{"id":42452,"date":"2021-08-18T16:16:05","date_gmt":"2021-08-18T08:16:05","guid":{"rendered":"https:\/\/version-2.com\/?p=42452"},"modified":"2022-01-13T17:55:27","modified_gmt":"2022-01-13T09:55:27","slug":"why-hospital-cyber-protection-is-a-hard-nut-to-crack-2","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/","title":{"rendered":"Why Hospital Cyber Protection Is a Hard Nut to Crack"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"42452\" class=\"elementor elementor-42452\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534888b post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534888b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;80510b6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40115d5\" data-id=\"40115d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4201ee elementor-widget elementor-widget-text-editor\" data-id=\"d4201ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>There is a\u00a0simple reason why hospitals are the frequent targets of cybercriminals. Hospital networks contain patients\u2019 and research data that is highly valued on the black market. And their infrastructure specifics make protecting it difficult.<\/strong><\/p><p>In 2020, all 16 Czech key hospitals covered that year by the Cybersecurity Act reported a\u00a0cyber incident. But also smaller healthcare facilities were being attacked and protecting them was no less complicated.<\/p><p>There are a\u00a0few complications that make hospital cybersecurity challenging: the complex architecture of hospital networks, the frequent obsolescence of operating systems and also the insufficient number of qualified security personnel.<\/p><p>In addition,\u00a0<strong>legislative requirements<\/strong>\u00a0place high demands on security, including:<\/p><ul><li><span class=\"caps\">GDPR<\/span><\/li><li>Your National eHealth Center\u2019s methodological guidelines (if you have\u00a0one)<\/li><li>International standards that summarize security recommendations for the use of healthcare systems and best practices (<a href=\"https:\/\/www.enisa.europa.eu\/publications\/cyber-security-and-resilience-for-smart-hospitals\"><span class=\"caps\">ENISA<\/span>\u00a0\u2013 Cyber security and resilience for Smart Hospitals<\/a>,\u00a0<a href=\"https:\/\/mdiss.org\/\"><span class=\"caps\">MDISS<\/span><\/a>\u00a0\u2013 Medical Device Innovation, Safety\u00a0<span class=\"amp\">&amp;<\/span>\u00a0Security Consortium)<\/li><\/ul><p>Last, but not least, every organization usually has its own\u00a0<strong>internal security regulations<\/strong>. These are based on risk analyses or the internal recommendations and requirements of the hospital\u2019s governing board for the operation of\u00a0<span class=\"caps\">IT<\/span>\u00a0in the hospital.<\/p><h3><strong>The Most Common Targets of Attackers<\/strong><\/h3><p>In the first stages, attackers aim usually at hospital\u00a0<strong>employees\u2019 login credentials<\/strong>, through which attackers try to gain access to VPNs, internal or health information systems. All these systems contain high-value data through which the\u00a0<strong>attacker can hold the hospital to ransom<\/strong>.<\/p><p>Another source of income for attackers is\u00a0<strong>research data<\/strong>\u00a0that can be effectively monetized, but\u00a0<strong>patient data<\/strong>\u00a0is an especially big gain. The price for this information (data about a\u00a0person and their health status) is from tens to hundreds of dollars per record on the black market. By contrast, mere contact details (for example, from a\u00a0hacked e\u2011shop) are only worth units of dollars.<\/p><p>And, of course, there are attacks whose primary\u00a0<strong>goal is to take a\u00a0hospital out of operation<\/strong>. In the case of compromised information systems, hospitals are unable to retrieve medical records or determine the availability of drugs and supplies. In the worst case scenario, the attack affects the operational infrastructure.<\/p><p>In short: the hospital cannot provide the healthcare function essential for its patients.<\/p><h3><strong>The Specifics of Internal Hospital Networks<\/strong><\/h3><p>Hospital internal networks have a\u00a0specific and rather\u00a0<strong>complicated architecture<\/strong>. They are the combination of not only\u00a0<strong><span class=\"caps\">IT<\/span>\u00a0elements<\/strong>\u00a0but also include the\u00a0<strong>operational technology<\/strong>\u00a0of specialized medical departments as well as devices such as air conditioning, heating or blind controls.<\/p><p>There are many different types of\u00a0<span class=\"caps\">IT<\/span>\u00a0networks in hospitals, for example:<\/p><ul><li><strong>Medical networks<\/strong>, in which doctors and nurses access medical records, inventories and other medical information<\/li><li><strong>Patient networks<\/strong>, which are used by patients and visitors to the hospital<\/li><li><strong>Private physician networks<\/strong>, which lease connectivity from the hospital and also have access to the internal network of information systems<\/li><\/ul><p>All of this is often complicated by the\u00a0<strong>frequent use of outdated systems<\/strong>\u00a0and\u00a0<strong>insufficient staff capacity<\/strong>\u00a0to ensure the organization\u2019s cybersecurity.<\/p><p>We should view these characteristics as specifics that cannot be immediately addressed but need to be kept in mind when securing health facilities. For example, some modalities (diagnostic equipment such as X\u2011ray machines, ultrasound, etc.) were purchased by hospitals 10 to 15\u00a0years ago and their level of security corresponds to their age. Often, the manufacturer does not even provide necessary updates, so there are devices with an un-updated operating system in the network. We have seen devices running on Windows\u00a0<span class=\"caps\">XP<\/span>. Even\u00a0<span class=\"caps\">DOS<\/span>\u00a0and old versions of Linux are not rare as without these operating systems, it is not possible to use these devices.<\/p><article class=\"align-center media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.png?itok=a8H4ucU4\" data-lg-id=\"8081a546-1f5a-441d-bc21-9f630f0457fb\"><picture><source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.webp?itok=a8H4ucU4\" type=\"image\/webp\" \/><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.png?itok=a8H4ucU4\" alt=\"\" \/><\/picture><\/a><\/div><\/article><p>Our experience, coming from dozens of hospitals in the European Union and Asia, has shown us that there are many hospitals with a\u00a0high level of cyber protection. Unfortunately, there are also those with a\u00a0large number of security shortcomings that need to be solved. Fortunately,\u00a0<span class=\"caps\">GREYCORTEX<\/span>\u00a0Mendel\u00a0can help them\u00a0all.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead54a5 elementor-widget elementor-widget-shortcode\" data-id=\"ead54a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18179\" class=\"elementor elementor-18179\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About GREYCORTEX<br \/><\/strong>GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.<\/p>\n<p>MENDEL, GREYCORTEX\u2019s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.<\/p>\n<p>MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>There is a\u00a0simple reason why hospitals are the frequent [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[461,24,61],"tags":[462,23,435],"class_list":["post-42452","post","type-post","status-publish","format-standard","hentry","category-year2021","category-greycortex","category-press-release","tag-462","tag-greycortex","tag-mendel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Hospital Cyber Protection Is a Hard Nut to Crack - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Hospital Cyber Protection Is a Hard Nut to Crack - Version 2\" \/>\n<meta property=\"og:description\" content=\"There is a\u00a0simple reason why hospitals are the frequent [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-18T08:16:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-13T09:55:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.png?itok=a8H4ucU4\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Why Hospital Cyber Protection Is a Hard Nut to Crack\",\"datePublished\":\"2021-08-18T08:16:05+00:00\",\"dateModified\":\"2022-01-13T09:55:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/\"},\"wordCount\":666,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/article_image\\\/public\\\/perm\\\/image\\\/diagram-hospitals_0.png?itok=a8H4ucU4\",\"keywords\":[\"2021\",\"Greycortex\",\"MENDEL\"],\"articleSection\":[\"2021\",\"Greycortex\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/\",\"name\":\"Why Hospital Cyber Protection Is a Hard Nut to Crack - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/article_image\\\/public\\\/perm\\\/image\\\/diagram-hospitals_0.png?itok=a8H4ucU4\",\"datePublished\":\"2021-08-18T08:16:05+00:00\",\"dateModified\":\"2022-01-13T09:55:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/article_image\\\/public\\\/perm\\\/image\\\/diagram-hospitals_0.png?itok=a8H4ucU4\",\"contentUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/article_image\\\/public\\\/perm\\\/image\\\/diagram-hospitals_0.png?itok=a8H4ucU4\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Hospital Cyber Protection Is a Hard Nut to Crack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Hospital Cyber Protection Is a Hard Nut to Crack - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/","og_locale":"en_US","og_type":"article","og_title":"Why Hospital Cyber Protection Is a Hard Nut to Crack - Version 2","og_description":"There is a\u00a0simple reason why hospitals are the frequent [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/","og_site_name":"Version 2","article_published_time":"2021-08-18T08:16:05+00:00","article_modified_time":"2022-01-13T09:55:27+00:00","og_image":[{"url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.png?itok=a8H4ucU4","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Why Hospital Cyber Protection Is a Hard Nut to Crack","datePublished":"2021-08-18T08:16:05+00:00","dateModified":"2022-01-13T09:55:27+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/"},"wordCount":666,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.png?itok=a8H4ucU4","keywords":["2021","Greycortex","MENDEL"],"articleSection":["2021","Greycortex","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/","url":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/","name":"Why Hospital Cyber Protection Is a Hard Nut to Crack - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.png?itok=a8H4ucU4","datePublished":"2021-08-18T08:16:05+00:00","dateModified":"2022-01-13T09:55:27+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/#primaryimage","url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.png?itok=a8H4ucU4","contentUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/diagram-hospitals_0.png?itok=a8H4ucU4"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2021\/08\/why-hospital-cyber-protection-is-a-hard-nut-to-crack-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Why Hospital Cyber Protection Is a Hard Nut to Crack"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-b2I","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=42452"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42452\/revisions"}],"predecessor-version":[{"id":42456,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42452\/revisions\/42456"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=42452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=42452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=42452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}