Story image

How to effectively address security challenges in a digital healthcare world

23 May 2018

Businesses operating in the healthcare industry are increasingly going digital – and protecting themselves from cybercriminals should be a core part of their business.

According to Wavelink, criminals are often looking to steal sensitive information or make money through ransomware attacks, which is why it’s important for healthcare firms to maintain organisation-wide security that is both up-to-date and automated.

The 2017 Ponemon Cost of a Data Breach report says that healthcare is the most expensive industry for data breaches across the world – often costing 2.5 times the global average across industries.

According to Wavelink’s Hugo Hutchinson, healthcare need to be aware of their responsibilities about protecting patients’ privacy as well as protecting themselves against attacks.

He suggests a multi-layered approach that includes firewalls, cloud security, advanced threat protection, application security, access management, network operation centres, and security operation centres.

Often there can be a large number of people and devices that need to access healthcare firms’ networks. Employees, patients, and visitors are likely to use their own devices, while the organisation’s own devices also need to be managed.

Wavelink notes that it can be hard to keep track of who is being given access to what parts of the network.

“Best practice is to enforce access policies for all users and devices. This requires micro-segmentation of the network using internal network security firewalls so people can only get into the parts of the network that they’re authorised to access,” Hutchinson explains.

Wavelink adds that it’s essential to have strong security policies and processes, but these must not hinder the organisation from providing excellent patient care.

This means applications must perform at expected levels without being compromised by security measures such as slow packet processing, content inspection, or policy management processing.

The company also states that advanced threat protection can help to minimise the risk of a successful cyber attack. Sandboxing is able to create an isolated, secure environment to validate incoming threats. It could then share that threat information with the security community and disrupt zero-day threats.

“Threats are emerging and evolving too fast for manual processes to keep up. Organisations can’t expect to adequately fight the growing threats just by throwing more resources at them; automation is the only answer. It’s faster and less error-prone than humans, and it’s better at prioritising threats so organisations don’t spend time fighting every apparent threat,” Hutchinson says. “An automated system means security staff can work on minimising vulnerabilities and educating staff to help reduce the impact of human error on the organisation’s security.”

Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Norwegian aluminium manufacturer hit hard by LockerGoga ransomware attack
“IT systems in most business areas are impacted and Hydro is switching to manual operations as far as possible.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.