Healthcare Security

Ransomware: Is the Tide Finally Turning Against Criminals?

The latest edition of the ISMG Security Report analyzes the decline in the number of organizations hit by ransomware who choose to pay a ransom to their attackers. It also examines how to better protect digital identities in the healthcare sector and how security decision-makers can improve their use of metrics to achieve better outcomes. …

Ransomware: Is the Tide Finally Turning Against Criminals? Read More »

Russia-Ukraine War: Threats Facing the Healthcare Sector

As Russia’s military invasion and cyberattacks on Ukraine escalate, critical infrastructure entities, including those in the health and public health sector of the U.S. and other countries condemning Russia’s actions, must also be on high alert for potentially disruptive cyber assaults, some experts warn. “Any state-sponsored Russian attacks aiming to support the Russian invasion of …

Russia-Ukraine War: Threats Facing the Healthcare Sector Read More »

Urgent Care: Deception-Based Detection Stat!

By: Christina Adams

Healthcare organizations work hard to ensure their patients’ care and their sensitive data remain protected. Those working within the healthcare sector know the importance of optimizing care for their patients through the use of high-tech, state of the art medical devices and online access to medical records.

It’s Time for a Checkup

While healthcare organizations continue to work towards providing their patients with the highest quality care, the start to the new year is an optimal time for IT teams to give their cybersecurity practices a checkup. In its annual study, Ponemon Institute reported that almost 90% of healthcare organizations have been breached and that the average cost of a data breach for a healthcare provider is $2.2 million. In 2018, breaches will only become increasingly sophisticated, pervasive, and costly for healthcare organizations.

Why Healthcare Organizations?

Healthcare organizations are lucrative targets for attackers because of their wealth of sensitive patient data and the relative ease of infiltrating a healthcare organization’s network. Several factors can increase a healthcare organization’s vulnerability. Medical devices with IOT capabilities, for example, provide life-saving benefits for patients, but can make it challenging to implement traditional network security monitoring due to transient connectivity. Additionally, providing patients with electronic access to medical records increases patient satisfaction, but poses an additional network security risk. Furthermore, IT teams within healthcare organizations are often limited by budget and resources and therefore are susceptible to lacking the tools necessary to combat today’s modern attacker.

So What’s the Treatment Protocol?

The answer is not to get rid of IoT medical devices or eliminate computerized physician order entry (CPOE) systems that simplify care and save lives. Healthcare IT teams simply need tools in their arsenal that not only defend the network perimeter but also help IT teams detect and respond to in-network threats efficiently and effectively.

Enter: deception technology. Deception technology is a powerful tool that can help healthcare organizations protect patient data, company assets, and patient lives by turning the network into an environment where the attacker cannot tell what is real and what is fake; ultimately, revealing an attacker’s activities as they try to scan systems or attempt to download malware onto medical devices. These traps detect lateral movement, credential theft, ransomware and Active Directory reconnaissance.

In addition, deception saves time for IT teams by automating routine security tasks, allowing smaller teams to accomplish more without sacrificing security. However, not all deception is created equal…

The Generic Version Won’t Cut It

Deception-detection solutions vary widely based on comprehensiveness, authenticity, attack analysis, and ability to improve incident response. The Attivo ThreatDefend™ platform combines network and end-point detection to create the highest efficacy of early detection coverage of advanced threats. Deception is placed at both the end-point and inside the network, unlike deception solutions that offer one or the other. The platform efficiently detects threats across all vectors including stolen credentials, Man-in-the-Middle, ransomware, phishing, and insider threats that often evade traditional perimeter-based systems. For authenticity, Attivo misdirects attackers by creating a camouflage of deceptions that provide advanced luring techniques based on the use of real operating systems, golden images for decoys, and customized endpoint credentials designed to draw in attackers.

Attivo Networks recently established a partnership with Becton, Dickinson, and Company (BD), one of the world’s leading healthcare, safety, and technology organizations. Attivo worked closely with BD to create a customized solution for their infusion devices. BD conducted extensive POC (Proof of Concept) tests and the Attivo BOTsink proved to provide reliable threat detection. To learn more about the BD solution, click here.

Learn More Before Filling Your Prescription

If you are interested in learning more about how the Attivo Networks ThreatDefend™ platform works and how it has benefitted healthcare organizations, register for the NH-ISAC webinar, Deception-based Threat Detection, Myths and Realities .

A New Approach To Threat Detection Helps Get Ahead Of Cyberattackers for Healthcare

Cybertheft of PHI (protected health information) is on the rise. Ponemon Institute reports in its Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data nearly 90 percent of all healthcare organizations have suffered at least one data breach in the last two years.

In addition to increasing sophistication of cyberattackers, many healthcare organizations lag behind retail and financial organizations when it comes to creating hardened, multilayered security defenses. The cybersecurity challenges facing the healthcare industry are significant and growing in both number and complexity. However, there is a new generation of solutions that can contribute significantly to discovering, analyzing, and mitigating these threats.

Scroll to Top