{"id":13296,"date":"2022-02-16T13:23:51","date_gmt":"2022-02-16T13:23:51","guid":{"rendered":"https:\/\/www.cyber40.it\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/"},"modified":"2022-02-16T13:23:51","modified_gmt":"2022-02-16T13:23:51","slug":"healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/","title":{"rendered":"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk"},"content":{"rendered":"<div class=\"p-pdf_iframe__page\" aria-label=\"Pagina 1\" data-page-number=\"1\">\n<p class=\"textLayer\"><span dir=\"ltr\" role=\"presentation\">The effort made to cope with the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">emergency dictated by the spread of the <\/span><span dir=\"ltr\" role=\"presentation\">virus and at the same time to guarantee citizens other essential services in the <\/span><span dir=\"ltr\" role=\"presentation\">medical field, has exposed the health<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">of our country to the attentions of <\/span><span dir=\"ltr\" role=\"presentation\">cyber criminals, aware of the particular vulnerability<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">of the system in a <\/span><span dir=\"ltr\" role=\"presentation\">context of accelerating digital processes as a result of the <\/span><span dir=\"ltr\" role=\"presentation\">restrictions on people&#8217;s movements and social distance.<\/span><\/p>\n<p class=\"textLayer\"><span dir=\"ltr\" role=\"presentation\">The result is that health care facilities are increasingly in the crosshairs of attacks  <\/span><span dir=\"ltr\" role=\"presentation\">hackers. According to a recent report by Trend Micro Research, the division&#8217;s   <\/span><span dir=\"ltr\" role=\"presentation\">by multinational cybersecurity software company Trend Micro, <\/span><span dir=\"ltr\" role=\"presentation\">in 2020 there were 20,777 unique malware and 2,063 unique ransomware that <\/span><span dir=\"ltr\" role=\"presentation\">affected Italian healthcare facilities, handing the most <\/span><span dir=\"ltr\" role=\"presentation\">vulnerable in this historical phase marked by the pandemic the unenviable <\/span><span dir=\"ltr\" role=\"presentation\">record of cyber attacks suffered.<\/span><\/p>\n<p class=\"textLayer\"><span dir=\"ltr\" role=\"presentation\">Ransomware ranks first in popularity.<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0  <\/span><span dir=\"ltr\" role=\"presentation\">and impact, in a  <\/span><span dir=\"ltr\" role=\"presentation\">Ranking of 8 threat groups developed by Threat Landscape 2021  <\/span><span dir=\"ltr\" role=\"presentation\">published in October by the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">ENISA, l<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">Agency of the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">European Union for the  <\/span><span dir=\"ltr\" role=\"presentation\">Cybersecurity.<\/span> <span dir=\"ltr\" role=\"presentation\">The<\/span> <span dir=\"ltr\" role=\"presentation\">report<\/span> <span dir=\"ltr\" role=\"presentation\">of<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">Agency<\/span> <span dir=\"ltr\" role=\"presentation\">European<\/span> <span dir=\"ltr\" role=\"presentation\">stresses<\/span> <span dir=\"ltr\" role=\"presentation\">as<\/span> <span dir=\"ltr\" role=\"presentation\">the  <\/span><span dir=\"ltr\" role=\"presentation\">remotization of work, in the years 2020 and 2021, contributed to  <\/span><span dir=\"ltr\" role=\"presentation\">increase and make  <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">mainstream<\/span><span dir=\"ltr\" role=\"presentation\">&#8221;  <\/span><span dir=\"ltr\" role=\"presentation\">cybersecurity threats  <\/span><span dir=\"ltr\" role=\"presentation\">related to the pandemic and the exploitation of the new normal.<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0  <\/span><span dir=\"ltr\" role=\"presentation\">of the smart  <\/span><span dir=\"ltr\" role=\"presentation\">working, which has in fact  <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">increased the area of attack<\/span><span dir=\"ltr\" role=\"presentation\">&#8221;  <\/span><span dir=\"ltr\" role=\"presentation\">causing  <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">An increase in the number of cyber attacks directed at organizations and  <\/span><span dir=\"ltr\" role=\"presentation\">companies<\/span><span dir=\"ltr\" role=\"presentation\">&#8221;  <\/span><span dir=\"ltr\" role=\"presentation\">With staff operating remotely.<\/span><\/p>\n<p class=\"textLayer\"><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">We entered the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">era of the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">enterprise ransomware, sophisticated attacks, <\/span><span dir=\"ltr\" role=\"presentation\">prepared carefully and months in advance, followed by demands for <\/span><span dir=\"ltr\" role=\"presentation\">ransomware the result of a thorough study, tailored on the <\/span> <span dir=\"ltr\" role=\"presentation\">affected organizations. A process facilitated by the decoupling between those who   <\/span><span dir=\"ltr\" role=\"presentation\">designs and develops ransomware on the one hand and those who launch the attacks,&#8221; says Giuseppe Bianchi, Full Professor of Telecommunications and Network Security at the University of Rome Tor Vergata.<\/span><\/p>\n<\/div>\n<h2>The ransomware attack on the Lazio region<\/h2>\n<p><span dir=\"ltr\" role=\"presentation\">The vulnerability<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">of the Sanit<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">in the face of cyber attacks has been <\/span><span dir=\"ltr\" role=\"presentation\">confirmation and a particular echo with the hacker attack, unleashed through a <\/span><span dir=\"ltr\" role=\"presentation\">ransomware, that struck on Sunday, August 1, 2021, the data center that <\/span><span dir=\"ltr\" role=\"presentation\">houses some of the Lazio Region&#8217;s IT systems: the ransomware has <\/span><span dir=\"ltr\" role=\"presentation\">compromised for a few days the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">use of some of the services and <\/span><span dir=\"ltr\" role=\"presentation\">applications available to citizens and the registration portal for <\/span><span dir=\"ltr\" role=\"presentation\">COVID-19 vaccinations, thus slowing down<\/span><span dir=\"ltr\" role=\"presentation\">\u00ec <\/span><span dir=\"ltr\" role=\"presentation\">the vaccination campaign.<\/span><\/p>\n<h2>What is ransomware<\/h2>\n<p><span dir=\"ltr\" role=\"presentation\">Ransomware is malware that makes computer data inaccessible  <\/span><span dir=\"ltr\" role=\"presentation\">infected. As happened in the case of the <\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">attack on the Lazio region, those who lash out <\/span><span dir=\"ltr\" role=\"presentation\">a<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">offensive through ransomware demands payment of a ransom, <\/span><span dir=\"ltr\" role=\"presentation\">usually in cryptocurrency, in exchange for a password to be used to <\/span> <span dir=\"ltr\" role=\"presentation\">Have access to the locked files again. If the victims of the attacks are   <\/span><span dir=\"ltr\" role=\"presentation\">public administrations or companies l<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">extortion is so<\/span><span dir=\"ltr\" role=\"presentation\">\u00ec <\/span><span dir=\"ltr\" role=\"presentation\">twofold: on the one hand <\/span><span dir=\"ltr\" role=\"presentation\">the demand for money to make their files accessible again, <\/span><span dir=\"ltr\" role=\"presentation\">on the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">other the threat of making compromised data public with the risk of <\/span><span dir=\"ltr\" role=\"presentation\">creating serious reputational problems.<\/span><\/p>\n<p><span dir=\"ltr\" role=\"presentation\">Falling into the ransomware trap is quite simple: the virus can in fact <\/span><span dir=\"ltr\" role=\"presentation\">be installed on a computer through phishing emails (used in <\/span><span dir=\"ltr\" role=\"presentation\">particularly by the Conti ransomware), which invite the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">user to click on a <\/span><span dir=\"ltr\" role=\"presentation\">certain link or by browsing compromised sites that host <\/span><span dir=\"ltr\" role=\"presentation\">malware that is easy to download.<\/span><\/p>\n<h3><span dir=\"ltr\" role=\"presentation\">The rise of ransomware attacks around the world<\/span><\/h3>\n<p><span dir=\"ltr\" role=\"presentation\">NCC Group&#8217;s Research Intelligence and Fusion Team (RIFT) has determined <\/span><span dir=\"ltr\" role=\"presentation\">that between January and June 2021, the number of ransomware attacks worldwide <\/span><span dir=\"ltr\" role=\"presentation\">increased by 288 percent: 49 percent of victims are U.S.-based, 7 percent are <\/span><span dir=\"ltr\" role=\"presentation\">based in France and 4% in Germany.<\/span><\/p>\n<h3>The ransomware Lockbit 2.0<\/h3>\n<p><span dir=\"ltr\" role=\"presentation\">The ransomware used in the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">attack on Sanit<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">Lazio would have been the <\/span><span dir=\"ltr\" role=\"presentation\">Lockbit 2.0, among the most dangerous computer viruses around. <\/span><span dir=\"ltr\" role=\"presentation\">Formerly known as ABCD ransomware, Lockbit 2.0 was <\/span><span dir=\"ltr\" role=\"presentation\">developed 3 years ago and is a RaaS operator that operates file encryption <\/span><span dir=\"ltr\" role=\"presentation\">by renaming files with the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">extension <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">.Lockbit&#8221;<\/span><span dir=\"ltr\" role=\"presentation\">. The hackers behind the  <\/span><span dir=\"ltr\" role=\"presentation\">Development of this ransomware claim it offers the fastest encryption  <\/span><span dir=\"ltr\" role=\"presentation\">on the criminal market. In addition to the Lazio Region, Lockbit 2.0 would do,   <\/span><span dir=\"ltr\" role=\"presentation\">according to its creators, over 50 victims so far in numerous countries around the <\/span><span dir=\"ltr\" role=\"presentation\">world including the United States, Germany, Argentina and the United Kingdom. <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">In the case of the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">attack on the Lazio Region,&#8221; explains Francesco Quaglia, <\/span><span dir=\"ltr\" role=\"presentation\">professor of computer engineering at Universit<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">of Rome Tor Vergata <\/span> <span dir=\"ltr\" role=\"presentation\">&#8211; it is possible that the defenses on the field were quite low. E <\/span><span dir=\"ltr\" role=\"presentation\">&#8216;  <\/span><span dir=\"ltr\" role=\"presentation\">a problem  <\/span><span dir=\"ltr\" role=\"presentation\">common to many organizations, whose security systems are now found to be  <\/span><span dir=\"ltr\" role=\"presentation\">rather<\/span> <span dir=\"ltr\" role=\"presentation\">Dated,<\/span> <span dir=\"ltr\" role=\"presentation\">despite<\/span> <span dir=\"ltr\" role=\"presentation\">  exist<\/span> <span dir=\"ltr\" role=\"presentation\">gi<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0<\/span> <span dir=\"ltr\" role=\"presentation\">infrastructure<\/span> <span dir=\"ltr\" role=\"presentation\">advanced<\/span> <span dir=\"ltr\" role=\"presentation\">e  <\/span><span dir=\"ltr\" role=\"presentation\">performers.&#8221;<\/span><span dir=\"ltr\" role=\"presentation\">.  <\/span><span dir=\"ltr\" role=\"presentation\">A view shared by Professor Bianchi, according to whom.  <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">to counteract today  <\/span><span dir=\"ltr\" role=\"presentation\">a cyber attack is required a<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">comprehensive infrastructure spanning  <\/span><span dir=\"ltr\" role=\"presentation\">all areas of cybersecurity and be able to raise the defenses  <\/span><span dir=\"ltr\" role=\"presentation\">needed.&#8221;<\/span><span dir=\"ltr\" role=\"presentation\">.  <\/span><span dir=\"ltr\" role=\"presentation\">There are models that provide a  <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">shopping list<\/span><span dir=\"ltr\" role=\"presentation\">&#8221;  <\/span><span dir=\"ltr\" role=\"presentation\">of resources and  <\/span><span dir=\"ltr\" role=\"presentation\">activities<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0  <\/span><span dir=\"ltr\" role=\"presentation\">to put in place, unfortunately many organizations, not  <\/span><span dir=\"ltr\" role=\"presentation\">only small but also medium-sized, are not yet equipped.  <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">Countering cyber attacks means providing security controls,  <\/span><span dir=\"ltr\" role=\"presentation\">organize processes, equip themselves with supports and services that ensure  <\/span><span dir=\"ltr\" role=\"presentation\">continuity<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0  <\/span><span dir=\"ltr\" role=\"presentation\">and recovery<\/span><span dir=\"ltr\" role=\"presentation\">&#8221; continues Bianchi, according to whom fundamental is the  <\/span><span dir=\"ltr\" role=\"presentation\">training of employees regarding the strategies that hackers  <\/span><span dir=\"ltr\" role=\"presentation\">adopt to launch an attack. &#8220;It is appropriate to involve them in simulations of   <\/span><span dir=\"ltr\" role=\"presentation\">attack to test their capabilities<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">in evading or countering attacks.&#8221; <\/span><span dir=\"ltr\" role=\"presentation\">Bianchi concludes.<\/span><\/p>\n<h2>Health care facilities among favorite victims of hackers<\/h2>\n<p><span dir=\"ltr\" role=\"presentation\">The Lazio Region is just one among many more recent victims of <\/span><span dir=\"ltr\" role=\"presentation\">cyber attacks in healthcare that not only jeopardize <\/span><span dir=\"ltr\" role=\"presentation\">services that are essential to people&#8217;s lives but also expose to a very serious <\/span><span dir=\"ltr\" role=\"presentation\">risk to the private data of millions of citizens. <\/span><span dir=\"ltr\" role=\"presentation\">In June 2021, Vice made its debut on the criminal scene. <\/span><span dir=\"ltr\" role=\"presentation\">Society, a hacker group capable, according to Cisco Intelligence Team <\/span><span dir=\"ltr\" role=\"presentation\">Talos, to &#8220;rapidly exploit new vulnerabilities<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">security vulnerabilities to <\/span><span dir=\"ltr\" role=\"presentation\">facilitate ransomware attacks<\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">. In just a few weeks, Vice Society has targeted several hospital facilities: Eskenazi Health in Indianapolis (USA), Waikato DHB in Hamilton (New Zealand), Centre Hospitalier in Arles (France), and Barlow Respiratory Hospital in California. A criminal offensive of a global nature, that conducted by cyber criminals, which worries governments, local health administrations estructures of private hospitals, which are increasingly vulnerable as a result of the progressive enlargement of the digital perimeter in which they operate. &#8220;Data theft against a health care organization exposes patients to the risk of blackmail to disseminate extremely sensitive and personal data such as those belonging to the health sphere. That same data could then, for example, be given to insurance companies that could use it to alter policy prices,&#8221; explains Gaetano Marrocco, director of the School of Medical Engineering at University of Rome Tor Vergata.  <\/span><\/p>\n<h2>The danger to medical devices<\/h2>\n<p><span dir=\"ltr\" role=\"presentation\">Not just data. Hackers are also able to target   <\/span><span dir=\"ltr\" role=\"presentation\">medical devices such as pacemakers or insulin pumps: devices <\/span><span dir=\"ltr\" role=\"presentation\">electronic devices that are regulated by operating systems and as such can be manipulated through <\/span> <span dir=\"ltr\" role=\"presentation\">cyber attacks. A scenario not at all <\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">not at all unlikely and that indeed worried <\/span><span dir=\"ltr\" role=\"presentation\">even the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">former vice president of the United States Dick Cheney, who is suffering from <\/span> <span dir=\"ltr\" role=\"presentation\">heart disease. During the television broadcast   <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">60 Minutes<\/span><span dir=\"ltr\" role=\"presentation\">&#8221; <\/span><span dir=\"ltr\" role=\"presentation\">the deputy of <\/span><span dir=\"ltr\" role=\"presentation\">Bush indeed revealed that his doctor had ordered that the <\/span><span dir=\"ltr\" role=\"presentation\">functionality<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0<\/span> <span dir=\"ltr\" role=\"presentation\">wireless of his heart implant for fear that it might <\/span> <span dir=\"ltr\" role=\"presentation\">Being violated in an assassination attempt. Since then almost a   <\/span><span dir=\"ltr\" role=\"presentation\">decade, and technology has made enormous strides: the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">introduction of <\/span><span dir=\"ltr\" role=\"presentation\">5G technology, which features low latency and higher <\/span><span dir=\"ltr\" role=\"presentation\">speed<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">of data transmission, has opened up important scenarios concerning the <\/span><span dir=\"ltr\" role=\"presentation\">remote surgery, which thanks to the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">aid of robots, will enter<\/span><span dir=\"ltr\" role=\"presentation\">\u00e0 <\/span><span dir=\"ltr\" role=\"presentation\">increasingly become <\/span><span dir=\"ltr\" role=\"presentation\">part of the<\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">ordinary medical administration. With all the risks involved: a   <\/span><span dir=\"ltr\" role=\"presentation\">cyber attack launched against a device that performs delicate <\/span><span dir=\"ltr\" role=\"presentation\">surgical operations could easily endanger the life of the <\/span><span dir=\"ltr\" role=\"presentation\">patient. <\/span><span dir=\"ltr\" role=\"presentation\">&#8220;<\/span><span dir=\"ltr\" role=\"presentation\">To reduce the risk of cyber attacks, governments and institutions must <\/span><span dir=\"ltr\" role=\"presentation\">invest in expertise to reorganize processes and architectures of the <\/span> <span dir=\"ltr\" role=\"presentation\">systems and strengthen critical infrastructure. L <\/span><span dir=\"ltr\" role=\"presentation\">&#8216;<\/span><span dir=\"ltr\" role=\"presentation\">investment must be made <\/span> <span dir=\"ltr\" role=\"presentation\">peremptorily on education. We need to increase the number of graduates.&#8221;   <\/span><span dir=\"ltr\" role=\"presentation\">Francesco Quaglia concludes.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The effort made to cope with the&#8216;emergency dictated by the spread of the virus and at the same time to guarantee citizens other essential services in the medical field, has exposed the health\u00e0 of our country to the attentions of&#8230;<\/p>\n","protected":false},"author":11,"featured_media":10986,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":1,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-13296","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"The effort made to cope with the&#8216;emergency dictated by the spread of the virus and at the same time to guarantee citizens other essential services in the medical field, has exposed the health\u00e0 of our country to the attentions of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-16T13:23:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk\",\"datePublished\":\"2022-02-16T13:23:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/\"},\"wordCount\":1344,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/\",\"name\":\"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg\",\"datePublished\":\"2022-02-16T13:23:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg\",\"width\":1200,\"height\":900,\"caption\":\"shutterstock 1085385533 min scaled 1 scaled\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk - Cyber 4.0","og_description":"The effort made to cope with the&#8216;emergency dictated by the spread of the virus and at the same time to guarantee citizens other essential services in the medical field, has exposed the health\u00e0 of our country to the attentions of...","og_url":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/","og_site_name":"Cyber 4.0","article_published_time":"2022-02-16T13:23:51+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg","type":"image\/jpeg"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk","datePublished":"2022-02-16T13:23:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/"},"wordCount":1344,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg","articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/","url":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/","name":"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg","datePublished":"2022-02-16T13:23:51+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-scaled.jpg","width":1200,"height":900,"caption":"shutterstock 1085385533 min scaled 1 scaled"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/healthcare-is-in-the-crosshairs-of-computer-hackers-services-devices-and-user-privacy-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Healthcare is in the crosshairs of computer hackers: services, devices and user privacy at risk"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":614,"label":"Insights"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/02\/shutterstock_1085385533-min-scaled-1-1024x768.jpg",1024,768,true],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":614,"name":"Insights","slug":"insights-en","term_group":0,"term_taxonomy_id":614,"taxonomy":"category","description":"","parent":0,"count":15,"filter":"raw","term_order":"0","cat_ID":614,"category_count":15,"category_description":"","cat_name":"Insights","category_nicename":"insights-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13296"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13296\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/10986"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}