I dunno, with Healthcare the larger the organization the more serious they take it. A small practice may basically ignore it but by the time you get to be the size of UMC, the Hospital named in the article, they're typically spending many millions of dollars annually on CyberSecurity.
The problem is that they're stuck playing defense. They have to get it right every time but the attackers only have to get lucky once. They could successfully repel 10,000 attempts Monday through Saturday but then on Sunday they only repel 9,999 'cuz Bored Bob the maintenance guy clicked a new zero-day in their email and now they're in the news.
You can't justify the security costs on this quarter's numbers, so we're gonna have to fire the whole team except Scruffy who changes tapes on the new tape lib that nothing uses.
They're gonna outsource the management to some group in Estonia but Deloitte can't get here to start planning the finances of the project to scope the work to manage the admin programme for another 6 months.
Yup, with a minimum completion time of 1 hour for the video training and the policies you have to read afterwards. Also remember not to click the super obvious phishing emails that obviously came straight from your own IT department. :D
Generally these computer systems do access control, patient charting, intake management and most other critical functions, just like the rest of the world.
Blood banks and controlled medicines are likely gated behind access controlled doors, and without either it could cause major impacts to the ability to save lives
I would assume if they were the ONLY hospital in Lubbock it would be different but it seems like there are plenty of other hospitals, albeit not level one trauma centers. I wonder if the area has "diversion" protocols already. The vast majority of patients transported by ambulances don't need level one trauma centers so its probably more nothingburger than the article is making it out to be