Healthcare Security Should Use More Sophisticated Tools

Information Technology staff for hospitals and other healthcare providers must regularly give their cybersecurity practices thorough reviews to keep them abreast of the latest security challenges.

In its annual study on privacy and security of healthcare data, Ponemon Institute reported that almost 90 percent of healthcare organisations have been breached. Potentially more alarming is that the average cost of each data breach for a healthcare provider is $2.2 million.

In 2018, most industry observers predict that cyberattacks will become increasingly sophisticated, more pervasive and costlier. Underscoring this point is a recent Deloitte survey of 370 medical device professionals, which found that more than a third had experienced a cybersecurity incident in the last 12 months, and that the regularity of such incidents is expected to increase.

The harsh truth is that healthcare organisations and their third parties are lucrative targets for cyber attackers because of the wealth of sensitive patient data they manage and the relative ease of infiltrating their networks.

Several factors can increase a healthcare providers’ vulnerability. Medical devices with IoT capabilities, for example, make the task of implementing traditional network security monitoring much more difficult because of transient connectivity.

Additionally, electronic access to medical records increases patient satisfaction but poses an additional network security risk. Even so, healthcare IT teams are often limited by budget and resources and frequently lack the tools necessary to combat today’s modern attacker.

The answer is increasing network security, not reducing deployments of IoT medical devices or limiting access to essential healthcare IT tools. To do this successfully, healthcare IT teams will require new and advanced tools in their arsenal that not only defend the network perimeter, but also increase their ability to proactively detect and respond to in-network threats efficiently and effectively.

Provider organisations also need to use more technology tools, both to defend networks, and confuse and thwart attackers.

One category of active defense technology gaining increased adoption among healthcare providers is deception technology, an emerging category of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage.

Deception technology is a powerful tool that can help secure company assets, safeguard patient data and transform the network into an environment where the attacker cannot determine what is real and what is fake.

These traps and lures detect lateral movement, credential theft, ransomware and Active Directory reconnaissance, ultimately revealing an attacker’s activities as they try to scan systems or attempt to download malware onto medical devices.

In addition, deception saves time for IT teams by automating routine security tasks, enabling smaller teams to accomplish more without sacrificing security. Deception-based threat detection solutions vary widely based on comprehensiveness, authenticity, attack analysis and ability to improve incident response.

Platforms that combine network and end-point detection to create the highest efficacy of early detection coverage of advanced threats have proven to be the most effective in the healthcare providers’ network. With these solutions, deception is placed at both the end-point and inside the network.

These platforms efficiently detect threats across all vectors including stolen credentials, “Man-in-the-Middle,” ransomware, phishing and insider threats that often evade traditional perimeter-based systems.

They also ensure authenticity by misdirecting attackers and creating deceptions that provide advanced luring techniques based on the use of real operating systems, golden images for decoys and customized endpoint credentials designed to draw in attackers.

One recent example of applying new technologies to the medical and healthcare industries to enhance cybersecurity of medical technology and devices is a multi-faceted initiative led by Becton, Dickinson, (BD) one of the world’s largest healthcare, safety and technology organisations.

BD has launched a cybersecurity vendor certification program to verify third-party security technologies for compatibility and performance levels and to conduct extensive tests to ensure reliable threat detection is achievable.

One of the key deliverables from this program is the creation of "mirror-match decoy authenticity" software for some of BD's devices, a method designed to redirect an attack from reaching important information or networks.

BD’s program is an important step toward helping hospitals and healthcare providers employ safeguards around their network structure to minimise risks.

It exemplifies just one of the many strategies that healthcare industry info security teams should be evaluating, along with increased network segmentation, vulnerability management and user behavioral analytics.

Information-Management:

You Might Also Read: 

One A Day: Healthcare Breaches Are A Daily Event:

NHS Trusts Failed Cyber Security Assessment:

« Staying One Step Ahead Of The Cyber Spies
DARPA Wants AI To Reveal Adversaries' True Intentions »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.

Scamnetic

Scamnetic

Scamnetic offer an everyday application that helps consumers detect every type of scam in real time – removing human error from the equation.