Healthcare Security Should Use More Sophisticated Tools

Information Technology staff for hospitals and other healthcare providers must regularly give their cybersecurity practices thorough reviews to keep them abreast of the latest security challenges.

In its annual study on privacy and security of healthcare data, Ponemon Institute reported that almost 90 percent of healthcare organisations have been breached. Potentially more alarming is that the average cost of each data breach for a healthcare provider is $2.2 million.

In 2018, most industry observers predict that cyberattacks will become increasingly sophisticated, more pervasive and costlier. Underscoring this point is a recent Deloitte survey of 370 medical device professionals, which found that more than a third had experienced a cybersecurity incident in the last 12 months, and that the regularity of such incidents is expected to increase.

The harsh truth is that healthcare organisations and their third parties are lucrative targets for cyber attackers because of the wealth of sensitive patient data they manage and the relative ease of infiltrating their networks.

Several factors can increase a healthcare providers’ vulnerability. Medical devices with IoT capabilities, for example, make the task of implementing traditional network security monitoring much more difficult because of transient connectivity.

Additionally, electronic access to medical records increases patient satisfaction but poses an additional network security risk. Even so, healthcare IT teams are often limited by budget and resources and frequently lack the tools necessary to combat today’s modern attacker.

The answer is increasing network security, not reducing deployments of IoT medical devices or limiting access to essential healthcare IT tools. To do this successfully, healthcare IT teams will require new and advanced tools in their arsenal that not only defend the network perimeter, but also increase their ability to proactively detect and respond to in-network threats efficiently and effectively.

Provider organisations also need to use more technology tools, both to defend networks, and confuse and thwart attackers.

One category of active defense technology gaining increased adoption among healthcare providers is deception technology, an emerging category of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage.

Deception technology is a powerful tool that can help secure company assets, safeguard patient data and transform the network into an environment where the attacker cannot determine what is real and what is fake.

These traps and lures detect lateral movement, credential theft, ransomware and Active Directory reconnaissance, ultimately revealing an attacker’s activities as they try to scan systems or attempt to download malware onto medical devices.

In addition, deception saves time for IT teams by automating routine security tasks, enabling smaller teams to accomplish more without sacrificing security. Deception-based threat detection solutions vary widely based on comprehensiveness, authenticity, attack analysis and ability to improve incident response.

Platforms that combine network and end-point detection to create the highest efficacy of early detection coverage of advanced threats have proven to be the most effective in the healthcare providers’ network. With these solutions, deception is placed at both the end-point and inside the network.

These platforms efficiently detect threats across all vectors including stolen credentials, “Man-in-the-Middle,” ransomware, phishing and insider threats that often evade traditional perimeter-based systems.

They also ensure authenticity by misdirecting attackers and creating deceptions that provide advanced luring techniques based on the use of real operating systems, golden images for decoys and customized endpoint credentials designed to draw in attackers.

One recent example of applying new technologies to the medical and healthcare industries to enhance cybersecurity of medical technology and devices is a multi-faceted initiative led by Becton, Dickinson, (BD) one of the world’s largest healthcare, safety and technology organisations.

BD has launched a cybersecurity vendor certification program to verify third-party security technologies for compatibility and performance levels and to conduct extensive tests to ensure reliable threat detection is achievable.

One of the key deliverables from this program is the creation of "mirror-match decoy authenticity" software for some of BD's devices, a method designed to redirect an attack from reaching important information or networks.

BD’s program is an important step toward helping hospitals and healthcare providers employ safeguards around their network structure to minimise risks.

It exemplifies just one of the many strategies that healthcare industry info security teams should be evaluating, along with increased network segmentation, vulnerability management and user behavioral analytics.

Information-Management:

You Might Also Read: 

One A Day: Healthcare Breaches Are A Daily Event:

NHS Trusts Failed Cyber Security Assessment:

« Staying One Step Ahead Of The Cyber Spies
DARPA Wants AI To Reveal Adversaries' True Intentions »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

Jiran Security

Jiran Security

Jiran Security provides data and application security solution over email, mobile device and endpoints.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

Destel

Destel

Destel is a system integrator and provider of IT services focused on Advanced Network & Security Solutions.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.