Enhancing Care and Comfort: Timmins, Ontario’s New Medical Facility Supported by $2 Million Investment

Enhancing Care and Comfort: Timmins, Ontario’s New Medical Facility Supported by $2 Million Investment

The Ontario government is investing $2 million this year through the Health Infrastructure Renewal Fund to help Timmins and District Hospital complete critical upgrades and repairs that will create a safer, more comfortable space for people and their families connecting to care and services at the hospital.

“Our government is making investments to ensure Ontario’s hospitals and community health infrastructure continue to be state-of-the-art facilities closer to home,” said Sylvia Jones, Deputy Premier and Minister of Health. “This funding will help Timmins and District Hospital address priority infrastructure needs so they can continue to provide world-class health care in the community.”

Click here to read more.

Ontario hospital exposed thousands of unused IP addresses

Ontario hospital exposed thousands of unused IP addresses

An Ontario hospital last fall accounted for over three quarters of the exposed and unusued IP addresses or connected devices among medical institutions around the globe, according to research conducted by two security vendors.

Read more at https://www.itworldcanada.com/article/ontario-hospitals-exposure-of-tens-of-thousands-of-unused-ip-addresses-was-risky-says-study/403606

Doctors save Ontario woman’s life by removing her lungs

In what’s believed to be a world first, Canadian doctors say they were able to save a young mother’s life with a radical procedure — they removed her lungs.

Melissa Benoit, who was born with cystic fibrosis and had developed a rampaging lung infection that had spread throughout her body, was hours away from death last April when doctors at Toronto General Hospital were given the go-ahead by her family to take the unprecedented step.

Read more at http://globalnews.ca/news/3204018/doctors-save-ontario-womans-life-by-removing-her-lungs/

Ontario hospital exposed thousands of unused IP addresses

Are EHR Vendors Hackers’ Next Big Target?

Over the course of 2015, countless data breaches occurred within hospital networks, health insurers, physicians’ offices, and other organizations in the healthcare industry. In fact, Community Health Systems, Premera and Anthem were just a few of the most notable names who made cybersecurity headlines last year. More than 94 million records were exposed as the result of attacks varying in sophistication, which ranged from standard, employee-targeted breaches, to more complex methods carried out by scheming hackers.

It’s widely agreed upon that hackers target industries that hold valuable, sensitive and extremely personal data. It follows, then, that the healthcare industry is one of those targeted sectors, and has been for quite some time, due to its treasure trove of private information including mailing addresses, family histories, medical conditions, social security numbers and much more.

But with attacks increasing in both size and complexity, it’s time to more closely examine the healthcare industry, in particular electronic health record (EHR) providers.

Read more at http://hitconsultant.net/2016/04/11/preparing-ehr-vendors-cyber-threats/

Hollywood Hospital Pays $17,000 Ransom to Hacker for Unlocking Medical Records

Hollywood Hospital Pays $17,000 Ransom to Hacker for Unlocking Medical Records

Ransomware has seriously turned on to a noxious game of Hackers to get paid effortlessly.

Once again the heat was felt by the Los Angeles-based Presbyterian Medical Center when a group of hackers had sealed all its sensitive files and demanded $17,000 USD to regain the access to those compromised data.

The devastation of the compromised files can be pitched as:

  • Compromised emails
  • Lockout Electronic Medical Record System [EMR]
  • Encrypted patient data
  • Unable to carry CT Scans of the admitted patients
  • Ferried risky patients to nearby hospitals

As the situation was grown out of wild, the hospital paid 40 Bitcoins (Roughly US $17,000) to the Ransomware Criminals to resume their medical operations after gaining the decryption keys.

“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” the hospital CEO Allen Stefanek said in a letter.

All the electronic medical system were restored back soon after unlocking the encrypted file locks.

The Ransomware had stolen the nights of many network administrators, as they would be often blamed to fight up this nasty threat; instead of blaming staffs who click the illegit links in their e-mail.

http://thehackernews.com/2016/02/ransomware-medical-record.html?utm_source=THNLS&utm_medium=BelowLS&utm_campaign=LS

http://hollywoodpresbyterian.com/default/assets/File/20160217%20Memo%20from%20the%20CEO%20v2.pdf