Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
By this point, you know why the healthcare industry is a growing target for cyber-attacks, what the common vulnerabilities are, and which attack types are used to infiltrate networks within this industry. In other words, you know almost everything you need to know about cybersecurity in the healthcare industry. The only thing you’re missing is perhaps the most crucial: what can you do to limit the inherent risk of attack?
Naturally, we have some recommendations - at both the technical and strategic level.
eSentire Threat Intelligence proposes the following technical recommendations that apply to the healthcare industry and beyond, including:
A popular technique among cyber-attackers is to target software that has not yet been updated to protect it from known vulnerabilities. And yet, patch management is ‘low hanging fruit’ for IT administrators, who can automate the patching of software to a certain extent using scripting tools, or more sophisticated systems that document, download, test, and administer patches from multiple software vendors.
Healthcare organizations tend to have a larger ratio of phishing (fraud) traffic than other industries – likely because the email addresses of healthcare professionals are less protected from the public than in other industries.
Furthermore, healthcare personnel are more likely to open a phishing email given the high number of unpredictable emails they receive in the process of ordering drugs and equipment and collaborating with other healthcare providers.
External research through partnerships and internal data show a high rate of ransomware delivery, often through phishing emails. Successful exploitation through exploit kits was also rampant. Malware such as Locky, Defray, pisloader, Ramnit Worm, OilRig, WannaCry, NotPetya and RIG were all found in attacks on the healthcare industry.
A commonly-observed attack on hospitals is the hijacking of Point of Sale (PoS) devices, such as credit card readers used in payment processing. US-based provider Banner Health reported, after a breach of 3.7 million health records, that threat actors had compromised more than one of their hospital’s cafeterias for payment information.
Two Factor Authentication (2FA) is an extra layer of security that requires not only a password and username but also something that only that user has on them, i.e. a piece of information only they should know or have on hand - such as a physical token. Where applicable, two-factor authentication should be implemented for accessing sensitive applications or remote networks to improve the assurance of user credentials.
Addressing the above problems requires a dedicated security team, particularly in the case of healthcare, where some of the flaws in cybersecurity are related to standard business practice within the organization. For instance, healthcare networks will need to remain exposed to some degree to allow information to be shared between healthcare providers, patients and third-party organizations. Medical devices will continue to depend on the outdated operating systems they were designed for and the cost of upgrading or replacing these devices will often outweigh the immediate benefit.
To address cybersecurity issues without disrupting healthcare services, a security team is required to work through each use case and find an optimal compromise between securing data and allowing the appropriate degree of promiscuity in network traffic. Curating the cybersecurity posture of an organization is not a trivial task, particularly when the organization is both physically and technologically open to the public.
Strategic recommendations, then, include:
Implementing both these technical and strategic recommendations is the best way to start improving your cybersecurity posture. Cybercriminals won’t wait for you to be ready for them. It’s up to you to use this information to prepare your organization and protect your clients from inevitable cyber-attacks.
For more information, check out our Healthcare Threat Report.
Emily is a content specialist on the Marketing team at eSentire. Drawing on her background in journalism and social media, Emily communicates eSentire's mission with compelling and thought-provoking content.