
1. Why Do Hospitals Also Need
“Information Security”?
When you
walk into a hospital — whether for registration, consultation, examination, or
picking up medication — there’s actually a vast information system running in
the background. These systems store your personal information, medical records,
lab reports, imaging files, and even medication history.
In the past, hospital records might have been paper charts locked in a cabinet;
today, almost all data is digitized and connected to the internet. While this
brings convenience, it also exposes the data to risks such as hacker attacks
and data breaches.
In the era
of rapidly developing digital healthcare, hospital operations and medical
services are highly dependent on information systems, including the Hospital
Information System (HIS), Picture Archiving and Communication System (PACS),
Electronic Medical Record system (EMR), Laboratory Information System (LIS),
Nursing Information System (NIS), and pharmacy management systems. However,
medical data is both highly sensitive and highly valuable, making it a prime
target for hackers.
In recent
years, numerous domestic and international hospitals have been attacked by ransomware.
Once hackers infiltrate the system, they encrypt medical records and lab data,
demanding ransom to unlock them; if refused, they may even publish the data
online. This not only disrupts medical services but also poses serious threats
to patient privacy.
Therefore,
incorporating information security into hospital governance is not only a
regulatory requirement but also a core responsibility for maintaining care
quality, protecting patient rights, and safeguarding the hospital’s reputation.
2. What Is a Ransomware Attack?
Ransomware
is a type of malicious software that locks your files and demands payment to
unlock them.
For the average person, this could mean losing access to photos or documents;
for a hospital, it could mean the ER’s medical record system or the operating
room’s imaging equipment becomes unusable.
In a
hospital setting, such attacks can lead to:
O Delayed treatment: Medical records become
inaccessible, preventing doctors from promptly assessing patient conditions.
O Testing shutdowns: Radiology images or lab results
can’t be transmitted, forcing patients to wait.
O Privacy breaches: Personal data could be sold or
leaked by hackers.
3. How Does the Hospital Protect
Your Data?
Our
hospital has a comprehensive information security protection strategy, which
can be understood as “three lines of defense”:
(1)
Policies and Regulations
O Establish information security
policies and a hospital personal data protection plan to ensure the CIA triad:
Confidentiality, Integrity, and Availability. Clearly regulate how data is
collected, processed, used, and destroyed.
O Sign information security
responsibility clauses with all partners to ensure outsourced services follow
the same standards.
(2)
Technical Safeguards
O Deploy antivirus systems, firewalls,
intrusion detection and prevention systems (IDS/IPS), and endpoint detection
and response (EDR) to continuously monitor abnormal traffic.
O Implement offsite/offline backups
for critical systems to enable rapid recovery after attacks.
O Apply the “principle of least
privilege” so each medical staff member can only access data necessary for
their work.
O Conduct regular vulnerability assessment
and penetration testing, and implement a Zero Trust architecture to control
cross-network access.
(3)
Personnel Education and Drills
O Provide regular information security
training to help staff identify phishing emails and suspicious links.
O Conduct annual incident response
drills and disaster recovery drills (DR Drills) to simulate system downtime and
ensure uninterrupted clinical services.
4. Three Things the Public Can Also
Do
Information
security isn’t solely the hospital’s responsibility — you can help protect your
data, too:
(1) Be cautious with public Wi-Fi
Avoid checking medical
information over public Wi-Fi in cafes or stations; use mobile data or a VPN
instead.
(2) Don’t click unknown links
If you receive a text message or email claiming to be from the hospital, verify
its source before clicking or replying.
(3) Ask about data usage during visits
When signing consent forms, inquire about data retention periods and usage
scope to protect your rights.
5. Lessons from Recent Healthcare
Cyber Incidents
In early
2025, several hospitals in Taiwan were attacked by ransomware, causing system
outages and concerns over data leaks. Although most hospitals quickly activated
backup systems, the incident reminds us:
O Cyber incidents can happen anytime.
O Hospitals that conduct drills and
prepare recover faster.
O Participation from everyone — from
the hospital director to every staff member and even patients — is key to
cybersecurity awareness.
6. Our Commitment
As your
partner in protecting health, we promise to:
O Continuously invest in the latest
cybersecurity technologies.
O Regularly review and improve
security processes.
O Protect every patient’s data to the
highest standard.
Your trust
is our most valuable asset. We will continue to share cybersecurity knowledge
and healthcare information so everyone can enjoy convenient medical services
without compromising safety.
Note: If you receive any suspicious
messages after a hospital visit, please contact the hospital’s official
customer service immediately — do not reply or click unknown links.