Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Over the next several weeks, we will look at cybersecurity within the context of the healthcare industry. The fact is, the number of breaches reported by medical organizations increased from just 16 in 2012 to more than 119 breaches in 2017. Thus, it’s important that healthcare professionals recognize the growing risk of data breaches and cyber-attacks so they can take the necessary precautions to avoid them. But before we can go any further, the healthcare industry needs to understand why it’s a growing target.
If a cyber-attack was launched against the healthcare system of North America in its current state, there would probably be little to stop it. But what are the actual chances of a wide-scale attack?
The American Recovery and Reinvestment Act of 2009 requires that U.S. medical organizations publicly report criminal breaches affecting 500 or more individuals. The data below presents an exponential upward trend in U.S. healthcare data breaches.
Figure 1: U.S. Healthcare Data Breaches
As previously mentioned, the number of breaches reported increased from just 16 in 2012 to more than 119 breaches in 2017. That’s a big difference. Not to mention these numbers only reflect detected large-scale breaches, which represent just a fraction of successful attacks in the wild.
On May 12, 2017, organizations around the world fell victim to a new variant of ransomware called WannaCry. The attack targeted 200,000 machines in more than 150 countries, spreading itself through the Server Message Block (SMB) protocol, which is used by Windows computers to share files.
The attack caused chaos for Britain’s National Health Service (NHS), crippling its ability to properly treat patients. Thousands of operations and appointments had to be canceled as a result of the attack, which could have been prevented by installing the patch released by Microsoft two months earlier.
Fortunately, the eSentire Threat Intelligence team set out to investigate what makes the healthcare industry both vulnerable to cybercrime and attractive to threat actors. What they’ve found is three-fold:
In addition to these primary vulnerabilities, there are other things to consider. Many healthcare organizations don’t invest very much in hiring enough skilled cybersecurity practitioners, which can put them at a disadvantage in defending against cyberthreats. Furthermore, there tends to be insufficient investment made in the technologies needed to mitigate a data breach. These two factors, paired with outdated systems, applications and technologies makes for a very difficult cybersecurity challenge.
Hope need not be lost, though. For each vulnerability mentioned, there are measures that healthcare organizations can take to counteract them. Besides spending more money on cybersecurity resources, there are strategic measures you can take to reduce the threat to your organization.
Emily is a content specialist on the Marketing team at eSentire. Drawing on her background in journalism and social media, Emily communicates eSentire's mission with compelling and thought-provoking content.