Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
eSentire will be a sponsor at the Seattle CyberSecurity Conference.
eSentire will be a Sponsor at the NetDiligence Cyber Risk Summit in…
eSentire will be presenting and is a Gold Sponsor at the CyberRisk…
On August 25, Scotland’s third-largest National Health Service (NHS) trust was hit by malware, again. This is the second time within just months, after being one of the worst-affected during the global WannaCry ransomware attack in May. As a result, the trust is (again) requesting that patients do not attend the hospital unless it is “essential.”
The virus – which was later announced to be ransomware – began on a Friday afternoon with IT experiencing difficulties that affected hospitals and GP practices. The trust is responsible for the care of more than 650,000 people living in North and South Lanarkshire in Scotland, including three general hospitals and numerous GP surgeries, dentists, pharmacists and other services.
“When it comes to finding out which networks are vulnerable to attack, media coverage is one of the best sources.”
In some ways, this second attack is not surprising. After cybercriminals were successful in their attacks on the NHS with WannaCry, it makes sense that they would want to try again. Of course, that’s not to say that these are the same attackers. When it comes to finding out which networks are vulnerable to attack, media coverage is one of the best sources. Cybercriminals that heard about WannaCry’s success against NHS in the news could have decided to pursue them again.
The healthcare industry faces two major threats: ransomware and fraud. While fraud is a much bigger threat to tackle—seeing as it’s not as widespread or financially impactful—ransomware is getting more attention from regulatory bodies because of the larger impact it can have on the economy. And yet, the healthcare industry does not face the same stringent cybersecurity regulations that other industries do, which can put them at a disadvantage.
“While businesses may experience a loss of revenue if they are breached, hospitals can experience a loss of life.”
That’s not to say that hospitals aren’t sometimes an attractive target. Many of them were built and developed without cybersecurity in mind, and have been unable to adapt quickly enough to a changing security landscape, despite the fact that they have become completely Internet-connected infrastructures. Furthermore, if the primary delivery method of these threats is phishing and nearly every employee has access to the same confidential data—without sufficient security awareness training, it’s not surprising cybercriminals can break in.
Of course, the consequences hospitals face under cyberattack are particularly devastating. While businesses may experience a loss of revenue if they are breached, hospitals can experience a loss of life. Unfortunately, improving cybersecurity practices within the healthcare industry isn’t that simple. It’s important to recognize that hospitals run a 24x7 operation, which can make it harder for their IT teams to implement a policy around patching and software updates. They’re also publicly funded in the UK, which means they may feel they don’t have the resources they need to develop their cybersecurity department.
Nonetheless, there is much that hospitals can and should be doing. A report by the NHS Digital’s head of security was recently leaked, which stated there was a “false sense of security” among staff over cyberthreats. The report highlighted a range of security failings and found that:
With hospitals, the focus on cybersecurity has to come from the top. It is a holistic problem that requires holistic solutions. If a hospital doesn’t already have a CISO, appointing one should be the top priority. These individuals can define and develop risk mitigation strategies, and be an advocate for cybersecurity to the board of directors.
Fortunately, this is what is happening for the NHS. The Labour party has told Jeremy Hunt, Health Secretary, to take “urgent” action to prevent another devastating cyberattack on the NHS, including ensuring passwords are strengthened, data protections are tightened, and a full, independent inquiry is launched into the WannaCry attack.[1] The NHS is learning first hand from this experience not to mess with inadequate cybersecurity practices, and so should you.
Learn more
Today’s cyber-attackers are increasingly innovating and the threat landscape is constantly changing. Many healthcare organizations lack the resources and security measures needed to protect themselves.
[1]https://ca.news.yahoo.com/labour-calls-jeremy-hunt-apos-204955746.html
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.