Abstract
Background
Cybersecurity threats are a growing concern in healthcare, where digital systems now underpin patient care, financial management, and educational operations. A cybersecurity breach in a Dental school environment can have widespread consequences to the mission of the school—patient care, research, education and service. For dental school administrators, these risks highlight the necessity of robust cybersecurity measures. For student learners, the impact may include interruptions to their education. For patients, it could mean compromised personal data and reduced access to clinical care.
Results & Conclusion
While many sectors have responded to increasing cyber threats by enhancing their defenses, healthcare and dental schools, often lag in implementing necessary protections. This emphasizes the need for proactive measures, such as regular system audits, advanced encryption methods, and ongoing cybersecurity training for administrators and students alike, to mitigate future risks and safeguard institutional integrity.
Keywords: behavioral sciences, cost, dental care access, dental faculty, economics of dental education, education, ethics, faculty, health care access, health care systems, patient affairs, patient care management, patient safety, professional interest, professional responsibility
1. CONTEXT
In August of 2023, one of the dental schools in the Midwest region was a victim of a major cybersecurity attack. 1 The personal data of School of Dentistry patients, University Health Service patients, some students, applicants, alumni, donors, employees, contractors, and research participants was breached. 2 After this experience, the authors of this article wanted to disseminate information about the experience to enable other dental schools to be well prepared for future threats. Cybersecurity threats can take many forms, including data breaches, ransomware, phishing, and malware attacks. These attacks target sensitive medical and financial information, potentially causing widespread disruption in dental schools.
The increasing prevalence of cybersecurity attacks has profoundly impacted various sectors. These incidents have caused substantial financial losses and jeopardized sensitive personal information and national security. The healthcare sector has also been a significant target. In 2020, a ransomware attack on Universal Health Services, a major healthcare provider in the United States, disrupted operations across 400 facilities, delaying critical medical procedures and patient care. 3 The attack cost these companies over $67 million, demonstrating the severe financial and operational impacts of cybersecurity breaches in healthcare. 4 This disruption lasted three weeks, illustrates the far‐reaching consequences of cybersecurity attacks, and emphasizes the need for enhanced security protocols and proactive measures to protect against future threats.
In the context of dental schools in the United States, integrating digital and online systems has become deeply embedded in clinical, educational, and research activities. 5 These systems manage everything from medical and financial records to e‐prescribing and educational software. Given the comprehensive digital nature of these institutions, the ramifications of such attacks are profound and multifaceted. While cybersecurity attacks pose significant threats to various sectors, a systematic review showed that healthcare is particularly vulnerable because it has not kept up with threats. 6
2. TYPES OF CYBER THREATS
Hospitals and often, by their extension, dental schools and or practices face a variety of cyber threats, with some of the most common attack vectors include:
Ransomware : Ransomware attacks are one of the most prevalent threats in healthcare. Attackers deploy malware to encrypt hospital data and demand a ransom payment, often in cryptocurrency, to provide the decryption key. High‐profile incidents, such as the 2017 WannaCry attack, demonstrated the devastating impact ransomware can have on healthcare systems worldwide. 7
Phishing : Phishing attacks involve tricking employees into revealing sensitive/personal/confidential information or downloading malware through deceptive emails or messages. These attacks often target hospital staff with emails that appear to be from trusted sources, leading to compromised login credentials or the installation of malicious software. 8
Distributed Denial of Service Attacks : Distributed Denial of Service attacks overwhelm hospital servers with traffic, rendering systems inaccessible to legitimate users. This attack can disrupt hospital operations, affecting everything from patient admissions to electronic health records systems. 9
Insider Threats : Insider threats involve individuals (such as employees or contractors) within the organization, who misuse their access to sensitive information. This can be intentional, such as data theft, or accidental, due to negligent information handling. 10
Vulnerabilities in Medical Devices and Systems : Many medical devices and systems, such as equipment for imaging patients, are connected to dental school networks but may lack robust security measures. Exploiting vulnerabilities in these devices can give attackers access to broader hospital or dental school systems. 11
Open network ports : Open network ports in organizations can pose significant cybersecurity risks. Ports are gateways through which data enters and leaves a network. While some must remain open for essential services (like web servers or email), others can become entry points for cyber attackers if not properly secured. 12
3. IMPACT ON CLINICAL AND EDUCATIONAL ACTIVITIES
Cyber attacks can catastrophically impact clinical and educational activities in a dental school. A few of them are summarized below:
Disruption of Patient Care : A cybersecurity attack could lead to the immediate suspension of clinical activities or risks to patient safety if care delivery continues. 13 Dental health records, which interface with finance tools, e‐prescribing systems, and educational software, are critical for patient care. A breach could render these health records inaccessible, delaying treatments, threatening patient safety, and disrupting patient schedules. 14
Data Loss and Integrity : Compromised systems may lead to the loss or alteration of patient data. This can affect everything from health history and radiology images to treatment plans. Restoring data integrity is often a time‐consuming and complex process. 15
Financial Chaos : Integrated finance tools are vulnerable to cybersecurity attacks. Financial transactions, insurance claims, and billing processes could be halted, causing financial strain on the institution and its patients. 16
E‐prescribing Interruption : E‐prescribing systems, crucial for the timely administration of medications, can be rendered inoperative. This affects patient treatment and adherence to legal and medical protocols. 17
Educational Disruption : Although there is no evidence comparing cybersecurity in healthcare to education, the latter may be even less prepared than the healthcare system. With the growth of online education and the expansion of the reliance on educational software, the education system is very vulnerable to cyberattacks. 18 Cyberattacks can halt safe access to educational software and digital learning platforms, disrupting the educational process for both undergraduate and graduate students. Clinical training, which relies heavily on digital records and simulations, can also be affected.
Loss of Trust and Reputation : Repeated or severe cyberattacks can erode trust in technology and an institution. 19 In a dental school environment, patients may seek care elsewhere, and prospective students might choose schools perceived as more secure.
Regulatory and Legal Repercussions : Healthcare clinics and dental schools could face regulatory scrutiny and legal actions due to the breach of protected health information. Compliance with HIPAA and other regulations becomes a critical issue. 20 Since 2015, hacking and cybersecurity incidents have become the primary cause of data breaches in the United States—surpassing theft, improper disposal, and unauthorized access or disclosure. 20
Ongoing Financial Burden : Beyond immediate financial chaos, long‐term costs include legal fees, regulatory fines, and investments in improved cybersecurity infrastructure. These financial burdens can impact the institution's budget and resources available for educational programs. 13
4. MITIGATION STRATEGIES
In a time where technological advancements have changed almost every aspect of our lives, the sector of dentistry isn't an exception. 21 Online resources have streamlined administrative responsibilities, progressed in‐person and online care, and helped make better dental practices. However, this transformation to a dependency on the internet has added new vulnerabilities, leaving dental places susceptible to cyber‐attacks. Understanding the motivations and outcomes of such attacks is necessary for safeguarding sensitive patient data and maintaining the integrity of dental practices. 22
In the modern digital age, cybersecurity breaches pose significant threats to educational institutions, including dental schools. Dental schools must prioritize employee education and awareness programs to inform staff members about cybersecurity standards and potential risks. 23 Protecting sensitive data and maintaining the integrity of institutional systems are paramount. To effectively mitigate these risks, dental schools can implement several strategic measures. A comprehensive cybersecurity framework is the cornerstone of an effective defense against cyber threats. This framework should encompass regular security assessments to identify vulnerabilities, deploying intrusion detection systems to monitor and respond to suspicious activities, and implementing updated antivirus software to protect against malware. 24 These elements collectively form a strong barrier against potential breaches, ensuring the institution is well‐prepared to counteract cyber threats.
Regular education about vigilance and identifying threats for the dental school community is another critical component in the fight against cyber threats. Faculty, staff, and students must be regularly trained on cybersecurity best practices to prevent phishing attacks and other common threats (Table 1). Perhaps it can be incorporated into other mandatory training like compliance and infection control. Experts emphasize the importance of continuous training sessions, which enhance the overall awareness and preparedness of the dental school community. 25 Institutions can significantly reduce the likelihood of successful cyber attacks by fostering a culture of vigilance and informed behavior.
TABLE 1.
Employee training and awareness.
| Type of training | Outcomes |
|---|---|
| Phishing Awareness | Educating staff on recognizing phishing attempts, which are common entry points for cyberattacks |
| Safe Browsing Practices | Training on avoiding unsafe websites and downloads that could introduce malware |
| Security Protocols Compliance | Ensuring staff understand and comply with the organization's cybersecurity policies, including password management and secure data handling |
Encrypting sensitive data and maintaining a regular backup protocol is essential to mitigate the damage caused by cybersecurity breaches. Encryption ensures that without the decryption key, the intercepted data remains unreadable. Regular backups, stored offsite and in secure locations, guarantee that data can be restored in the event of an attack. These measures safeguard institutional data and ensure continuity of operations. 26
Implementing multi‐factor authentication (MFA) for access to sensitive systems adds an additional layer of security beyond traditional passwords. MFA requires users to provide several forms of verification (for example a temporary code sent to their mobile device or on an application after entering their password). This approach significantly reduces the risk of unauthorized access, as it is much harder for attackers to compromise multiple authentication factors simultaneously. 27
Developing and timely updating of an incident response plan is crucial for ensuring a swift and effective reaction to cybersecurity breaches. An incident response plan should outline clear communication strategies, data recovery processes, and specific roles and responsibilities for handling an attack. A technical report by Killcrece and colleagues stresses the importance of such a plan in minimizing the impact of breaches and facilitating a coordinated response that can quickly restore normal operations. 28
Partnering with cybersecurity experts and firms provides dental schools with advanced protection and insights into emerging threats. It may become standard practice to have one or more cybersecurity experts on the dental informatics team, and regular third‐party audits can help identify potential vulnerabilities and recommend effective countermeasures. Based on existing evidence, we also recommend collaboration in maintaining robust defenses and staying ahead of evolving cyber threats. 29
Regular security audits and assessments are fundamental to identifying and addressing vulnerabilities within any healthcare provider's practice. 30 These audits should encompass various activities listed in Table 2. Protecting the confidentiality and integrity of data is crucial in healthcare settings. 31 , 32 Key measures include Encryption (Data cannot be read without the decryption key) and Access Controls (MFA and ensuring that access to data is based on the principle of least privilege).
TABLE 2.
Security audits and assessments.
| Type of audit | Assessment |
|---|---|
| Penetration Testing | This involves simulating cyberattacks to evaluate the security posture of systems and identify exploitable weaknesses. |
| Vulnerability Scanning | Automated tools can scan networks and systems for known vulnerabilities, ensuring that these are addressed promptly. |
| Access Controls Review | This includes reviewing and refining user permissions to ensure that only authorized individuals have access to sensitive data and systems. |
| Data Handling Practices | Ensuring that data is handled in compliance with security protocols and regulatory requirements |
Dental and medical devices are especially vulnerable to cyberattacks as they are often connected to the network in practice and lack robust security measures. 32 Measures to minimize risks are provided in Table 3. 33
TABLE 3.
Measures to minimize risks.
| Measures | Description |
|---|---|
| Regular Updates and Patching | Ensuring that all devices and systems are regularly updated with the latest security patches |
| Network Segmentation | Dividing the network into segments to limit the spread of malware and restrict access to sensitive data |
| Device Authentication | Implementing strict authentication measures for devices accessing the network |
Compliance with healthcare‐specific regulations and cybersecurity frameworks is crucial for maintaining high‐security standards, patient confidentiality, and compliance with privacy regulations such as the Health Insurance Portability and Accountability Act in the United States or the General Data Protection Regulation in Europe. 34 , 35
5. CONCLUSIONS
In conclusion, cyber‐attacks are a grave threat to the security of dental schools. The potential impact of cybersecurity attacks on dental school activities is profound, affecting clinical operations, educational continuity, and stakeholder trust. By understanding the immediate and long‐term implications, university‐based dental schools in the United States can implement effective prevention and mitigation strategies. Robust cybersecurity measures, regular training, and an agile response plan are essential to safeguard these institutions against future threats.
ACKNOWLEDGMENTS
The authors have nothing to report.
Nalliah RP, Praveen S, Allareddy TV, et al. Cybersecurity threats and preparedness: Implications for dental schools. J Dent Educ. 2025;89:523–528. 10.1002/jdd.13758
REFERENCES
- 1. University of Michigan Public Affairs . “August 2023 data incident.” Accessed July 7, 2024. Available from: https://publicaffairs.vpcomm.umich.edu/key‐issues/august‐2023‐data‐incident/
- 2. Wimmer D. Memo from Michigan Department of the Attorney General. “AG Nessel re‐issues data breach alert following University of Michigan Network infiltration.” 2023. Accessed June 7, 2024. Available from: https://www.michigan.gov/ag/news/press‐releases/2023/10/24/ag‐nessel‐reissues‐data‐breach‐alert‐following‐university‐of‐michigan‐network‐infiltration
- 3. Newman LH. A ransomware attack has struck a major US hospital chain. 2020. Accessed June 7, 2024. Available from: https://www.wired.com/story/universal‐health‐services‐ransomware‐attack/
- 4. Davis J. UHS ransomware attack cost $67M in lost revenue, recovery efforts. 2021. Accessed June 7, 2024. Available from: https://healthitsecurity.com/news/uhs‐ransomware‐attack‐cost‐67‐million‐in‐recovery‐lost‐revenue
- 5. Zitzmann NU, Matthisson L, Ohla H, Joda T. Digital undergraduate education in dentistry: a systematic review. Int J Environ Res Public Health. 2020;17(9): 3269. 10.3390/ijerph17093269 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 6. Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Health Care. 2017;25(1): 1‐10. 10.3233/THC-161263 [DOI] [PubMed] [Google Scholar]
- 7. Askarifar S, Rahman NAA, Osman H. A review of latest wannacry ransomware: actions and preventions. J Eng Sci Technol. 2018;13: 24‐33. [Google Scholar]
- 8. Safi A, Singh S. A systematic literature review on phishing website detection techniques. J King Saud Univ. 2023;35(2): 590‐611. [Google Scholar]
- 9. de Neira AB, Kantarci B, Nogueira M. Distributed denial of service attack prediction: challenges, open issues and opportunities. Comp Netw. 2023;222: 109553. [Google Scholar]
- 10. Javaid M, Haleem A, Singh RP, Suman R. Towards insighting cybersecurity for healthcare domains: a comprehensive review of recent practices and trends. Cyber Security Appl. 2023;1: 100016. [Google Scholar]
- 11. Mejía‐Granda CM, Fernández‐Alemán JL, Carrillo‐de‐Gea JM, García‐Berná JA. Security vulnerabilities in healthcare: an analysis of medical devices and software. Med Biol Eng Comput. 2024; 62(1): 257‐273. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 12. Parvej MF, Hoque MM, Kole DK. Survey on cyber‐security for healthcare system. In: International Conference on Frontiers in Computing and Systems, Singapore, 2023: 295‐306. Springer Nature. [Google Scholar]
- 13. Ponemon Institute . “Cybersecurity in healthcare.” 2022. Accessed June 7, 2024. Available from: https://www.proofpoint.com/us/cyber‐insecurity‐in‐healthcare
- 14. Jalali MS, Kaiser JP, Siegel M, Madnick S. The growing importance of cybersecurity for universities. J Inform Security Appl. 2019;48:102362. [Google Scholar]
- 15. Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Health Care. 2017;25(1):1‐10. [DOI] [PubMed] [Google Scholar]
- 16. O'Dowd E. Healthcare data breaches cost organizations $4 billion in 2019. HealthITSecurity. 2020. Available from: https://healthitsecurity.com/news/healthcare‐data‐breaches‐cost‐organizations‐4‐billion‐in‐2019
- 17. Koppel R, Metlay JP, Cohen A, et al. Role of computerized physician order entry systems in facilitating medication errors. JAMA. 2005;293(10): 1197‐1203. [DOI] [PubMed] [Google Scholar]
- 18. Massachusetts Institute of Technology . “Cybersecurity for the education sector.” 2023. Accessed June 6, 2024. Available from: https://www.technologyreview.com/2023/05/15/1073107/cybersecurity‐for‐the‐education‐sector
- 19. Gomez MA, Shandler R. Cyber conflict and the erosion of trust. 2022. Accessed June 5, 2024. Available from: https://www.cfr.org/blog/cyber‐conflict‐and‐erosion‐trust
- 20. McLeod A, Dolezel D. Cyber‐analytics: modeling factors associated with healthcare data breaches. Decis Support Syst. 2018;108: 57‐68. [Google Scholar]
- 21. Gracco A, De Stefani A, Bruno G. Influence of new technology in dental care: a public health perspective. Int J Environ Res Public Health. 2023;20(7):5364. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 22. Schwendicke F, Krois J. Data dentistry: how data are changing clinical care and research. J Dent Res. 2022;101(1): 21‐29. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 23. Jalali MS, Russell B, Razak S, Gordon WJ. EARS to cyber incidents in health care. J Am Med Assoc Inform. 2018;26(1):81–90. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 24. Cybersecurity and Infrastructure Security Agency of the Government . “Guide to getting started with a cybersecurity risk assessment.” Accessed June 7, 2024. Available from: https://www.cisa.gov/sites/default/files/2024‐01/22_1201_safecom_guide_to_cybersecurity_risk_assessment_508.pdf
- 25. Aldawood H, Skinner G. Contemporary cyber security social engineering solutions, measures, policies, tools and applications: a critical appraisal. Int J Secur. 2019;10(1):1‐15. [Google Scholar]
- 26. Wang W, Lu Z. Cyber security in the Smart Grid: Survey and challenges. Comp Netw. 2013;57(5):1344‐1371. [Google Scholar]
- 27. Das S, Wang B, Tingle Z, Camp LJ. Evaluating user perception of multi‐factor authentication: a systematic review. 2019. Accessed September 23, 2024. doi: 10.48550/arxiv.1908.05901 [DOI]
- 28. Killcrece G, Kossakowski K, Ruefle R, Zajicek M. State of the practice of computer security incident response teams (CSIRTs). (Technical Report CMU/SEI‐2003‐TR‐001). 2003. 10.1184/R1/6584396.v1 [DOI]
- 29. Knapp KJ, Ferrante CJ. Policy awareness, enforcement and maintenance: critical to information security effectiveness in organizations. J Manag Policy Pract. 2012;13:66‐80. [Google Scholar]
- 30. National Institute of Standards and Technology . NIST SP 800‐115: Technical Guide to Information Security Testing and Assessment. CreateSpace Independent Publishing Platform; 2008. [Google Scholar]
- 31. Scarfone K, Souppaya M, Sexton M. Guide to Storage Encryption Technologies for End User Devices. National Institute of Standards and Technology; 2007. 10.6028/NIST.SP.800-111 [DOI] [Google Scholar]
- 32. Healthcare Information and Management Systems Society (HIMSS) . “Encryption in Healthcare: What You Need to Know.” Available from: https://www.HIMSS.org
- 33. Cartwright AJ. The elephant in the room: cybersecurity in healthcare. J Clin Monit Comput. 2023;37(5):1123‐1132. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 34.U.S. Department of Health & Human Services. Guidance regarding methods for de‐identification of protected health information in accordance with the Health Insurance Portability and Accountability Act (HIPAA) privacy rule. 2020. Available from: https://www.hhs.gov/hipaa/for‐professionals/privacy/special‐topics/de‐identification/index.html
- 35. Office for Civil Rights (OCR) . “Summary of the HIPAA Privacy Rule.” U.S. Department of Health & Human Services. 2013. Available from: https://www.hhs.gov/hipaa/for‐professionals/privacy/laws‐regulations/index.html
