Canadian Healthcare Technology Logo
  • Issues
    • Current Print Issue
    • Print Archive
  • Advertise
    • Publishing Schedule
    • Circulation
    • Unit Sizes and Rates
    • Mechanical Requirements
    • Electronic Advertising
    • White Papers
  • Subscribe
    • Print Edition
    • e-Messenger
    • White Papers
  • Events
  • Vendors
  • About Us

Philips

AGFA 1400x150

Petal Health

Petal Health 1400x150

Privacy & Security

Physician systems under attack by ransomware

September 6, 2017


Dr Dennis Desai

TORONTO – It’s not just hospitals that have been targeted by hackers using ransomware to disable computer systems holding patient records. Doctors’ offices, too, have been hit, with thousands of records becoming inaccessible, says the Canadian Medical Protective Association (CMPA).

In some cases, medical offices are spending two or three days restoring their systems from backup sites; in more dire instances, they are losing masses of crucial data, says the CMPA.

As a result, physicians are missing key aspects of patients’ history when diagnosing health issues, says Dr. Dennis Desai (pictured), a physician adviser at the CMPA, which provides liability coverage for most of Canada’s MDs.

“The doctors are under attack,” he said. “We are getting physicians on a regular basis saying, ‘I have a computer, I got locked out, I have ransomware.’ … They’ve been asked to pay in bitcoin. They’re asking us, ‘Should I pay it?’ ”

The theoretical threat of ransomware to Canadian healthcare been much discussed lately, especially since the global “Wannacry” outbreak struck several British hospitals in May.

But according to the National Post, the CMPA’s revelations appear to be the first public acknowledgement of actual patient data in this country being affected by the increasingly common form of cyber crime.

The office of Brian Beamish, Ontario’s privacy commissioner, said it has also received 10 reports of ransomware attacks on doctor’s offices or clinics since the start of 2016, calling it an “increasingly dangerous” threat to the security of health records.

In simple terms, attackers freeze up computers by encrypting data and then demand a payment – usually in digital bitcoin – to unlock the files. Even if ransom is paid, there is lingering concern about what hackers might do with the data.

No Canadian hospital – as opposed to a doctor’s office – has publicly admitted to being a victim. But Bill Tholl, chair of a federal committee on cybersecurity and critical infrastructure, confirmed that it has happened here, with medical files involved.

“There have been some hospitals that have been attacked and have paid ransom in bitcoin, in Canada,” he said. “It was the Wannacry kind of event … It’s not individual patient files; they lock up everybody.”

The CMPA published an article this week urging physicians to ensure they have robust backup systems, vigorously guard against infection by computer viruses – and not pay ransom if they are targeted.

It seems to be a burgeoning problem, with one expert estimating the number of ransomware attacks has soared 600 per cent just in the past year, said Tholl, former CEO of HealthCareCan, which represents hospitals and other medical facilities across the country.

And for various reasons, medical data is a prime focus, 10 times more likely to be targeted than even banking information, he said.

That reality was driven home by Wannacry, which caused 16 hospitals in Britain’s National Health Service to shut down at least part of their operations.

In the U.S., at least two major facilities have taken significant hits from more isolated attacks. Most recently, computers at Erie County Medical Center in Buffalo were down for six weeks earlier this year after hackers demanded $44,000 in bitcoin, a sum the facility refused to pay.

Kevin Magee, a cybersecurity consultant who is on Tholl’s federal committee, said Canadian hospitals have so far been relatively unscathed, partly because they seem disciplined about installing security patches to protect against malware.

Simple computer “hygiene” – not clicking on suspect links or attachments in emails that can usher viruses into a system – is also effective, experts say.

But Wannacry showed cyber criminals the lure of pursuing healthcare institutions, where lives could actually be endangered by a sudden computer failure, Magee said.

“It was an advertisement to hackers to say, ‘They’re ripe for the picking, they’re a very high probability, low-risk target,’” he said. “The media coverage is extensive, which provides incredible pressure on the organization to pay.”

Desai said the physician offices affected by ransomware – some housing several doctors – typically have one computer system that covers everything from appointment scheduling to patient charts. And more than 70 per cent of physicians now have electronic medical records.

Being without those charts even for a couple of days is a problem, he said.

“The patient comes in with a sore throat and you’re going to prescribe an antibiotic. But (maybe) they’ve got an allergy to penicillin, or they had a previous problem with a cancer and this might be a recurrence,” said Desai. “You really need to know that information.”

Most offices do have their files backed up, meaning a compromised system can be purged and then restored from other sources, but that can be an arduous process, he said.

The CMPA, like most other experts, advises against paying a ransom, as it may simply set up the clinic to be menaced again, and is no guarantee files will be unlocked, said Desai.

A national policy against hospitals paying ransom would be ideal, but not practical until all the facilities have implemented adequate, daily backup of patient data, said Tholl. Some have yet to take that step.

Meanwhile, the ransomware threat is expected to keep growing, and become increasingly sophisticated, said Magee.

That could mean hackers demanding ransom with more insidious forms of pressure, such as threatening to change blood type or other key facts in patient records, publish private charts or emails, or meddle with computer-connected medical devices, he said.

Tholl said the healthcare system, once skeptical of the threat, now takes it very seriously.

A survey done for HealthCareCAN after the Wannacry incident found 85 percent of those officials felt their institutions were very or somewhat vulnerable to cyber assaults.

PreviousNext

CHT print

CHT print

e-Messenger

  • Carney appoints new health minister, AI chief
  • NS delays start of provincial EHR system
  • New associate CEO of CIUSSS-West-Central Montreal
  • Medic Alert bracelets will connect to EHRs
  • Mount Sinai deploys system for partial knee replacement
More from e-Messenger

Subscribe

Subscribe

Weekly blasts are sent each month, via e-mail, to over 7,000 senior managers and executives in hospitals, clinics and health regions. Learn More

Infoway

Infoway

Zebra

Zebra

Zebra

Zebra

Advertise with us

Advertise with us

Sectra KLAS

Sectra KLAS

Stratford Group

Stratford Group

Pure Storage

Pure Storage

Medirex

Medirex

NIHI

NIHI

CHT print

CHT print

Advertise with us

Advertise with us

Sectra KLAS

Sectra KLAS

Stratford Group

Stratford Group

Pure Storage

Pure Storage

Medirex

Medirex

NIHI

NIHI

Contact Us

Canadian Healthcare Technology
1118 Centre Street, Suite 204
Thornhill, Ontario, Canada L4J 7R9
Tel: 905-709-2330
Fax: 905-709-2258
info2@canhealth.com

  • Quick Links
    • Current Print Issue
    • Print Archive
    • Events
    • Vendors
    • About Us
  • Advertise
    • Publishing Schedule
    • Circulation
    • Unit Sizes and Rates
    • Mechanical Requirements
    • Electronic Advertising
    • White Papers
  • Subscribe
    • Print Edition
    • e-Messenger
    • White Papers
  • Resources
    • White Papers
    • Writers’ Guidelines
    • Privacy Policy
  • Topics
    • Administrative Solutions
    • Clinical Solutions
    • Companies
    • Continuing Care
    • Diagnostics
    • Education & Training
  •  
    • Electronic Records
    • Government & Policy
    • Infrastructure
    • Innovation
    • People
    • Privacy and Security

© 2025 Canadian Healthcare Technology

The content of Canadian Healthcare Technology is subject to copyright. Reproduction in whole or in part without prior written permission is strictly prohibited. Send all requests for permission to Jerry Zeidenberg, Publisher.

Search Site

Error: Enter a search term

  • Issues
    • Current Print Issue
    • Print Archive
  • Advertise
    • Publishing Schedule
    • Circulation
    • Unit Sizes and Rates
    • Mechanical Requirements
    • Electronic Advertising
    • White Papers
  • Subscribe
    • Print Edition
    • e-Messenger
    • White Papers
  • Events
  • Vendors
  • About Us