An Examination of Threats and Countermeasures Relating To Healthcare Cyber Risks: The Case of Kenyatta National Hospital
An Examination of Threats and Countermeasures Relating To Healthcare Cyber Risks: The Case of Kenyatta National Hospital
An Examination of Threats and Countermeasures Relating To Healthcare Cyber Risks: The Case of Kenyatta National Hospital
Turner (2018) asserts that while the Internet has made the and result in physical injury to patients. Strong cyber security
world smaller, it has also made us more aware of viewpoints measures are unquestionably necessary for healthcare
that were previously less varied and challenging. Hacking has companies to preserve the quality of patient care, protect
also quickly gained traction among cybercriminals and patient confidentiality, and preserve the integrity of their
evolved at a similar pace to security. Seemma, Nandhini, and systems (Seemma, Nandhini & Sowamiya, 2018).
Sowamiya (2018) contended that there are many
contradictions and ambiguities surrounding the idea of According to Kahyaogl and Caliyurt (2018), digital
security, which can be understood as a process rather than an technology is becoming more and more important in
end in and of itself. It is the process of maintaining a suitable healthcare, which has enhanced patient care, decreased
level of risk, and an organization cannot be considered safe at expenses, and boosted efficiency. But this reliance on
any point after the most recent confirmation that it is technology has also left healthcare providers open to
complying with its security plan (Rosenzweig, 2013). cyberattacks, which can have serious negative effects on their
finances, legal standing, and reputation in addition to perhaps
Hardware, software, and data that are enabled by the jeopardizing the health and safety of their patients.
internet have taken on the responsibility of protecting cyber
security from cyber-attacks. Cybersecurity is a branch of Kenya, like many other nations, has a lot of cybersecurity
security that aims to ensure data availability, confidentiality, challenges. Organizations in the public and commercial
and integrity (Rohrer & Hom, 2017). Accordingly, McKenna sectors are finding it difficult to stay up to date with the
(2017) agreed that cyberspace is the environment in which changing threat landscape as a result of the increasing
communication over networks of computers takes place, and frequency and sophistication of cyberattacks. The government
that the vast majority of people on the planet are connected to has improved cybersecurity in the nation by taking a number
and interact with every aspect of society, including the of actions. To operate as the primary point of contact for
government, courts, legislators, law enforcement, police cybersecurity issues in the nation, the government established
stations, banks, infrastructure, healthcare, and educational the National Kenya Computer Incident Response Team
institutions in addition to schools and students. Coordination Center (National KE-CIRT/CC) in 2014. The
center is in charge of organizing countermeasures to
Due to the increasing reliance of most areas of modern cyberattacks and giving impacted organizations support and
life on digital networks, cybercrime is becoming a greater information (Renatta, 2020).
threat to both individuals and enterprises. As a result, there is
an annual growth in the amount of data collected and kept At 1800 beds spread across 50 wards, Kenyatta National
electronically, which provides hackers with greater and greater Hospital (KNH) is the largest teaching and referral hospital in
motivation. Increased reliance on online platforms like social East and Central Africa. It also boasts 24 theaters, 22
media, e-commerce, and online banking greatly increases the outpatient clinics, and a sizable ER. It serves 70,000 inpatients
potential entry point into related technical networks, which and 520,000 outpatients annually on average with 4,600 staff
promotes an exponential increase in theft, bribery, and members. It was founded in 1901, and in 1987 it gained some
information fraud. According to GyunNo and Vasarhelyi degree of autonomy as a state corporation. The hospital has its
(2017), cyber security is the protection of systems, networks, own management, as well as medical and support personnel,
and technologies through the use of technology, policies, and and is overseen by a Board of Directors. According to the
processes. It is crucial to remember that information security 2018 Kenyatta National Hospital (KNH) annual report and
and information assurance should be considered when financial statement, the hospital is to be used as a teaching
conceptualizing cyber security. institution by the University of Nairobi under a Memorandum
of Understanding (MoU).
Renatta (2020) states that the idea of cyber security has
drawn interest from all societal stakeholders worldwide. The It was a major role in the regional health sector when it
United States has integrated electronic systems into its was founded in 1901. "To be a world class hospital in the
healthcare delivery system as a result of technological provision of innovative and specialized healthcare," states its
advancements. Patients now receive higher-quality care thanks mission. As stated in its mandate, it is essential to the
to the usage of electronic health records, telemedicine, and healthcare delivery systems in the nation, East Africa, and
other technical innovations. However, as technology has other African countries (Willis, 2015). Referral cases for
become more integrated, cyber threats to healthcare systems specialized healthcare are received by the hospital from both
have increased, raising the risk of data breaches, sensitive domestic and international sources, thanks to its very efficient
information loss, and patient injury. and successful referral system.
Cybersecurity lapses in healthcare systems may result in Alongside hospital specialists, the teaching staff is
the loss of private patient information, interruptions of medical responsible for referrals and consultations under that
care, monetary losses, and harm to the standing of healthcare memorandum of understanding. As the nation's premier
institutions. Cyberattacks can also jeopardize patient safety referral hospital, it accepts patients from all regions of the
nation; however, the second national referral hospital, located This astounding rise has been attributed to developments
in Eldoret, almost 400 kilometers northwest of Nairobi, serves like the deregulation of markets in the African
the provinces of North Rift, Nyanza, and Western. telecommunications sector, the increased diversity of mobile
Additionally, KNH sees patients from abroad. telecommunications technology, and the increasing prevalence
of broadband bandwidth (Global System for Mobile
Individuals who believe they will receive the greatest Communications Association, 2013). This trend is anticipated
care due to the highest concentration of physicians and to continue in the future (Global System for Mobile
medical specialists as well as the availability of amenities not Communications Association, 2016). However, worries
present in lower-level health facilities are also admitted there; regarding the need to bolster cyber security laws and cyber
these individuals are not referred by other hospitals or integrity across the continent have been raised by the spread of
physicians. As a result, KNH sees so many patients that it is ICTs and Internet usage in Africa. Network and computer
unable to accommodate them all. It takes seven to nine hours system security is a technological consideration. The
on average for a patient who arrives at the casualty/emergency organizational viewpoint is concentrated on creating
unit to be admitted to the Private Wing. Patients passing away institutional capacity to support cyber security, including the
in the waiting room before receiving medical care is not formation of Computer Emergency Response Teams (CERTs)
shocking (Kenyatta National Hospital (KNH) strategic plan, and law enforcement institutions. Policies include laws that
2018–2023). prohibit actions that compromise data availability, integrity,
and protection as well as initiatives to promote international
Kenyatta National Hospital has six thousand workers. collaboration (Gercke, 2016).
The private wing has 209 bedrooms, out of a total of 1800
beds (Abdulla, 1985). Every day, Kenyatta National Hospital Healthcare institutions are scrambling to put in place the
sees between 2000 and 3000 patients. 1157 healthcare appropriate safeguards to protect their patients' data from
professionals work in the hospital, comprising 100 physicians, unauthorized access since the need to protect private
800 nurses, 130 pharmacists, 70 LT, 50 CO, and 5 dentists. information has become critical, particularly for
Two accountants serve in the administrative division (Willis, cybercriminals eyeing the data of medical patients. This is
2015). because there are several examples of cybercrimes in the
healthcare sector that have resulted in unheard-of losses and
Schlosberg (2021) defines cyber-security as a set of harm to reputations. Perhaps the biggest referral hospital in
procedures for protecting computer-related technologies, East Africa, Kenyatta National Hospital manages a lot of data
documents, and systems against unauthorized access, for its patients. There is no denying the necessity of a complex
modification, and destruction by employing tactics that either and efficient cyber security architecture. This is to stop data
lessen the effects of cybercrime or eventually eradicate it breaches, which are incredibly profitable for fraudsters.
completely. Undoubtedly, cybercrimes directed towards the
healthcare industry are on the rise. Numerous hospital records II. METHODOLOGY
are pilfered by hacking, ransomware, and insider threats,
among other techniques (Williams & Woodward, 2015). The present research adopted the use of a mixed method
research approach which brings out the mathematical
Africa has seen an exponential increase in internet inferences like percentages, means, and others as well as the
penetration and ICT affordances since the turn of the twenty- lived experiences of the respondents at the Kenyatta National
first century. Saaleh (2022) reports that Internet usage has Hospital. Furthermore, by using a mixed method, the
increased dramatically in Africa. Over 570 million people on researcher was able to incorporate in-depth interviews, a
the continent used the internet in 2022—a number that had quantitative survey, and both qualitative and quantitative data
more than doubled since 2015. Nigeria, the most populous collection techniques. "Drawing together multiple types of
nation in Africa, has the highest proportion of users. This adds evidence gathered from different sources using different
up to more than 100 million overall, of which 76 million are in methods of data collection" is how Barker (1999) describes a
Egypt and 41 million are in South Africa. Internet connectivity mixed approach (p. 483). Mixed methods improve the
has expanded across Africa in recent years due to "validity of research and its findings," as noted by Ezzy (2013)
advancements in telecommunications architecture and a (p. 38). The population for this study consisted of 6000
growing rate of smartphone usage. As a result of increased employee at Kenyatta National Hospital and a sample of 384
internet connectivity, digital operations and services such as employees were interviewed. A questionnaire was used for
social networking sites, e-commerce, and mobile banking have data collection. Both descriptive and inferential statistics was
grown in popularity. Yet, the continent has not yet fully applied for the research. Ethical approval was done by the
realized its digital capabilities. Despite the growing number of department of library science of the Kenya Methodist
users, the internet penetration rate was approximately 43 University as well as the National Commission for Science
percent. Technology and Innovation (NACOSTI) which is mandated
with the responsibility of protecting human subjects in
research will be sought. All respondents who voluntarily
accepted to participate were informed of the reason for not handle patient data, suggesting their roles are less directly
conducting this research before being given the questionnaire involved with confidential information. Awareness of
to fill. All participants were also debriefed about the purposes cybersecurity policies is notably high, with 85% of
for the research and the benefits accruing thereof. The debrief respondents reporting that their hospital has established such
form contained information regarding confidentiality and the policies, demonstrating a commitment to formal cybersecurity
anonymity of the participants. measures. However, 12% are unsure whether their hospital has
these policies, indicating a potential gap in communication
III. RESULTS regarding the existence and importance of cybersecurity
protocols.
Demography
The study achieved a high response rate of 94.8%, with Impact of Kenya's Cybercrime Act on the Patient-
365 completed questionnaires out of 370 distributed. Healthcare System
Respondents spanned a diverse age range, with the largest A substantial majority of respondents (74%)
group being 41-50 years old (30%), followed by those aged demonstrated a strong awareness of computer security issues,
51-60 years (25%) and 31-40 years (23%). The youngest age knowing when their computers are hacked or infected and
group (21-30 years) accounted for 10%, while 12% were 61 whom to contact. This high level of preparedness indicates
years and older. In terms of gender distribution, 58% of effective training and awareness programs. However, 12% of
respondents were male (210 individuals) and 42% were female respondents knew how to report a hack but lacked recognition
(155 individuals). Educational backgrounds varied, with 47% skills, and 10% had partial understanding, while a small group
holding a Bachelor’s degree, 24% having vocational training, (4%) had neither awareness nor knowledge of response
21% possessing a Master’s degree, 6% having secondary procedures, highlighting a need for further education and
education, and 3% with a PhD. Respondents' positions within readiness enhancement.
their organizations were also diverse: nurses represented the
largest group at 33%, followed by doctors at 18%, Regarding virus or trojan infections, 79% of respondents
administrative personnel at 17%, auxiliary personnel at 13%, reported that their computers had never been infected,
lab personnel at 10%, technical personnel at 7%, and other suggesting robust security measures. However, 8%
roles at 3%. This demographic distribution provides a experienced malware infections, and 12% lacked basic
comprehensive view of the study's participants, highlighting understanding of malware, emphasizing the need for improved
their varied backgrounds and roles within the healthcare training on basic cyber security concepts. In terms of anti-
system. virus software, 78% of respondents had it installed, reflecting
a commitment to maintaining computer security. Yet, 15% did
Threats and Counter Measures in Healthcare Cyber Risk not have anti-virus software, and 7% were unaware of its
The study on cybersecurity and data protection at status, indicating gaps in essential security measures and the
Kenyatta National Hospital reveals several crucial insights need for better communication.
into the hospital’s approach to managing cyber risks. A
significant majority of respondents (89%) confirmed that their When handling email attachments, 63% of respondents
organizations have either a dedicated cybersecurity department consistently ensured attachments were from known and
or utilize external cybersecurity services, indicating a strong expected sources, showing a cautious approach. However,
commitment to safeguarding digital assets. However, 10% 27% opened attachments from known sources without full
reported the absence of such resources, and 1% were unsure, scrutiny, and 10% exhibited less caution, revealing varying
suggesting potential vulnerabilities and gaps in cybersecurity levels of vigilance and a need for standardized procedures.
strategies. In terms of computer usage, 88% of respondents Awareness of social engineering attacks was low, with only
indicated that they work on computers regularly, reflecting the 18% of respondents understanding these threats. The majority
essential role of digital technology in their professional tasks. (82%) lacked knowledge about social engineering, indicating a
On the other hand, 12% do not use computers, which may be critical area for increased education. Regarding email scams,
indicative of varying job functions within the hospital. 29% of respondents knew what an email scam is and how to
identify one, while 21% understood what scams are but lacked
Regarding data protection training, a substantial 70% of identification skills. Over half (51%) were unfamiliar with
respondents have not received training on the General Data email scams, highlighting a significant knowledge gap that
Protection Regulation (GDPR), highlighting a significant gap needs addressing. Lastly, 85% of respondents believed their
in critical knowledge that could increase vulnerability to data computers were not valuable to hackers, reflecting a general
breaches and regulatory non-compliance. Conversely, 30% of sense of security. However, 15% recognized potential risks,
respondents have received GDPR training, pointing to some suggesting that while most felt secure, there is a need for
level of awareness but also emphasizing the need for broader ongoing education and awareness about the potential threats to
education. The study also found that 75% of respondents have ensure comprehensive cyber security.
access to sensitive patient data, underscoring the importance
of stringent data protection measures. The remaining 25% do