In an interview with Digital Health Age web content editor Ian Bolland, Crandall explained the issues that are affecting medical devices when it comes to cybersecurity, including being built on operating systems that were designed to be in networks that are not interconnected. While things are getting connected, the devices that are going onto networks were never designed to be secure in such a way, and the ownership of security is a contentious issue.
For many years, enterprise cyber security was primarily reactive. That is, a network perimeter was established to prevent attacks, and if a breach occurred, then response activities were initiated. Typical cyber response activities would include perimeter adjustments, vulnerability remediation, and damage containment. The methodology of prevent, detect, and respond (in that order) has thus driven cyber security design for most teams.
No industry is immune to hacking. In this digital age, no organisation can be considered as entirely safe from cybercriminals. As organisations invest in transformational technologies to streamline operations, maximise efficiencies and increase open communications, they are also introducing new gateways for criminals to enter their systems. According to IDC Health Insights 2017, it is predicted that by 2021, the first US$1 million class-action lawsuit against a medical device manufacturer will be filed for negligence due to a cyberattack that led to the death of at least 25 patients connected to a network while in the hospital and the latest example of healthcare facilities falling victim to cyberattacks was the ‘WannaCry’ attack on the National Healthcare System in the UK.
Written by: Tony Bradley, Senior Manager of Content Marketing for Alert Logic and Editor-in-Chief of TechSpective – Traditional cybersecurity is almost entirely reactive. You follow established best practices and implement security tools and processes and then you wait. You wait for an attacker you hope won’t come, and you hope you can detect and respond fast enough to avoid or minimize damage. The problem is that the attacker always gets the first move, and in most cases the best you can do is put out fires as quickly as possible. Organizations need to shift to a new strategy—a more proactive defense.
Deception technology turns the tables on cyberattackers with early and accurate detection and accelerated incident response. Dubai, United Arab Emirates, 14 October 2018: Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, will join Crestan International, a leading value added distributor, at GITEX Technology Week 2018 to highlight the critical role deception technology plays in an active defence strategy.