It's a sector where there needs to be a push for software/hardware quality, period! One of my former coworkers from years ago used to write software for medical equipment. The software ran on the cheapest Windows boards the company could find. There was no standardization apart from window dressing. Attitude of management was to just get it out the door, and it would be fine.
YMMV of course.
It reminds me a comment from the Usenet, a long ago: "if your VCR is still blinking 12:00 then Linux is not for you".
Most people playing with technology don't know what they're doing. Giving them more power means giving them more danger.
I guess it wasn't a great plan if it's a week in and they're still dealing with it, but still...
The emergency mode operation plan is however listed as required, and this place was basically shut for a week.
I remembered it being more stringent that what it really is.
>Most hospitals use proprietary electronic medical record systems. These are layered constructs of different networks requiring different passwords and VPNs for their different functions.
That's idealistic. Usually they're giant pieces of shit.
Next summer we'll see how many explosions can be worked into a movie "based on a true story" about cybercrime.
http://www.darkreading.com/attacks-breaches/police-pay-off-r...
this is the 3rd major healthcare org hit with this in like past 3 weeks. last one just got hit last week.
RIS/HIS/PACS/EHR/any systems all hit, with like 80-90% of network equipment compromised
Cedars-Sinai is indeed about twice the size, but that's mostly because Cedars-Sinai is extraordinarily large.