Increasing Healthcare Cybersecurity Risks

As healthcare professionals and the organisations they work in become more connected through the use of IoT devices and BYOD strategies, then they must ensure that potential healthcare cybersecurity risks remain a top consideration.  

Failing to account for one endpoint device or having one employee click on a phishing scam email could lead to a large-scale data breach that causes headaches for both providers and patients.

In terms of healthcare cyber-security measures, employee education and comprehensive data security plans are increasingly being touted as key approaches for organisations to take.

At a recent cyber-security forum where Boston Children’s Hospital Senior Vice President and CIO Daniel Nigrin, M.D. discussed the cyber-security attack that happened at the hospital in 2014.

In that incident, Anonymous hackers posted certain BCH external website details that were not extremely sensitive, such as its IP address and web server infrastructure information.

While the hospital’s patient data was ever accessed, Boston Children’s had to shut down some of its Web pages and some patients and medical personnel were unable to access online accounts.

At the forum, Nigrin noted the importance of healthcare organisations implementing the necessary counter-measures, knowing which systems depend on internet access, and have contingency plans in place.

Furthermore, he said that entities must recognise how important email is to the organisation, and that alternate methods of communication should potentially be created.

Finally, security measures must be pushed through. There are no excuses, Nigrin stressed. For example, secure tele-conferences could be beneficial and organisations should make sure they know which threats are real.
Intermountain Healthcare CISO and Assistant Vice President of Information Systems Karl West also spoke at the forum, explaining that the demand for data access whenever and wherever has “increased productivity, but, at the same time, has elevated risk.”

Employees, contractors, and customers all pose the largest cybersecurity threat, he added, but education will be the best defense.

In a 2016 interview with HealthITSecurity.com, Robert Anderson, former executive assistant director of the FBI, also stressed the importance of employee education and proactive planning. Cyber-security measures must improve, he stated, especially when it comes to ransomware preparation.

Healthcare employees at all levels must be thoroughly educated on ransomware and how they need to react should an incident happen, Anderson explained. A proactive plan for what should happen after a ransomware attack must also be in place.

“The heads of the hospitals and the boards need to be educated on the different types of threats that face them in today’s IT and cyber environment,” Anderson stated.

“Most hospitals concentrate on being a hospital and taking care of people. But I think that in today’s world, if you’re running one of those institutions, you need to be very educated into exactly what the threats could be and have a proactive plan of what’s going to happen if you do get attacked.”

Insurance companies are also taking note of the increase in cyber-security risks across numerous industries.

Cyber-security is one of the top board level priorities among insurers, according to a recent Moody's Investors Service report. Specifically, companies have greatly expanded their cyber-security governance, oversight, and investments. There are also more frequent and formalised cybersecurity reporting to executive management and their boards.

“Among survey respondents, essentially all maintain incident response plans for multiple cyber intrusion scenarios, and most insurers test their vulnerability to these annually," Moody Senior Vice President Alan Murray said in a statement.

“Cyber-attacks can have serious tangible consequences for insurers, exposing them to legal actions, regulatory scrutiny, fines and other expenses. In addition, an insurer's reputation is at stake."
The survey also found that cyber-security employment has increased nearly 30 percent over the past three years. Insurers have also widely upped their use of out-sourcing for cost-effective, current tools and expertise in securing systems and data.

HealthITSecurity:

Healthcare Starts Spending Big On Cybersecurity:

Stolen Health Records Flooding Dark Web Markets:

British NHS Hospital Trust Under Cyber Attack:

 

« US Has A Secret Cyberwar Going Against North Korea
CIA Silent About Wikileaks Agency Files »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

Envieta

Envieta

Envieta is a leader in cryptographic solutions. From server to sensor, we design and implement powerful security into new or existing infrastructure.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.