The healthcare industry has been reported arsenic the 2nd astir targeted manufacture from cyberattacks. Following the concern sector, healthcare sees the largest fig of threats designed to specifically people their data.
Why? The reply blends target-rich opportunities, owed to the sheer fig of internet-connected devices successful use, and a important fig of endpoints that remain inadequately secured. This operation provides fertile grounds for atrocious actors to exploit vulnerabilities to currency successful done ransomware attacks oregon by selling Patient Health Information (PHI) obtained through a information breach.
According to a Healthcare Cyber Trend Research Report, determination were 521 large information breaches owed to IT/hacking successful 2021, an summation of implicit 25% since 2020.
Still not convinced that cybersecurity is an integral portion of the healthcare landscape?
43,096,956. This is the fig of diligent records impacted from cyber threats against U.S. healthcare organizations successful 2021 alone.
As a regulated industry, HIPAA ensures that diligent information confidentiality and integrity are maintained and sufficiently sphere diligent privacy. Severe consequences, not constricted to penalties involving fines and/or transgression liability, await immoderate organizations recovered violating these regulations.
Despite dire numbers and high-risk ranking, determination are respective resources disposable to assistance healthcare organizations:
- secure their endpoints
- safeguard diligent data
- mitigate hazard from threats targeting their systems
Additionally, guidance from authorities agencies, similar the Federal Bureau of Investigation (FBI) and Cybersecurity & Infrastructure Security Agency (CISA) assistance organizations code these information needs.
Risk assesment
Before we dive into however to support endpoints, we archetypal request immoderate information:
- What needs protection?
- What does it request extortion from?
While a implicit usher to hazard appraisal is beyond the scope of this article, the 2 questions supra volition supply the captious accusation regarding the types of devices they ain on with a number of however galore devices are successful use. They besides supply penetration into the types of threats that beryllium arsenic they subordinate to each of the instrumentality types wrong an organization.
For example, an on-premise web server hosting a web app that gives healthcare providers entree to intake diligent information volition typically spot hazard from SQL injection attacks, insider menace and unpatched vulnerabilities — to sanction immoderate communal forms of risk. Compared to a laptop utilized by a doc performing location visits, hazard assessments successful that lawsuit would output differing results, similar unencrypted information connected the retention drive, anemic passwords, misconfigured settings and unpatched vulnerabilities.
Some hazard volition overlap with different endpoints, portion others whitethorn beryllium unsocial to a specific instrumentality type. That’s wherefore it’s captious to execute a thorough hazard appraisal and place each instrumentality benignant and usage case. With a amended knowing of which threats are much apt to affect which endpoints, organizations are positioned to make a program to support against threats before they’re exposed to an onslaught oregon information breach.
Common threats affecting healthcare
After the hazard appraisal has been performed, IT and information teams tin statesman gathering retired a cybersecurity program for mitigating the hazard posed to identified endpoints.
Again, immoderate mitigation strategies mightiness look to beryllium cosmopolitan oregon applicable crossed the committee to each endpoints, portion others volition beryllium circumstantial to a peculiar instrumentality type. Unfortunately, determination are nary real “silver bullet” solutions, oregon plans that tin code each concerns with 1 benignant of solution. Organizational needs are unsocial and truthful are their hazard appetites.
With that said, present are the 10 astir communal information threats affecting healthcare organizations:
- Malware (ransomware)
- Insider threats
- Phishing campaigns
- Device misconfigurations
- Denial of Service (DoS)/Distributed DoS (DDoS)
- Internet of Things (IoT)
- Data leaks
- Insufficient worker training
- Unsecured network connections
- Compliance monitoring
Combined with your organization-specific hazard assessment, this database should service arsenic the instauration successful the improvement of your mitigation plan.
Mitigating cyber threats
Armed with hazard appraisal information and consciousness of the threats that impact your unsocial enactment environment, the adjacent measurement successful processing your cybersecurity program is to instrumentality the controls to: enactment up security, support diligent information and sphere privateness portion besides constructing an iterative extortion process that incorporates regular grooming and real-life learnings. Alongside these benefits, changeless monitoring of endpoint wellness builds upon the defence successful extent paradigm to mitigate existing hazard portion helping support against aboriginal threats.
The word “iterative” is cardinal here, arsenic it ties successful with the silver bullet statement made earlier. There is no one-size-fits-all solution for broad security or holistic enactment for each your endpoint’s OS types. An iterative attack requires continuous effort, gathering upon what has travel earlier and strengthening your instrumentality information posture. Organizations should cull a “set and forget” mentality, which lone draws concerns if a threat is detected.
Security — overmuch similar advancements successful healthcare — ne'er stagnate. Both are dynamic and evolving. Your IT and information practices should besides continuously germinate to support yourselves from attacks without sacrificing productivity oregon privacy.
The menace mitigations that are based connected champion practices and recommended by the FBI, CISA and US Dept. of the Treasury with healthcare organizational information successful caput are arsenic follows:
- Maintain offline backups of critical/sensitive information and regularly execute tests of backup and restoration functionality to verify processes are moving decently and information is recoverable.
- Follow the rule of slightest privilege and proviso entree permissions to users based solely connected the minimum rights indispensable to execute their occupation relation oregon task — thing more.
- Implement web menace defence solutions, specified arsenic contented filtering, which blocks phishing domains and different malicious URLs, preventing users from accessing risky content.
- Harden instrumentality configurations based connected established information frameworks, similar those from the National Institute of Standards and Technology (NIST) or Center for Internet Security (CIS) that supply guidance and benchmarks to securely configure, oregon lockdown endpoints.
- Establish partnerships with upstream web providers and organizations that supply effect assistance in mitigating network-based attacks, specified arsenic DoS/DDoS attacks.
- Deploy nationalist cardinal infrastructure (PKI) and integer certificates to authenticate connections accessing information connected the network, similar IoT-based aesculapian devices.
- Utilize technologies to encrypt information astatine remainder connected retention devices that enactment with critical, delicate and/or PHI information to guarantee that it is not readable by unauthorized parties, adjacent if the information itself is mislaid oregon stolen.
- Invest successful stakeholder grooming connected an ongoing basis, relating to information issues and concerns, including developments of caller threats based connected appraisal of menace quality and trends.
- Institute web absorption principles to conception web postulation into smaller, much manageable networks based connected entree needs, akin to slightest privilege. Additionally, deploy unafraid distant entree technology, similar Zero Trust Network Access (ZTNA), which ensures information successful transit is unafraid careless of which web oregon transportation is used.
- Implement monitoring of endpoints with real-time alerting and granular reporting capableness to find instrumentality wellness astatine each times portion receiving alerts arsenic to immoderate changes, allowing IT and Security teams to remediate issues and support instrumentality compliance.
Don’t hold until after a information breach has occurred. There’s ne'er a incorrect clip to make oregon fortify information procedures and cybersecurity practices to code your healthcare organization’s needs oregon support your patient’s wellness data. The lone mistake is waiting.
Photo: traffic_analyzer, Getty Images
This station appears done the MedCity Influencers program. Anyone tin people their position connected concern and innovation successful healthcare connected MedCity News done MedCity Influencers. Click present to find retired how.
Hear the latest manufacture quality first. Sign up for our regular newsletter.
We volition ne'er merchantability oregon stock your accusation without your consent. See our privacy policy.