Preventing Another Wannacry

It’s been a year since the WannaCry ransomware variant crippled the UK’s National Health Service (NHS), but that was just the tip of the iceberg, the attack is said to have hit more than 300,000 computers in 150 nations.

Those who orchestrated the chaos weren’t targeting the NHS per se; rather, the healthcare service became victims of the ‘unsophisticated’ attack due to its lack of ‘basic IT security’. With surgeries cancelled, ambulances diverted and countless appointments postponed, a lot of damage was done, with a lot more unsubstantiated damage on top of it.

All of this could’ve been easily prevented had the NHS followed simple cybersecurity measures, it’s not beyond the realms of possibility that a single consultation with an ethical hacker could have exposed the vulnerability before it spread far and wide.

The Healthcare Risks
With stretched budgets, IT teams are too often short on the resource required to conduct manual patching. So, it doesn’t take long for hardware to become increasingly outdated, software to become increasingly unstable and IT training to be left by the wayside. The result is an environment where basic security practices are being forgotten.

It’s not just healthcare that is experiencing this, but it is the sector where the consequences are most life threatening. 
This lack of IT security awareness is in stark contrast with the number of technological advances we’ve witnessed in healthcare in recent years. For instance, there’s been a gradual increase in the number of connected medical devices being used.

Internet of Things-enabled trackers are making patient care easier for patients and doctors alike. However, they’re also making life easier for hackers with more entry points to exploit. Added to that, there’s been a recent trend for medical practitioners to share patient data via channels such as a Facebook, WhatsApp and even Snapchat channels that can be compromised by hackers with the right techniques. 

This is worrying news for a sector that handles some of our most private information. The price of a breach is high for medical practitioners. In fact, it’s one of the highest because of the sector’s highly regulated nature.

Figures from Ponemon Institute’s 2017 Cost of Data Breach Study ranks healthcare as the top industry when it comes to the cost of data breach per capita. Whereas the global average per capita cost of a data breach is $141, this figure rises to $380 for healthcare firms.

Prevention is Better than Cure
It’s a no-brainer that prevention is better than cure. It costs more to recover from a hack than to proactively prevent it from happening. This is both from a financial standpoint (where stolen medical records can be held at ransom) and a productivity point of view - it’s much more stressful to recover from a hack than to work at maintaining security on a day-to-day basis.  
Businesses should take a holistic approach to limiting their exposure and vulnerabilities in terms of network security. This includes ensuring all operating systems and virus definitions are kept up to date.

WannaCry made use of the EternalBlue exploit, which Microsoft patched on March 14th 2017. Note the time difference between the patch and the attack. All IT administrators want to make sure their machines are being updated, be it manually or automatically, with little delay.

The bigger challenge is that the process of patching has barely changed since 1995, meaning there can be extensive downtime for large organisations with complex networks. This leads to patching not taking place as quickly or as often as it should.

The solution lies in the industry and vendors looking at alternative methods which kill off bad processes and patch in an ongoing synchronous manner rather the current a-synchronic process involving a download to allow the patch to run and reboot machines.

It’s also important to have in place effective disaster recovery techniques such as keeping critical data backed up in a separate location, segregating data and the principle of least privilege. WannaCry operated by scrambling computer data and demanding payment of $300-$600 to restore access. If you have your data backed up, there’ll be no need for you to pay up.
WannaCry was a self-replicating virus, meaning it managed to quickly spread itself across connected computers. Storing backups in an isolated location would’ve prevented backup data from being encrypted as well. 

Next-Steps
The issue of cybersecurity goes beyond healthcare. According to the Department for Digital, Culture, Media and Sport’s Cyber Security Breaches Survey 2018, around 43% of UK businesses have experienced a cybersecurity breach in the past 12 months. 

A one-size approach will not suit all. Security processes must match the nature of your organisation. There is a need to expect the unexpected, as no one knows when the next attack will be. But you can be prepared as vulnerabilities are published regularly and WannaCry was a known problem for several months. 

This underlines the need to stay updated, be proactive with IT security and continue to learn from mistakes. It’s not a fail-safe strategy, but it is your best bet in deferring unwanted hackers. 

Infosecurity Magazine

You Might Also Read:

British Healthcare System Spends £150m Extra On Cybersecurity:

Re-Thinking The Threat Of Ransomware:

 

« An Iranian Hacker Confesses
Insurers Are Not Ready For IoT »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

SafenSoft (SnS)

SafenSoft (SnS)

SafenSoft delivers high-efficiency, low-impact proactive protection against malware, insider threats, and confidential data leakage.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

CYSEC Global

CYSEC Global

CYSEC Global is a series of summits dedicated to tackle regional cyber security challenges.