Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Hospitals. Show all posts

Cyberattack Impacts Georgia Hospital, Colorado Pathology Services

 


The number of hospitals that have been affected by ransomware, business email compromise, and other cyber threats is increasing across all sectors, from small community hospitals such as Memorial Hospital and Manor in Bainbridge, Georgia, to those with a large number of beds.  In his opening keynote address at the HIMSS Healthcare Cybersecurity Forum last week in Washington, D.C., Greg Garcia, executive director of the Health Sector Coordinating Council Cybersecurity Working Group, indicated that there is now an average of two data breaches conducted every day within the American health care system. 

People who work in hospitals and health systems are often targeted by cyber threat actors exploiting the basic vulnerabilities of their systems and taking advantage of the vulnerabilities. To illustrate these types of breaches, Kaiser Permanente, one of the country's largest health systems, said it had sent a notice Sunday to those in Southern California whose personal health data had been compromised as a result of unauthorized access to two email accounts of employees. 

The bad guys can also be skilled at exploiting their victim's vulnerability, with sophisticated social engineering techniques coupled with phishing attacks that focus on bots. As part of a cyber exploit, originally discovered earlier this month, Summit Pathology, an independent pathology service provider based in Colorado, had patient data associated with more than 1.8 million people exfiltrated from its system. 

In a report issued by Kaiser Permanente, it was reported that an unauthorised third party gained access to the email accounts of two employees and was able to view the health information of patients. As the U.S. grows and grows, ransomware, business email compromise, and other cyber threats are causing disruptions to care for millions of people across the nation, including small community hospitals such as Memorial Hospital and Manor in Bainbridge, Georgia, as well as the largest providers. 

A recent study conducted by the Health Sector Coordinating Council Cybersecurity Working Group found that the United States amounted to two data breaches per day on average, Greg Garcia, executive director of the ASHC Cybersecurity Working Group, said in his opening address at the HIMSS Healthcare Cybersecurity Forum, held in Washington, DC, last week. In many cases, cybercriminals target people who work in hospitals and health systems to exploit weaknesses in the system. A health system in Southern California posted a notice informing its members on Friday there was an issue about the security of health information that was discovered on September 3. 

A notice on the company's website advised that two of its employees' email accounts had been accessed by an unauthorized party, according to the notice. "Immediately following the discovery of this incident, Kaiser Permanente terminated the unauthorized access and immediately began investigating to determine the scope of the access." this statement was made by Kaiser Permanente. It was found that some protected health information about some patients were included in the email's contents after we validated them." 

According to the health system, although Social Security numbers and financial information were not involved, protected health information, such as first and last names, dates of birth, medical records numbers, and medical information, had the potential to be accessed and/or viewed by third parties. As part of Kaiser Permanente's maintenance of health system operations, affected individuals were contacted directly by the company, Kaiser Permanente said. There is evidence out there that on October 18, Summit Pathology of Loveland, Colorado, reported to the Department of HHS that there are 1,813,538, whose data had been breached in a hacking incident, in which their data has been compromised. 

 As outlined in the pathology services company's notice on its website, the impacted systems contained data such as names, addresses, medical billing and insurance information, certain medical information such as diagnosis, demographic information such as dates of birth, social security numbers, and financial information. There was an incident that occurred on or around April 18 when Summit announced it had noticed suspicious activity on its computer network and that it had taken the necessary steps to secure it, including contacting third parties to assist in the investigation. 

The affected healthcare entities have reported that they successfully identified files that unauthorized individuals may have accessed or acquired during the ransomware attack. In response to the incident, Summit conducted a thorough review of its internal policies and procedures. Following this review, they implemented additional administrative and technical safeguards to strengthen security and mitigate the risk of future attacks. 

On October 31, the Murphy Law Firm, based in Oklahoma City, stated its involvement in the case. The firm announced that it is pursuing a class action lawsuit and actively investigating claims related to the breach. According to Murphy Law Firm, Summit’s forensic investigation revealed that cybercriminals were able to infiltrate the organization's inadequately secured network, leading to unauthorized access to sensitive data files. The law firm is now seeking to hold Summit accountable for the potential data security lapses that may have enabled the breach.

Complexity: Research Offers Solution for Healthcare Security Amid Rising Cyberattacks

Complexity: Research Offers Solution for Healthcare Security Amid Rising Cyberattacks

In May, Ascension, a healthcare provider with a network of 140 hospitals across the U.S., suffered a major cyber-attack that disrupted its clinical operations for almost a month. Experts traced the problem to a malicious ransomware that had exploited an employee's computer. 

Healthcare: Juicy Target for Criminals

Threat actors see healthcare systems as lucrative targets for cybercrime because they hold crucial financial, health, and personal data. A 2023 survey research in health and IT professionals revealed that 88% of organizations had suffered around 40% of attacks in the past year. 

Complexity: Flaw in IT System

One major flaw is the rise of complexity in IT systems, says Hüseyin Tanriverdi, associate professor of information, risk, and operations management at Texas McCombs. He believes it's due to years of mergers and acquisitions that have made large-scale multi-hospital systems. 

After mergers, healthcare providers don’t standardize their tech and security operations, which results in causing major complexity in the health systems- different IT systems, different care processes, and different command structures. 

But his new research shows complexity can also offer solutions to these issues. “A good kind of complexity,” Tanriverdi believes can support communication across different systems, governance structures, and care processes, and combat against cyber incidents.

Understanding the Complex vs. Complicated

The research team found two similar-sounding IT terms that link to the problem. In “complicatedness,” an abundance of elements interconnect in a system for sharing info in structured ways. Whereas “complexity” happens when many elements interconnect to share information in unstructured ways- integrating systems following a merger and acquisition. 

Tanrivedi believes complicated structures are better because they are structured, despite being difficult, one can control them. Such is not the case with complex systems as they are unstructured networks. He believes healthcare systems got more vulnerable as they got more complex, 29% were more likely to get hit than average. 

Solution for Better Healthcare Security

Complex systems offer hackers more data transfer points to attack, and a higher risk for human errors, making it a bigger problem.

The solution lies in following a centralized approach for handling the data. “With fewer access points and simplified and hardened cybersecurity controls, unauthorized parties are less likely to gain unauthorized access to patient data,” says Tanrivedi. “Technology reduces cybersecurity risks if it is organized and governed well.”

European Telecom Industry at the Forefront of Quantum Technology Adoption

 


Even though quantum technologies may sound like something that is decades into the future, a new report released today shows that quantum technology has already come into being - especially in the telecommunications industry - even though most people still imagine something that is decades in the future. While the quantum technology sector has been stagnating for years in research institutions, commercial momentum has begun to gather in recent years. Many other applications for quantum tech are applicable today — as well as those that have been developed for quantum computing and its future promises. The quantum computing domain has been the focus of most of the developments, but there are many other uses for quantum technologies as well. 

There is a growing number of companies and startups across the globe that are commercializing quantum communications, including networks and forms of encryption. Europe also plays an important role in the development of this technology. Currently, 32% of the 100 quantum startups, scale-ups, and small and medium enterprises providing services to the telecom and telecom infrastructure sectors in the country are based in continental Europe. 

This is according to a report released today by Infinity, a branch of Quantum Delta NL that specializes in startup and ecosystem support. In addition to Germany, the Netherlands, France, Switzerland, and Spain, the UK and Ireland also have strong ecosystems with 14% each. There are also Approximately 50% of companies that serve as consumers of quantum technology located in continental Europe and 11 percent in the United Kingdom and Ireland. 

There are already more than 25 quantum networks in Europe today as of today. There are two quantum communications networks in the EU, which are being developed by Deutsche Telekom and two consortia named Petrus and Nostradamus. In London, BT and Toshiba Europe have launched a commercial quantum network, and in France, there is a commercial quantum network being built by BT and Toshiba Europe. In the Netherlands Organization for Applied Scientific Research (TNO), Quantum Lead Teun van der Veen says that telecom companies are becoming an important force in the adoption of quantum technology in real-world applications. 

 For them, integrating quantum into existing infrastructures is all about addressing the needs of the end users, so they are at the forefront of integrating quantum into existing infrastructures. To connect systems and transmit data securely, quantum networks take advantage of unique properties of quantum mechanics, such as superposition and entanglement, as a means of connecting systems and transacting data. Quantum channels can be used to transmit information, but they can also be used to be implemented over optical fibres, free-space optics, or satellite links for this to happen. Many scientists believe quantum networks and quantum encryption are virtually impossible to hack, and thus they will be one of the most secure forms of communication available now. 

Infinity's report states that such quantum-secure links can be used by data centres, satellites and rockets, military and government agencies, railroads, control centres, healthcare centres, hospitals, and many other sites, such as data centres, hospitals, health care centres as well as military and government entities.  Furthermore, quantum networks can also act as the basis for the creation of a global quantum internet, allowing quantum computers to be connected from different locations around the world. The cloud can also offer the possibility of "blind" quantum computing, which can maintain quantum operations' secrecy to those other than the user, allowing them to be used with ease.  

There is an increasing number of companies and governments exploring ways to secure their IT infrastructure and data in the age of global geopolitical tensions and looming cybersecurity threats. It is perhaps unsurprising then that Infinity's report concludes that Quantum Key Distribution (QKD) is the most widely used quantum technology in the telecommunications industry as a result of its popularity. By utilizing quantum mechanics, quantum key distribution (QKD) is an encryption and decryption method which is used by parties to generate a private key which can be used only by them. 

A recent report highlights the advances of European telecom companies in adopting quantum technology, with one notable example being the Delft-based communications security startup, Q*Bird. The company recently secured €2.5 million to advance the development of its Quantum Key Distribution (QKD) product, Falqon, which is currently being trialled at the Port of Rotterdam, the largest port in Europe. Ingrid Romijn, co-founder and CEO of Q*Bird, emphasized the growing interest in quantum communications solutions within the European Union's digital infrastructure. "Together with partners like Cisco, Eurofiber, Intermax, Single Quantum, Portbase, and InnovationQuarter, Q*Bird is already testing quantum-secure communications in the Port of Rotterdam using our novel quantum cryptography (QKD) technology," Romijn stated.

She further remarked that moving forward, more industries and companies could implement scalable solutions to protect data communications by leveraging next-generation QKD technology. Another technology drawing attention is post-quantum cryptography (PQC). While the anticipated "Q-day" – the day when a quantum computer potentially compromises current internet security – is still some time away, many classical cryptography methods will soon be vulnerable to hacking by sufficiently powerful quantum computers. 

PQC algorithms are designed to withstand both classical and quantum attacks. Other quantum technologies with potential applications in the telecom industry include quantum sensors, clocks, simulations, random number generation, and quantum computing. Despite increasing market interest, the report identifies that Europe's quantum technology startups require more support and investment to achieve significant technical and market breakthroughs. Presently, only 42% of quantum tech startups for telecom worldwide have external funding, collectively raising a total of €1.9 billion. Although the European Union has demonstrated a forward-thinking approach, exemplified by the Deutsche Telekom network project, the United States remains ahead in private sector activity and investment. Challenges include raising awareness among business leaders, expanding the skilled workforce, overcoming technical limitations, and building a stronger business narrative. 

These obstacles can be partially addressed through regulatory standardization, increased industry collaboration, and more early-stage support and investment for startups. Key market opportunities for the quantum communications sector lie in government bodies, including military and security services, financial institutions, critical infrastructure departments, and companies in the energy, defence, space, and technology sectors. Pavel Kalinin, Operations and Platforms Lead at Infinity, commented on the growing collaboration between enterprises and startups in telecom. "This signals the industry’s commitment to integrating quantum solutions into commercial applications. Successful implementation of such technologies will depend on coordinated efforts to prepare the workforce, facilitate collaborations, and set industry benchmarks and standards," Kalinin stated.

UnitedHealth Group Cyberattack Fallout: Government Intervention and Industry Critique

 

In a recent cybersecurity incident, UnitedHealth Group revealed that its tech unit, Change Healthcare, fell victim to a cyberattack orchestrated by the infamous ransomware gang, Blackcat. The attack, which disrupted healthcare organizations nationwide, targeted electronic pharmacy refills and insurance transactions, prompting urgent responses from both the affected healthcare provider and the U.S. government. 

The attack prompted the U.S. government to announce accelerated Medicaid and Medicare payments to healthcare units impacted by the cyberattack against Change Healthcare. However, this response drew criticism from industry associations such as the American Hospital Association and the American Medical Association. 

The latter expressed concerns that the measures did not adequately protect individual practices and called for more comprehensive financial assistance, including advanced payments for physicians. Facing cash flow concerns resulting from the inability to receive payments for insurance claims, the American Medical Association urged the Department of Health and Human Services to reintroduce widespread accelerated payments, a practice prevalent during the Covid years. 

Hospitals were encouraged to submit payment requests to their healthcare contractors, seeking relief from the financial strain caused by the cyberattack fallout. Change Healthcare responded to the crisis by introducing a new service to help healthcare providers navigate the outage. This online prescription service aims to provide temporary assistance while the company works to restore its pharmacy network, a process expected to take weeks. 

Despite these efforts, the American Hospital Association criticized Change Healthcare's response, with its president and chief executive describing the temporary assistance program as "not even a band-aid" for the problems caused by the cyberattack. The incident highlights the increasing cybersecurity threats faced by the healthcare industry and the ripple effects of such attacks on critical services. 

As healthcare providers grapple with the immediate fallout, the collaboration between the government, industry stakeholders, and affected organizations becomes crucial in addressing both the short-term challenges and implementing long-term cybersecurity resilience measures. 

In conclusion, the UnitedHealth Group cyberattack serves as a stark reminder of the vulnerability of healthcare systems to malicious cyber activities. The ongoing efforts to mitigate the impact, coupled with the industry's critique of the government's response and Change Healthcare's actions, underscore the need for a unified and proactive approach to cybersecurity in the healthcare sector.

Notorious Hacker Group Strikes US Pharmacies

In December, international law enforcement targeted a gang, leading to the seizure of various websites and digital decryption keys, as reported by Reuters. In response to this crackdown, the Blackcat hackers threatened to extort critical infrastructure providers and hospitals.

A recent attack on Change Healthcare, resulting in its parent company UnitedHealth Group disconnecting its systems to prevent further impact, has caused disruptions in prescription insurance claims, according to the American Pharmacists Association. This outage, which has persisted through Tuesday, is attributed to a notorious hacker group, as per a new report.

The outage at Change Healthcare, which handles payment management for UnitedHealth Group, was caused by a ransomware attack by hackers associated with Blackcat, also known as ALPHV, according to Reuters, citing anonymous sources. Blackcat has been involved in several recent high-profile data breaches, including attacks on Reddit, Caesars Entertainment, and MGM Resorts.

As a result of the breach, pharmacies nationwide are facing significant delays in processing customer prescriptions. Change Healthcare stated they are actively working to restore the affected environment and ensure system security.

UnitedHealth Group mentioned that most pharmacies have implemented workarounds to mitigate the impact of the outage on claim processing. The company expressed confidence that other data systems in its healthcare portfolio were unaffected by the breach.

While last week's breach was suspected to be "nation-state-associated," according to an SEC filing by UnitedHealth, it's uncertain if the group responsible was sponsored by foreign actors. Cybersecurity firms Mandiant and Palo Alto Networks, appointed by UnitedHealth, will lead the investigation into the breach.

Cancer Hospital Suffers Ransomware Attack, Hackers Threaten to Swat Patients

Harm patients if the medical facilities don't pay

Extortionists are now threatening to harm hospital patients if the medical facilities don't pay the thieves' ransom demands. They do this by reporting bomb threats or other fictitious reports to the police, causing heavily armed police to come up at victims' houses.

Criminals vowed to turn on the patients directly after breaking into the IT system of Seattle's Fred Hutchinson Cancer Center in November and taking medical documents, including Social Security numbers, diagnoses, and lab results.


Understanding the reasons

The idea seems to be that the US hospital will be under pressure to pay up and stop the extortion because of those patients and the media coverage of any swatting. Similar tactics are used by other groups targeting IT service providers: in addition to extorting the suppliers, they often threaten or harass the customers of those companies.

"Fred Hutchinson Cancer Center was aware of cyber criminals issuing swatting threats and immediately notified the FBI and Seattle police, who notified the local police," a representative said. "The FBI, as part of its investigation into the cybersecurity incident, also investigated these threats."

The cancer center refuses to respond to further questions regarding the threats. The center has more than ten clinics in the Puget Sound region of Washington.

Patients were informed last month about a similar "cyber event" by Integris Health, another Oklahoman health network that runs a network of 43 clinics and 15 hospitals. During this incident, hackers may have gained access to personal information. Some of these individuals later complained that they received emails from unscrupulous people threatening to sell their personal information on the dark web.

What next?

"As we work with third-party specialists to investigate this matter and determine the scope of affected data and to whom that data relates, we are providing the latest information for patients and the public here," the spokesman for Integris said.

Some corporate types may not find these types of boilerplate responses to be as comforting as they seem. Concerning concerns are raised about how far thieves may go to obtain stolen goods in light of this most recent swatting threat.

According to Emsisoft threat analyst Brett Callow, "ransoms have been allowed to reach lottery jackpot levels, and the predictable upshot is that people are willing to use more and more extreme measures to collect a payout," The Register said.

The security shop demanded earlier this week that ransom payments be outlawed entirely, pointing out that extortion methods were evolving and now included swatting threats.

Emergency Rooms Hit by Cyber Siege: Patient Diversions Spread Across Three States

 


During the recent ransomware attack on one of the hospitals in the chain of 30 that operates in six states, patients from some of its ERs will be diverted to other hospitals over the coming weeks, while some elective surgeries will be postponed. 

Ardent Health Services owns or partially owns all of the hospitals affected by this scandal, as well as other hospitals in at least five states. The company is based in Tennessee and owns more than twenty dozen hospitals in at least that number of states. 

As of now, several hospitals in East Texas are unable to accept ambulances from other hospitals, along with an Albuquerque hospital that has 263 beds; one hospital in Montclair, New Jersey that has 365 beds; and another hospital network in East Texas that serves thousands of patients each year. 

There is no doubt that the Coronavirus pandemic has been marked by disruptions to healthcare services that are caused by ransomware, which secures computers for hackers to demand a fee in return for unlocking them.

Cybercrime firm Recorded Future, which specialises in cyber security, reports that hospitals are now being targeted - and demands for extortion payments are being made. There have been at least 300 documented ransomware attacks on healthcare facilities every year since 2020, according to an NBC report based on an interview with Ransomware analyst Allan Liska in June. 

An attack that occurred at St Margaret's Health in Spring Valley, Illinois, in June forced the facility to close, in part due to its poorly planned security measures. The Ardent health operator has been identified as the largest health operator to have been hit by this strike so far. NBC reports that although there has not been any case of patients dying as a result of an attack, studies have confirmed that ransomware attack on hospitals is linked to an increase in mortality rates, despite the lack of cases of patients dying as a result of an attack. 

There was no change in the perception of patient care in Ardent's hospital, emergency room, and clinic as the company that started as a psychiatric hospital continued to deliver care "safely and effectively." Despite that, the company also announced that because of the "obvious precautions", some non-emergent, elective procedures have been rescheduled and some emergency room patients have been diverted to hospitals in the area until the systems are back up and running. 

According to Ardent Health Services, the disruption was caused by a ransomware attack and the organization has informed its patients that some emergency room patients have been transferred to other hospitals until the systems are restored. As a result, some non-emergency surgeries had to be rescheduled by hospital facilities. 

Ardent spokesperson Will Roberts told us on Tuesday afternoon that more than half of Ardent's 25 emergency rooms had reopened their doors to accepting ambulances or were fully lifting their “divert” status. In a divert situation, ambulance services are asked to transport emergency patients to nearby hospitals when they need emergency care.

During flu seasons, COVID-19 surges, natural disasters, and large trauma events, hospitals nationwide have used divert status. Roberts said hospitals have used divert status at times. It has been reported that at least 35 Ransomware attacks have disrupted the operations of healthcare providers this year, according to Brett Callow, a cybersecurity analyst at Emsisoft. 

As the cybersecurity company starts to catch more and more infections, it is expected that the number of attacks will increase. In most cases, hackers can commit attacks during holidays when they believe that there are fewer security guards available to protect them. Several law enforcement agencies, including the FBI, are advising victims of ransomware attacks not to agree to ransom demands. 

The emergency rooms at several hospital chains in Oklahoma, New Mexico, and Texas were transferring patients to other hospitals as a result of several hospital transfers. There has been an attack on the computer programs of Ardent that track patients' healthcare records, among others. According to Ardent's statement, the ransomware has taken the company's network offline. 

In addition to reporting the matter to law enforcement and consulting third parties on forensics and threat intelligence, the company also retained an independent forensic and threat intelligence team to handle the matter. The fact that hackers have consistently targeted hospital chains has been one of the major indicators that a growing trend of cybercrime has gained momentum in 2019. 

According to several studies, a significant correlation indeed exists between ransomware attacks on hospitals and increased mortality rates, yet there are no cases that have yet been proven to occur in which a ransomware attack has killed a patient in a healthcare facility. Some medical professionals, however, disagree and believe the cause of death is purely coincidental.

Multi-State Cyberattack Disrupts Health Care Services in Multiple States

 


One of the California organizations faced a cyberattack this week which resulted in some services being shut down at affiliated locations and some patients having to rely solely on paper records. The cyberattack disrupted hospital computer systems in several states on Friday, some emergency rooms were closed and ambulances diverted. Most primary care services remained closed, while security experts investigated that the damage was extensive. 

It was reported Thursday that a "data security incident" had taken place at Prospect Medical Holdings' facilities in this state as well as in Texas, Connecticut, Rhode Island, and Pennsylvania. These facilities are owned and operated by Prospect Medical Holdings, based in Los Angeles. Prospect Medical Holdings is based in Connecticut and operates 16 hospitals and more than 165 clinics and outpatient centres across Connecticut, Pennsylvania, Rhode Island and Southern California. Prospect Medical spokesperson was unable to provide an estimate regarding when services will resume on Saturday. At the moment, there is no indication of the number of sites affected by this system. 

As of now, the company has seven hospitals in California's Los Angeles and Orange counties. Prospect's website says the company has two behavioural health facilities and a 130-bed acute care hospital in Los Angeles. 

Connecticut hospitals, including Manchester Memorial, Rockville General and Thornwood Hospital, closed their emergency departments from Thursday morning to evening. Patients were transferred between nearby facilities. Connecticut's FBI has issued a statement stating that it is working with "all the law enforcement agencies in the state as well as the victims' entities" but was unable to go into further detail regarding the investigation in progress. 

In addition to elective surgeries and outpatient appointments, blood drives and other services, the Eastern Connecticut Health Network, which operates the facilities, also announced that many primary care services were closed on Friday. While the emergency departments reopened late Thursday, many primary care services were also shut. Upon looking at the website for this network, the website indicates that all patients have been contacted individually. 

There were ongoing technical difficulties on Eastern Connecticut Health Network's website on Saturday night, which, among other things, caused the closure of its services like outpatient medical imaging, outpatient blood draw, and others, as it is a part of the Prospect health system. In a report published by the Hartford Courant on Thursday, two hospitals that are part of the network had to divert patients from their emergency rooms.   

As hospitals digitize and upgrade their medical records to cloud-based servers, ransomware is becoming a more common form of attack, including attacks on healthcare systems. The American Hospital Association's cybersecurity adviser, John Riggi, said that cyberattacks on hospitals have become increasingly common over the past few years. 

It has been reported that Waterbury Hospital, in Waterbury, Conn., has been experiencing disruptions throughout the afternoon and evening. Furthermore, the hospital said some of its outpatient imaging, as well as outpatient surgery services, had been unavailable on Friday and Saturday as well. The company said that it will be using paper records from now on. 

On February 24, 2022, One Brooklyn Health, a hospital group that delivers health care to low-income neighbourhoods in New York, was a victim of a cyberattack that forced hospital employees to use paper records to keep track of patient information. The employees at the time of the attack said that they were a little behind on learning the new system, given that most hospitals have been using electronic records since the mid-1990s, and that some diagnostic tests were taking longer to return due to the attack.

NBC reported that commonSpirit Health, which operates over 140 hospitals and more than 700 care sites across the country, was hit by a cyberattack last year, which resulted in cancelled surgeries, cancelled doctor's appointments, and other delays in the delivery of care. In 2020, Russian hackers launched a ransomware attack against United Health Services, which is affiliated with over 400 hospitals, making it one of the largest attacks of its kind in history and one of the largest attacks in the history of cybercrime. 

Despite these alarming facts, the incident clearly illustrates the vulnerability of healthcare systems to cyberattacks. Critical services are being disrupted across several states as a result. Due to the need for robust cybersecurity measures being urgently needed, the reliance on paper records is an indication of the need. 

As a result of the outbreak of the pandemic, the healthcare sector has been exposed to an increased level of cyber threats. Keeping the data of our patients secure and ensuring the uninterrupted delivery of care in a world that is becoming more interconnected is a vital task of healthcare providers and technology partners working together.