| Literature DB >> 36148382 |
Aileen Flavin1, Eve O'Toole2, Louise Murphy2, Ruth Ryan2, Brendan McClean3, Clare Faul3, Carol McGibney1, Stephen Coyne4, Geraldine O'Boyle4, Cormac Small4, Caroline Sims1, Maeve Kearney5,6, Mary Coffey5,6, Anita O'Donovan5,6.
Abstract
On Friday, May 14, 2021, the Health Service Executive, the organization providing public health services in the Republic of Ireland, was the victim of a significant cyberattack on its information technology systems. All systems were subsequently shut down to prevent further damage and to allow cybersecurity experts to investigate the attack. As a result, oncology services were severely disrupted, with the cessation of radiation therapy treatments in all public radiation therapy departments. Ireland has 5 large public and 6 smaller private radiation therapy centers in total. Because of the widespread adoption of electronic medical records in radiation therapy departments, it wasn't possible to retrieve patient details of those who were undergoing radiation therapy at the time of the cyberattack. In total, 513 patients nationally had their radiation therapy interrupted. A national radiation therapy cyberattack response team was formed immediately to oversee the response to the attack. The immediate concerns were radiation therapy emergencies and category 1 patients where gaps in treatment would have an adverse effect on outcome. Communication with patients and the public was also established as a priority and agreements were reached with the private sector for the treatment of patients affected by the cyberattack. The national media was used to alert patients of the need to communicate with their radiation therapy department. Dedicated phone lines were established. Locally, radiation therapy departments held daily crisis meetings with key staff members, including information technology personnel. Individual centers employed different technologies for treatment planning and data storage, so local solutions to the cyberattack to reestablish radiation therapy for patients were developed. In addition, national documentation on prioritization of patients to resume treatment was produced and a national approach was made to compensate for gaps in treatment caused by the attack. All 5 centers had reestablished radiation therapy by May 30, although there has been a long aftermath to the cyberattack. In this article, we provide an overview of the effects of the cyberattack on our national radiation therapy service and our strategy to resume patient treatment in a timely fashion.Entities:
Year: 2022 PMID: 36148382 PMCID: PMC9486432 DOI: 10.1016/j.adro.2022.100914
Source DB: PubMed Journal: Adv Radiat Oncol ISSN: 2452-1094
Fig. 1Systems that were shut down due to the cyberattack. Abbreviations: EMRs = electronic medical records; OIS = oncology information system; PACS = picture archiving and communications systems; TPS = treatment planning system.
Fig. 2Implications of lost services.
Fig. 3Local management strategies to mitigate against the adverse effects of the cyberattack.
Fig. 4Timeline of events during the national cyberattack.
Fig. 5The National Cancer Control Programme's capacity escalation plan as its radiation oncology response to the cyberattack. Abbreviations: BCC = basal cell carcinoma; RAI = radioactive iodine.
Fig. 6National Cancer Control Programme (NCCP) risk assessment tool for radiation oncology during the Health Service Executive (HSE) information technology (IT) cyberattack.
Fig. 7National Cancer Control Programme–identified risks during radiation therapy cyberattack.
Summary of lessons to be learned for radiation therapy
| Theme | Lessons to be learned |
|---|---|
| Prepare | Governance for cybersecurity must be established to ensure the risks associated with radiation therapy are actively managed, including the resilience of the department to a potential cyberattack. |
| Departments should put in place a cyber security strategy, identifying the potential risks and how they may be mitigated. | |
| Individual departments should regularly risk assess their respective areas in line with an effective cyber security strategy, under the guidance of a suitably appointed expert in the field. | |
| Radiobiological guidelines and formulae are needed for such unexpected and prolonged gaps in radiation therapy treatment and how they may be adequately compensated for in each cancer site. Expert groups should be set up to address this in the event of future cyberattacks or other unforeseen interruptions in radiation therapy delivery. | |
| Contingency planning should be in place by having some back-up information on a separate computer, so that details of patients currently on treatment, protocols, policies, procedures, etc, can be accessed. | |
| Being able to store one's own radiation therapy data, rather than relying on hospital servers, as well as having an in-house team with knowledge and understanding of IT related to radiation therapy, is a necessity in radiation therapy departments. | |
| Build relationships with other radiation therapy providers (nationally, locally, and in the private sector). Develop contingency plans between departments. Such relationships are vital in the event of a cyberattack or other disruptions to service, to facilitate resumption of patient treatments and to deal with aftermath when capacity is still low. | |
| Radiation therapy departments should develop cybersecurity-specific crisis management plans detailing the actions required in the event of such an attack. | |
| Regular staff education programs should be conducted on key methods to protect against cyberattacks, for example, from phishing, as was the case for the HSE incident. | |
| Store a list of patients currently scheduled for treatment separate from departmental IT systems so that no time is lost in accessing basic patient information in the event of a cyberattack. | |
| Response | Set up local and national multidisciplinary teams, including cyber security personnel, to lead the management of the cyberattack. |
| Set up a dedicated incident room, involving the multidisciplinary team. | |
| Collaborate with national media to facilitate early and ongoing communication with patients. | |
| Collaborate with vendors regarding possible solutions, for example, remote planning assistance. | |
| Set up a helpline or other communication channel for patients to communicate with the radiation therapy department. | |
| Use existing patient prioritization frameworks to select patients who urgently require re-establishment of treatment as soon as possible. | |
| Incorporate simpler planning methods, where appropriate, to expedite the process of resumption of treatment. | |
| Recovery | Assess IT security on an ongoing basis to remain up to date with current protective measures. |
| Invest in a cyber security team and resources for radiation therapy. | |
| Ensure patients are empowered to hold data in relation to their radiation therapy treatment progress, for example, number of overall treatments planned and number delivered to date. | |
| Communicate with patients who have been affected to ensure they know that measures are being put in place to prevent such an attack in the future. |
Abbreviations: HSE = Health Service Executive; IT = information technology.