Healthcare Security Should Use More Sophisticated Tools

Information Technology staff for hospitals and other healthcare providers must regularly give their cybersecurity practices thorough reviews to keep them abreast of the latest security challenges.

In its annual study on privacy and security of healthcare data, Ponemon Institute reported that almost 90 percent of healthcare organisations have been breached. Potentially more alarming is that the average cost of each data breach for a healthcare provider is $2.2 million.

In 2018, most industry observers predict that cyberattacks will become increasingly sophisticated, more pervasive and costlier. Underscoring this point is a recent Deloitte survey of 370 medical device professionals, which found that more than a third had experienced a cybersecurity incident in the last 12 months, and that the regularity of such incidents is expected to increase.

The harsh truth is that healthcare organisations and their third parties are lucrative targets for cyber attackers because of the wealth of sensitive patient data they manage and the relative ease of infiltrating their networks.

Several factors can increase a healthcare providers’ vulnerability. Medical devices with IoT capabilities, for example, make the task of implementing traditional network security monitoring much more difficult because of transient connectivity.

Additionally, electronic access to medical records increases patient satisfaction but poses an additional network security risk. Even so, healthcare IT teams are often limited by budget and resources and frequently lack the tools necessary to combat today’s modern attacker.

The answer is increasing network security, not reducing deployments of IoT medical devices or limiting access to essential healthcare IT tools. To do this successfully, healthcare IT teams will require new and advanced tools in their arsenal that not only defend the network perimeter, but also increase their ability to proactively detect and respond to in-network threats efficiently and effectively.

Provider organisations also need to use more technology tools, both to defend networks, and confuse and thwart attackers.

One category of active defense technology gaining increased adoption among healthcare providers is deception technology, an emerging category of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage.

Deception technology is a powerful tool that can help secure company assets, safeguard patient data and transform the network into an environment where the attacker cannot determine what is real and what is fake.

These traps and lures detect lateral movement, credential theft, ransomware and Active Directory reconnaissance, ultimately revealing an attacker’s activities as they try to scan systems or attempt to download malware onto medical devices.

In addition, deception saves time for IT teams by automating routine security tasks, enabling smaller teams to accomplish more without sacrificing security. Deception-based threat detection solutions vary widely based on comprehensiveness, authenticity, attack analysis and ability to improve incident response.

Platforms that combine network and end-point detection to create the highest efficacy of early detection coverage of advanced threats have proven to be the most effective in the healthcare providers’ network. With these solutions, deception is placed at both the end-point and inside the network.

These platforms efficiently detect threats across all vectors including stolen credentials, “Man-in-the-Middle,” ransomware, phishing and insider threats that often evade traditional perimeter-based systems.

They also ensure authenticity by misdirecting attackers and creating deceptions that provide advanced luring techniques based on the use of real operating systems, golden images for decoys and customized endpoint credentials designed to draw in attackers.

One recent example of applying new technologies to the medical and healthcare industries to enhance cybersecurity of medical technology and devices is a multi-faceted initiative led by Becton, Dickinson, (BD) one of the world’s largest healthcare, safety and technology organisations.

BD has launched a cybersecurity vendor certification program to verify third-party security technologies for compatibility and performance levels and to conduct extensive tests to ensure reliable threat detection is achievable.

One of the key deliverables from this program is the creation of "mirror-match decoy authenticity" software for some of BD's devices, a method designed to redirect an attack from reaching important information or networks.

BD’s program is an important step toward helping hospitals and healthcare providers employ safeguards around their network structure to minimise risks.

It exemplifies just one of the many strategies that healthcare industry info security teams should be evaluating, along with increased network segmentation, vulnerability management and user behavioral analytics.

Information-Management:

You Might Also Read: 

One A Day: Healthcare Breaches Are A Daily Event:

NHS Trusts Failed Cyber Security Assessment:

« Staying One Step Ahead Of The Cyber Spies
DARPA Wants AI To Reveal Adversaries' True Intentions »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

National Centre for Digital Security (CNSD) - Peru

National Centre for Digital Security (CNSD) - Peru

The National Center for Digital Security manages and supervises the operation of Digital Security in Peru in order to strengthen digital trust.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.