What We Do
How we do it
Oct 18, 2021
Grief Ransomware Gang Claims 41 New Victims, Targeting Manufacturers; Municipalities; & Service Companies in U.K. & Europe
Grief Operators Earned an Estimated 8.5 Million British Pounds in Four Months Key Findings: The Grief Ransomware Gang (a rebrand of the DoppelPaymer Ransomware Group) claims to have infected 41 new victims between May 27, 2021—Oct. 1, 2021 with their ransomware.Over half the companies listed on Grief’s underground leak site are based in the U.K. and Europe. The Grief Ransomware Gang appears to…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Oct 12, 2021
eSentire Launches MDR with Microsoft Azure Sentinel Extending Response Capabilities Across Entire Microsoft Security Ecosystem
Waterloo, ON – Oct. 12, 2021 -- eSentire, recognized globally as the Authority in Managed Detection and Response (MDR), today announced the expansion of its award-winning MDR services with Microsoft Azure Sentinel, as part of its integration with the complete Microsoft 365 Defender and Azure Defender product suites supporting Microsoft SIEM, endpoint, identity, email and cloud security services.…
Read More
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Apply today to partner with the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Apr 03, 2018

How to prepare for cyberattacks in the healthcare industry

By this point, you know why the healthcare industry is a growing target for cyber-attacks, what the common vulnerabilities are, and which attack types are used to infiltrate networks within this industry. In other words, you know almost everything you need to know about cybersecurity in the healthcare industry. The only thing you’re missing is perhaps the most crucial: what can you do to limit the inherent risk of attack?

Naturally, we have some recommendations - at both the technical and strategic level.

Technical recommendations

eSentire Threat Intelligence proposes the following technical recommendations that apply to the healthcare industry and beyond, including:

  1. Perform better patch management to defend against opportunistic attackers

    A popular technique among cyber-attackers is to target software that has not yet been updated to protect it from known vulnerabilities. And yet, patch management is ‘low hanging fruit’ for IT administrators, who can automate the patching of software to a certain extent using scripting tools, or more sophisticated systems that document, download, test, and administer patches from multiple software vendors.

  2. Harden externally-facing servers and replace consumer-grade routers with professional-grade routers

  3. Raise staff awareness around phishing

    Healthcare organizations tend to have a larger ratio of phishing (fraud) traffic than other industries – likely because the email addresses of healthcare professionals are less protected from the public than in other industries.

    Furthermore, healthcare personnel are more likely to open a phishing email given the high number of unpredictable emails they receive in the process of ordering drugs and equipment and collaborating with other healthcare providers.

    External research through partnerships and internal data show a high rate of ransomware delivery, often through phishing emails. Successful exploitation through exploit kits was also rampant. Malware such as Locky, Defray, pisloader, Ramnit Worm, OilRig, WannaCry, NotPetya and RIG were all found in attacks on the healthcare industry.

  4. Monitor Point-of-Sale (PoS) devices and critical servers for indicators of compromise

    A commonly-observed attack on hospitals is the hijacking of Point of Sale (PoS) devices, such as credit card readers used in payment processing. US-based provider Banner Health reported, after a breach of 3.7 million health records, that threat actors had compromised more than one of their hospital’s cafeterias for payment information.

  5. Implement 2-factor authentication, especially on critical, externally-facing services

    Two Factor Authentication (2FA) is an extra layer of security that requires not only a password and username but also something that only that user has on them, i.e. a piece of information only they should know or have on hand - such as a physical token. Where applicable, two-factor authentication should be implemented for accessing sensitive applications or remote networks to improve the assurance of user credentials.

Addressing the above problems requires a dedicated security team, particularly in the case of healthcare, where some of the flaws in cybersecurity are related to standard business practice within the organization. For instance, healthcare networks will need to remain exposed to some degree to allow information to be shared between healthcare providers, patients and third-party organizations. Medical devices will continue to depend on the outdated operating systems they were designed for and the cost of upgrading or replacing these devices will often outweigh the immediate benefit.

Strategic recommendations

To address cybersecurity issues without disrupting healthcare services, a security team is required to work through each use case and find an optimal compromise between securing data and allowing the appropriate degree of promiscuity in network traffic. Curating the cybersecurity posture of an organization is not a trivial task, particularly when the organization is both physically and technologically open to the public.

Strategic recommendations, then, include:


Implementing both these technical and strategic recommendations is the best way to start improving your cybersecurity posture. Cybercriminals won’t wait for you to be ready for them. It’s up to you to use this information to prepare your organization and protect your clients from inevitable cyber-attacks.

For more information, check out our Healthcare Threat Report.

Emily Boden
Emily Boden Content Specialist

Emily is a content specialist on the Marketing team at eSentire. Drawing on her background in journalism and social media, Emily communicates eSentire's mission with compelling and thought-provoking content.