcome the effects of the attack without paying the ransom. Beyond day 11, the benefits of using internal resources equal or outweigh that obtained from the approach that begins with paying the ransom. At the point when pre-attack service rates are restored under both responses (day 16), 45 additional patients will have been served by the response action that does not involve paying the ransom. Thus, while paying the ransom yields some short-term gains, if the perpetrators actually provide the decryption key as promised after payment, the results of this study suggest that in the longer term, paying the ransom does not pay off. That is, this finding suggests that paying the ransom, when considered over the full recovery period, precludes significantly more patients from receiving critically needed care. These results provide insights for hospital administrators that can aid in determining an effective and cost-efficient plan for coping with a cyberattack. Insights from this study and implications for policy are discussed further in Discussion Section.

Methods

Discrete-event hospital simulation model

Hospital Simulation. The hospital model includes 10 key units supporting patient care for those entering the hospital through the ED (including through trauma). These units include: the ED, including triage, intensive care unit (ICU), trauma, operating rooms (OR), pre-op and post-op units (surgical intensive care unit (SICU), post-anesthesia care unit (PACU), stepdown), laboratories, and the internal general ward (IGW). Patients flow through the units as a function of their care paths, which are determined by the illness or injury they incurred prior to arrival and level of severity indexed following the Emergency Severity Index (ESI) system. Care paths originate with entry to the hospital and end upon discharge. A schematic of the units that support the care paths is provided in Figure 1(a).
Figure 1.

(a) schema of the hospital; (b) schema of a unit with subprocesses; (c) simulation process.

(a) schema of the hospital; (b) schema of a unit with subprocesses; (c) simulation process. The hospital model captures key elements of the layout and processes through conceptualization in terms of staff (doctors, nurses and technicians), stuff (equipment, including magnetic resonance imaging (MRI) equipment, X-ray and ultrasound machines) and space (units and beds). Each unit has associated processes (e.g. visit by doctor, testing, and treatments). Mathematically, the hospital model can be viewed as a queueing network, where each unit is modeled as a queue that is served by one or more servers. Upon arrival, patients (customers) enter the queue and wait for service. After completing service, the patient moves to the next queue along her care path. Figure 1(b) is a high-level schematic of the flow of patients through a unit with its associated processes. Patients enter each unit either directly (e.g. through the ED entrance or a scheduled surgery) or from other units. Figure 1(c) illustrates how the simulation operates. The model is stochastic: patient arrivals and their processing follow characteristic probability distributions. Assumptions, parameters, and inputs for the base model (e.g. probability distributions with their parameters and available resources) are documented in the original reference. Assumptions and parameters developed for the original hospital model were developed from findings from the literature (e.g. national averages) and discussions with hospital managers within the Johns Hopkins Hospital System (JHHS), Suburban Hospital and Johns Hopkins Office of Critical Event Preparedness and Response (CEPAR). The model was verified with the help of expert collaboration and review. Additional details of the verification process are given by Tariverdi et al. As in the real world, the exact events (e.g. number of patients to arrive with their specific needs and need levels) and their timing occur differently from day to day. The stochastic DES replicates this random setting. To evaluate the performance of the hospital, thus, a measure, such as expectation, over the various ways random events can be realized must be used. To this end, the expected performance given in terms of various performance metrics (e.g. hospital or ED throughput) is approximated by computing the average metric value over multiple replications, each with a different realization of events and their timing. Each run of the simulation follows a set of patients as they arrive at the hospital, progress through treatment, and experience outcomes (e.g. discharge or leave without being seen). Modeling Cyberattack Events and Recovery Strategies within the Simulation. The hospital model was modified to incorporate the occurrence of a ransomware attack. A significant effect of a cyberattack on the provision of hospital services is the slowing down of processes that depend on information technology. This slowing of processes was represented in the simulation by adjusting the parameters of the probability distributions on the time each affected process takes. For purposes of this analysis and because it was assumed that the attack was directed against the most critical units (ED, ICU, and labs), the processing times for only these units are increased in replicating the cyberattack. The slowdown may be significant enough that the ED can no longer accept new patients, resuming services only after its IT systems can be repaired to an acceptable level of functionality. Within the simulation model, this was achieved by adding a queue with zero processing time just prior to the ED entrance. Scheduled surgical patients enter through a separate entry point and, aside from delays in the labs, were unimpacted by the cyberattack. Like other queues, the ED pre-entry queue requires a server to process patients. To prevent patient entry, no personnel resources are assigned to this entry queue during the ED entry closure. This results in all patients who seek services through the ED to depart without entering during its closure. Once the ED entry is reopened, resources for processing patients at this queue are set to infinity. Two response plans to the cyberattack were considered: (a) paying the ransom ( .) and then completing a full recovery and (b) undertaking a full recovery using the hospital's onsite backup or recovery solution ( ). Two additional cases were also run for comparison: a base case in which no attack occurs ( ) and a worst-case response plan in which the hospital does nothing to recover from the attack ( ). The latter is unrealistic, but serves as a point of comparison. The ED entry is presumed to remain open under the case. Understanding how the hospital fares when taking no response action provides insights into the hospital's inherent capacity to cope with the cyberattack. The slowdown due to the cyberattack was represented in the simulation through the application of multipliers on pertinent model parameters. The multipliers reflect how much longer the affected processes take due to the impacts of the cyberattack and the effectiveness of response actions. Additionally, the multipliers are time-dependent. Changes in the multipliers replicate achievements from the recovery actions as they are gained over time. Additionally, the duration of the ED entry closure was set in each tested scenario according to whether the ransom is paid.

Numerical experimental design of scenarios

The simulation was implemented in the Extendsim™ discrete event simulation software. U.S. urban hospitals often operate near capacity. Consistent with this, the emergency patient arrival rate in the model was set to 200 patients/day. Each run of the simulation begins with a 40-day “warmup” period followed by a 20-day period scenario during which various performance metrics were collected. The model was run 250 times for each of the four cases ( ). 250 was chosen based on systematically designed experiments of between 10 and 5000 runs. This number provided a sufficient sample size for accurate estimates of performance metrics given the needed run times for completing the batch runs. A batch run of 5000 runs requires more than a day to complete. The result of making 250 runs is, thus, a statistical sample of each performance measure across the set of runs for each response plan. The expected time taken by process i on day t for response plan k is calculated as in equation (1): Here, the multiplier represents the slowdown over the base case due to the cyberattack. Processing times spike to their highest values on the first day of the attack: . If no action is taken to respond to the cyberattack, the longer processing times continue for the duration of the simulation: for . Values for the multipliers are shown in Figure 2. Figure 2 also shows the period, for each scenario, during which the hospital stops accepting new patients into the ED, diverting emergency cases to other hospitals. The multiplier values and closure periods are based on judgments of one of the co-authors who is an expert in hospital information technology and cybersecurity. The original parameters for the no-attack base case were taken from Tariverdi et al.
Figure 2.

Day-dependent service time multipliers and closure periods by recovery plan.

Day-dependent service time multipliers and closure periods by recovery plan. As shown in Figure 2, paying the ransom (the strategy) is presumed to incur a shorter closure period (2 days), allowing a faster start to recovery. In contrast, the no-payment ( ) strategy is expected to incur a longer closure period (3 days) and a slower start to recovery, but a faster time to complete rovery. The slower time to full recovery for the payment strategy is due to the additional effort required to remove intrusion software as is needed to ensure future security from attack after full access has been restored.

Performance measures

Performance measures were computed, exported from the simulation, and averaged over the 250 runs for the base case and each of the response plans. The metrics fall into four broad categories: (a) patients served, reported as hospital and ED throughput given in terms of total 7-day throughput and daily throughput over the event impact duration; (b) daily ED and ICU bed utilization rates, computed as the portion of total beds within the unit in use on a given day on average; (c) unmet demand (sum of patients who are turned away before triage due to ED closure or capacity limitations at triage and patients who pass through the ED triage but do not receive treatment due to prolonged waiting time); and (d) resilience. Resilience is measured from two perspectives. First, it is taken as a ratio of experienced performance to performance under pre-attack conditions (using the base case of no attack). Here, the ratio is computed over hospital throughput by day 7, one week from the inception of the attack and day 14, two weeks after inception of the attack. This approach ensures a resilience value that is between 0 and 1. Values closer to 1 indicate less impact of the attack on overall performance. Lower impact occurs if the system is able to cope with the event via excess capacity or redundancy and/or very quick response action. This approach to resilience measurement was proposed by Chen and Miller-Hooks for intermodal freight transport applications and is termed period resilience in the context of general infrastructure systems by Faturechi and Miller-Hooks. These concepts were adapted here for the context of a single hospital. Second, resilience is measured in terms of the time it takes for the system to reach a target level of functionality. This approach was recommended in the San Francisco Planning and Urban Research Association resilience standards in relation to seismic mitigation planning for San Francisco. This work, they consider the time to resume services supported by utilities, transportation and buildings. Here, functionality is considered in terms of hospital throughput.

Results

Hospital discharge and ED throughput performance

Results for hospital and ED throughput are presented graphically in Figure 3. Each line shows daily performance for one of the strategies averaged over the 250 simulation runs. Error bars indicate uncertainty in the estimate due to the stochastic nature of the simulation. Additional runs beyond 250 could reduce the size of the confidence interval around each estimate.
Figure 3.

(a)total daily hospital discharge for base case and response plans (b)ED throughput.

(a)total daily hospital discharge for base case and response plans (b)ED throughput. Figure 3(a) shows the hospital profile of performance for treated patient discharge. In the case, an average of 191 treated patients are discharged each day. For both the and the strategies, the number of discharged patients drops rapidly to 25 patients the day after ED closure, and begins to pick up after the ED reopens to 117 patients per day, or about 60% of normal capacity, by the 5th day after the attack. Over the following week, performance recovers more slowly under the strategy than under the strategy, reflecting the longer recovery time, to ensure that no remnants of the attack remain. A similar pattern is seen in Figure 3(b), which shows a drop to zero in ED throughput the day after the ED entry closes, followed by a recovery after reopening that is initially faster under the than the strategy, but is ultimately beaten by the strategy. The graphs of Figure 3, thus, show a short-term gain from paying the ransom in that the ED is able to reopen sooner; however, this is balanced by a longer recovery to full capacity. The inherent coping capacity of the hospital can also be seen by examining performance under the response. If no action is taken to respond to the attack, hospital throughput drops and converges by day 3 to an average value of 60 patients/day, less than a third of the 191 patients treated under the case of no attack. For ED throughput, the throughput is less than ¼ of the normal base case, showing a diminished coping capacity to an attack of this magnitude and the necessity for developing a recovery strategy in advance. Another view on hospital resilience is given in Table 5, which shows the day at which a given target performance level is reached. For total discharged patients, the strategy reaches a 50% target performance level one day faster than the strategy, reflecting the one day shorter ED entry closure. Average discharge under both strategies reaches 80% on day 11. The strategy rebounds to 90% of the target levels three days faster than the strategy.
Table 5.

First day after attack on which performance reaches various levels.

 ≥ 50%≥ 80%≥ 90%
Performance MeasureBase caseResponsePatientsDayPatientsDayPatientsDay
Total discharged  patients 191 (patient/day)
Pay 11231541117815
NoPay 10841541118012
ED throughput 175 (patient/day)
Pay 11031401116815
NoPay 10741391117012
First day after attack on which performance reaches various levels. To evaluate the resilience of the hospital under the versus the strategy, Table 6 shows, for each strategy, treated patient discharge over a one-week and a two-week period, shown as a percentage of the base case and as a total number of patients. The attack has a major impact: over two weeks, both ED throughput and total patient throughput are roughly 1000 patients fewer than under the base case. The importance of mounting an effective response is seen by comparing these values with the strategy, not shown in the table. For , the loss is even greater, at over 2000 patients.
Table 6.

Resilience values.

 Week 1Week 2
Performance MeasureResponsePatientspercentPatientspercent
Total discharged  patients Base 13411002677100
Pay 67550166762
NoPay 57343169563
ED throughput Base 12241002449100
Pay 53243141458
NoPay 42735144959
Resilience values. At day 7, the strategy performs 7 percentage points higher than the strategy (50% vs. 43% of the pre-attack throughput, or 102 total patients). That is, paying the ransom and reopening the ED entry a day sooner allows a total of 102 more patients to be treated and discharged over the first week. However, by day 14, the strategy passes the strategy (63% vs. 62% of the average pre-attack throughput, or 28 total patients). A similar pattern occurs for ED throughput. The resilience measure at day 7 is higher for the than for the strategy (43% vs. 35% of the pre-attack throughput, or 105 total patients); at day 14, pulls ahead by one percentage point (59% vs. 58% of the average pre-attack throughput, or 35 more patients treated under ). That is, although the strategy requires a shorter period of ED closure, thus allowing more patients to be treated over the first week post-attack, the faster recovery to full performance under the strategy means that this short-term gain is surpassed over the next week. By two weeks after the attack, the strategy is slightly better than the strategy both in terms of the total number of patients treated in the ED and the total number of patients discharged from the hospital since inception of the attack. By the time the hospital reaches full recovery under both strategies, after day 16, on average 42 more patients are discharged from the hospital and 41 more patients treated in the ED in total under the strategy than under the strategy.

Unit utilizations

Figure 4(a) and (b) show utilization for the ICU and ED, respectively. Comparing these two graphs, the ICU shows a longer lag in returning to routine levels than the ED. This is in part due to the slowdown and in part to demand. That is, there is a lag in patients reaching the ICU from other units. In the base case, the ICU and ED operate with average utilization of about 70% and 40%, respectively. The extra capacity can be used to compensate for surge demand and output slowdown. Note that utilization can exceed that of the case when the processing time is higher because of the cyberattack, leading to patients remaining longer in the unit. These considerations should be recognized when planning for the capacity needed to achieve resilience to cyberattacks and other disruptions.
Figure 4.

Unit utilization rates in: (a) ICU and (b) ED.

Unit utilization rates in: (a) ICU and (b) ED.

Unmet demand

Figure 5(a) shows unmet demand. In the worst case of the strategy, unmet demand averages 160 patients/day. This is over six times the base case, wherein an average of 26 patients/day are unserved. The strategy shows a longer period of elevated unmet demand than the strategy due to the longer period of elevated multipliers (see Figure 2) consistent with the extended duration needed to complete the system recovery.
Figure 5.

Unmet demand, including those patients who are turned away before triage and patients who cannot receive treatment in reasonable time due to prolonged waits.

Unmet demand, including those patients who are turned away before triage and patients who cannot receive treatment in reasonable time due to prolonged waits. The total unmet demand from day 3 (ED reopening for the strategy) through day 5 (day after reopening for the strategy) is 102 patients fewer for the strategy than for the strategy. This is the cost in unmet demand for the additional day of ED closure. The total unmet demand from day 6 through day 16 (when the hospital is fully recovered under both and strategies) is 147 patients more under the strategy than for the strategy. This is the cost in unmet demand for the longer recovery time of the strategy. Thus, after full recovery, on average, 45 fewer patients (or between 30 and 60 with 95% confidence) were served in runs when the ransom was paid than in runs when onsite recovery was undertaken.

Discussion

As concerns grow about cyberattacks against hospitals, this paper provides a methodology for quantitatively assessing the effect of cyberattacks on hospital performance metrics, outputs, and different response scenarios. A discrete event simulation model of a trauma III hospital was adapted to model a cyberattack involving ransom and to analyze the effects of different response strategies. Results of the model runs showed that the envisioned cyberattack scenario had a major impact on the performance of the test hospital. Under recovery strategies that do and do not pay a ransom, total patient throughput drops by approximately 1000 patients out of about 2700 total patients over a two-week period. In both cases, the ICU showed a longer lag in returning to routine capacity than the ED. This is due both to the slowdown from the attack and the lag in patients reaching the ICU from other units once they are admitted again through the ED. ICU utilization sometimes exceeded routine levels after the attack, indicating that excess capacity may contribute to the hospital's resilience. There was a short-term gain from paying the ransom in that roughly 100 more total patients were served in the first week post-attack due to a shorter ED closure when the ransom was paid. However, paying the ransom resulted in a slower time to full recovery due to the additional effort needed to ensure all remnants of the attack were removed. Over the approximately two weeks until the hospital returned to normal functionality, the short-term gain from paying the ransom was more than offset by the faster return to normal functioning under the nonpayment option. By the time full recovery was achieved, approximately 45 fewer patients were served when the ransom was paid than when onsite recovery was undertaken. Analysis conducted here uses hospital-wide and unit-based patient throughputs, unmet demand, and unit-based utilization as key performance indicators. These metrics are important determinants of the hospital's ability to provide emergency care to patients, but are not the only factors that should be considered in determining a best strategy for coping with a ransomware attack. Other effects of the attack, such as delays in diagnosis, impact on quality of care, and adverse patient outcomes due to delays should also be carefully weighed. Additional effects of a cyberattack include disruption of non-emergency services, such as scheduling and conducting elective surgeries. The attack may also impact patient length of stay in affected hospital units. Longer service times could impede the recovery, as patients who enter may need to stay longer. With data on these impacts, this study can be extended to quantify the outcomes from these factors. Moreover, further investigation of other cyberattack scenarios could provide additional insights. Paying the ransom can have other negative consequences as well. There is no guarantee that the attackers will provide the decryption key even if the ransom is paid; there is no guarantee of full recovery; attackers may even demand a second ransom; and payment encourages future attacks. Although victims of a ransomware attack often pay the ransom, these considerations, along with the results of the model and the recommendations of the FBI, suggest that the short-term gains from paying the ransom may not prove to be worthwhile in the longer term. Further study is required to more fully understand the ramifications for the patients across hospital units of a No Pay strategy and their magnitude as a function of the hospital's in-place recovery capabilities and capacity. This paper focuses specifically on a ransomware attack where the main attack mode is through penetration of one or more systems and encryption of critical data, including, for example, the electronic medical records. There are numerous other forms of attack of equal concern, e.g. a DDoS or phishing attack with incursion that overcomes security barriers. The methods applied in this work may also be used to study a hospital's resilience to such attacks as they often involve similar methods of recovery with comparable delays in enabling full services. Offsite disaster recovery solutions, such as duplicative data centers, may allow for real- or near real-time recovery, obviating the need to pay a ransom to attackers. Hospitals also have the option to purchase cloud-based recovery solutions, the cost of which depends on the contracted time-guarantee on restoration. The specific value of such cloud-based alternatives to a hospital in terms of patients served and greater hospital resilience could be considered in future simulation studies.
  4 in total

1.  Cybersecurity Challenges and the Academic Health Center: An Interactive Tabletop Simulation for Executives.

Authors:  Lauren A Maggio; Christian Dameff; Steven L Kanter; Beau Woods; Jeffrey Tully
Journal:  Acad Med       Date:  2021-06-01       Impact factor: 6.893

2.  Strategies for Improved Hospital Response to Mass Casualty Incidents.

Authors:  Mersedeh TariVerdi; Elise Miller-Hooks; Thomas Kirsch
Journal:  Disaster Med Public Health Prep       Date:  2018-03-19       Impact factor: 1.385

Review 3.  Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks.

Authors:  Salem T Argaw; Juan R Troncoso-Pastoriza; Darren Lacey; Marie-Valentine Florin; Franck Calcavecchia; Denise Anderson; Wayne Burleson; Jan-Michael Vogel; Chana O'Leary; Bruce Eshaya-Chauvin; Antoine Flahault
Journal:  BMC Med Inform Decis Mak       Date:  2020-07-03       Impact factor: 2.796

4.  A retrospective impact analysis of the WannaCry cyberattack on the NHS.

Authors:  S Ghafur; S Kristensen; K Honeyford; G Martin; A Darzi; P Aylin
Journal:  NPJ Digit Med       Date:  2019-10-02
  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.