
Adding resilience -
Case healthcare
Ensuring cyber security in healthcare is vital for protecting patient data and maintaining the integrity of medical services
Showcasing our results

Cyber security are crucial when handling healthcare-related information and information systems. The security of the healthcare was developed in the Healthcare Cyber Range project and in the Cyber Security Incident Response Processes and Guidelines in Healthcare Environments project. The cyber resilience of healthcare sector is also improved annually in Finland's national cyber exercises.

Healthcare cyber range
One of the most significant achievement of our projects was the development of a cyber range for the healthcare sector.

Pilot exercise
The healthcare cyber range was piloted in a cyber exercise for the industry that enhanced the skills and tested the processes of healthcare actors.

Knowledge and publications
As a result of our work, the handbook for healthcare operators was produced. The handbook aims to help Finnish healthcare organizations develop their cyber incident management processes and guidelines.
Projects related to the topic

Project
01.08.2020
Cyber security
ZZPin: Healthcare, projects related to topic
Cyber security incident response processes and guidelines in healthcare environments
Completed

Project
27.01.2019
Cyber security
ZZPin: Healthcare, projects related to topic
Healthcare Cyber Range (HCCR)
Completed
Healthcare cyber range

The exercise environment built for healthcare actors enables practicing anticipation and acting in difficult and extensive cyberattack situations. The environment also makes it possible to test existing processes and cooperation between organizations. The healthcare cyber range is modelled as part of out RGCE environment.
What is included in the healthcare cyber range?
Virtual hospitals, hospital equipment, social and health information systems and national common services have been modelled to the environment.

Patient information systems
Medical records, referrals, prescriptions, laboratory results, imaging and hospital wards.

Intensive care unit
In addition to virtual systems, a physical patient simulator and medical equipment such as a ventilator and a patient monitor.

Realistically modelled records
Personal data, addresses, banking, company and patient information, disease classifications, prescription drugs, drug pack sizes and reference values for laboratory results.

Integrated national services
Kanta, THL, Kela, pharmacies, prescription center and strong authentication service.
Related research publications

Publication
21.04.2022
Cyber exercise
Cyber security
Key Elements of On-Line Cyber Security Exercise and Survey of Learning During the On-Line Cyber Security Exercise

Publication
07.01.2022
CyberSecurity
MachineLearning
One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer

Publication
26.05.2021
CyberSecurity
Healthcare
Color-Optimized One-Pixel Attack Against Digital Pathology Images
You might also like these

Staff story
30.04.2021
Creating with us
Healthcare
Real life medical equipment and simulated public health services in healthcare cyber security exercises

Article
29.01.2021
Cyber security
Healthcare
Healthcare under attack – Cyber security incident response in times of pandemic

Staff story
11.06.2020
Cyber range
Cyber security
Adding Realism to Cyber Security Exercises – Populating RGCE environment
National cyber exercises on healthcare
Healthcare sector is a participant of national cyber exercises
Finland's four annual national cyber exercises (KYHA exercises) are aimed to municipality and critical infrastructure organizations, Finnish state administration organizations, security authorities and healthcare organizations.



Quote
In digital security, while technology plays a crucial role, managing a complex environment requires much more than just technical solutions. The expertise of individuals and organizations, along with effective operational processes, are of paramount importance.
Tero Kokkonen
Director, Jamk Institute of Information Technology


Any questions left?

Aimo Pellinen
R&D Manager
+358504080189
firstname.lastname@jamk.fi