Podcast
Questions and Answers
What is one of the main objectives of the medical physicist's role in cyber security?
What is one of the main objectives of the medical physicist's role in cyber security?
What is a major concern in healthcare that medical physicists need to address?
What is a major concern in healthcare that medical physicists need to address?
What do cyber criminals often target in healthcare?
What do cyber criminals often target in healthcare?
What can clinical physicists do to prevent cyber security threats?
What can clinical physicists do to prevent cyber security threats?
Signup and view all the answers
What is the focus of cyber security in healthcare beyond electronic health records (EHR)?
What is the focus of cyber security in healthcare beyond electronic health records (EHR)?
Signup and view all the answers
What was the outcome of the cyber attack on the radiation oncology department?
What was the outcome of the cyber attack on the radiation oncology department?
Signup and view all the answers
What is the primary focus of Cyber Security?
What is the primary focus of Cyber Security?
Signup and view all the answers
Why is Cyber Security crucial in Radiation Oncology?
Why is Cyber Security crucial in Radiation Oncology?
Signup and view all the answers
What is the duration the clinical physicist and dosimetry staff spent on QA before resuming patient treatments?
What is the duration the clinical physicist and dosimetry staff spent on QA before resuming patient treatments?
Signup and view all the answers
When did patient treatments resume after the cyber attack?
When did patient treatments resume after the cyber attack?
Signup and view all the answers
What is the primary function of malicious software such as Trojan Horses?
What is the primary function of malicious software such as Trojan Horses?
Signup and view all the answers
What is a common threat to cyber security in public Wi-Fi networks?
What is a common threat to cyber security in public Wi-Fi networks?
Signup and view all the answers
What is a key concern when sharing patient health data via email?
What is a key concern when sharing patient health data via email?
Signup and view all the answers
What is a common characteristic of medical device companies?
What is a common characteristic of medical device companies?
Signup and view all the answers
What is a primary focus of medical device companies' research and development?
What is a primary focus of medical device companies' research and development?
Signup and view all the answers
What is a current challenge in the medical device industry?
What is a current challenge in the medical device industry?
Signup and view all the answers
What is the main purpose of using firewalls, virtual private networks, and encryption in a clinical environment?
What is the main purpose of using firewalls, virtual private networks, and encryption in a clinical environment?
Signup and view all the answers
What is the main benefit of whitelisting in a medical device network?
What is the main benefit of whitelisting in a medical device network?
Signup and view all the answers
Why may IT systems not allow non-registered computers to be connected to hospital networks?
Why may IT systems not allow non-registered computers to be connected to hospital networks?
Signup and view all the answers
What is the main purpose of two-factor authentication in a medical environment?
What is the main purpose of two-factor authentication in a medical environment?
Signup and view all the answers
What is the main reason why medical devices should not be directly accessible to the Internet?
What is the main reason why medical devices should not be directly accessible to the Internet?
Signup and view all the answers
Why is it important to encourage vendors to integrate their login system with the hospital's active directory system?
Why is it important to encourage vendors to integrate their login system with the hospital's active directory system?
Signup and view all the answers
What is a recommended practice for vendor systems to ensure device data encryption?
What is a recommended practice for vendor systems to ensure device data encryption?
Signup and view all the answers
What is a crucial aspect of account use best practices for medical devices?
What is a crucial aspect of account use best practices for medical devices?
Signup and view all the answers
What is a benefit of using site-to-site VPN for vendor support?
What is a benefit of using site-to-site VPN for vendor support?
Signup and view all the answers
Why is it important for vendor systems to upgrade operating systems and third-party/open source applications?
Why is it important for vendor systems to upgrade operating systems and third-party/open source applications?
Signup and view all the answers
What is a recommended practice for securing medical devices?
What is a recommended practice for securing medical devices?
Signup and view all the answers