, ,

How healthcare providers can stay safe from evolving cybersecurity risks

Over the past few years, the healthcare industry has been fighting off cyber criminals from all angles. With reports revealing that healthcare firms were hit with four times the global average of cyber attacks across 2023 – experiencing over 1500 cyber attacks per week in the first three quarters of the year- it is clear that the industry is operating in an increasingly dangerous cyber landscape.

But why is the healthcare industry in the firing line, and what can healthcare providers do to ensure that they remain protected against cybersecurity threats and keep operations running smoothly?

High stakes, low levels of security

The first step in mitigating cyber threats is to understand why healthcare providers are being targeted in the first place.

From patient electronic medical records to payment information – healthcare providers store a vast amount of highly sensitive information. If cyber criminals are able to gain access to this data, they could leverage it for a range of malicious benefits. Whether they decide to sell this information on the dark web or leverage it to engage in identity theft or financial fraud – if this information falls into the wrong hands, the consequences can be catastrophic. As well as this, cyber criminals are very aware that if they are able to gain access to this highly sensitive information, healthcare providers will be more likely to pay their ransom demands, making them even more vulnerable to an attack.

A report from VMO2 revealed that 77% of healthcare providers still use legacy technology. These outdated technologies make healthcare providers an even more lucrative target for cybercriminals, given they are easier for malicious actors to infiltrate and exploit, as their creation pre-dates the emergence of the more sophisticated security threats we see today. Unless healthcare providers embrace digital transformation, they remain a sitting duck.

The direct result of cyber criminals targeting healthcare providers by disrupting their operations causes significant issues for the healthcare system – directly impacting patients. Take the recent attack on the NHS as an example – this attack caused 3,396 outpatient appointments and 1,255 elective procedures to be cancelled since the attack occurred at the beginning of June and also caused the NHS to put out a public appeal for O-type blood as the cyber attack delayed blood transfusions.

Outdated legacy systems are making cyber criminals’ jobs even easier, allowing them to easily extract data for financial benefits. This creates an urgency for the sector to update its security credentials, or face the continuous threat of an attack.

How healthcare providers can fortify their defenses

With the number of attacks on healthcare providers continuing to rise, organizations must consider how they can ensure they are well equipped to stay afloat during the growing cyber crime wave before they are lost altogether.

Phishing attacks are one of the most common types of cyber threat that the healthcare sector specifically faces, and there are many different ways that healthcare providers can mitigate these attacks. Firstly, healthcare providers should utilize anti-spoofing software which can identify and drop any packets with an IP address that is hidden behind one interface, but is actually from a different interface altogether. For example, if an employee received an email from a threat actor posing to be their manager or even a colleague, anti-spoofing software is able to detect that the packet has an external IP address and block it accordingly. 

For an added layer of defense, healthcare providers should also utilize email verification and security software. These solutions automatically alert the relevant parties when any emails pretending to be from inside an organization are actually coming from outside of an organization. On top of this, this software can be programmed to flag certain key phrases such as “transfer funds” and alert relevant parties – making it the perfect tool to mitigate phishing attacks.

Another type of software that healthcare providers should invest in to help prevent phishing attacks is secure email solutions. These solutions allow sensitive documents or emails to be shared securely and will prompt the recipient for a unique password before providing them with access to the email. This is a great way of preventing sensitive emails from being intercepted by threat actors which can then be used to gain access to a business.

As the healthcare industry continues to remain a key target for cyber criminals, malicious actors are beginning to take more creative routes to exploiting these organizations. The most recent attack that the NHS faced involved a threat actor infiltrating Synnovis, which provides key clinical services to the NHS, rather than a direct attack on the NHS itself. Healthcare providers should take this as a warning to ensure there are no loopholes within their supply chain for threat actors to exploit, implementing security measures which are up to scratch.

Finally, healthcare providers must invest in continuous and in-depth cybersecurity training sessions for their team, as a business’ cybersecurity is only as strong as its least cyber-savvy employee. Adopting a box ticking, “one and done” approach to training isn't sufficient, and businesses must take sufficient steps to ensure all employees are educated on both new and emerging threats.

With the healthcare industry remaining firmly in the firing line due to its critical role in public health, these organizations must act now and fortify their defenses before they become nothing more than a cautionary tale.

We've listed the best identity management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

https://www.techradar.com/pro/how-healthcare-providers-can-stay-safe-from-evolving-cybersecurity-risks


Leave a Reply

Your email address will not be published. Required fields are marked *

August 2024
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  

About Us

Welcome to encircle News! We are a cutting-edge technology news company that is dedicated to bringing you the latest and greatest in everything tech. From automobiles to drones, software to hardware, we’ve got you covered.

At encircle News, we believe that technology is more than just a tool, it’s a way of life. And we’re here to help you stay on top of all the latest trends and developments in this ever-evolving field. We know that technology is constantly changing, and that can be overwhelming, but we’re here to make it easy for you to keep up.

We’re a team of tech enthusiasts who are passionate about everything tech and love to share our knowledge with others. We believe that technology should be accessible to everyone, and we’re here to make sure it is. Our mission is to provide you with fun, engaging, and informative content that helps you to understand and embrace the latest technologies.

From the newest cars on the road to the latest drones taking to the skies, we’ve got you covered. We also dive deep into the world of software and hardware, bringing you the latest updates on everything from operating systems to processors.

So whether you’re a tech enthusiast, a business professional, or just someone who wants to stay up-to-date on the latest advancements in technology, encircle News is the place for you. Join us on this exciting journey and be a part of shaping the future.

Podcasts

TWiT 992: Why Not Pudding? – Google's Monopoly, Net Neutrality, AI Phishing This Week in Tech (Audio)

Former YouTube CEO Susan Wojcicki dies after 2 years with lung cancer Google (GOOGL) Loses DOJ Antitrust Suit Over Search Engine on Phone Browsers Will Google's historic monopoly lawsuit be the death knell for Mozilla and Firefox? Google pulls Olympics AI ad 'Dear Sydney' Brands should avoid this popular term. It's turning off customers US court blocks Biden administration net neutrality rules The KOSA Internet Censorship Bill Just Passed The Senate—It's Our Last Chance To Stop It Judge tosses challenge to Louisiana's age verification law aimed at porn websites CNET to Be Sold to Ziff Davis in Sign of Possible Media Deals to Come Intel announces two extra years of warranty amid chip crashing and instability issues — longer warranty applies to 13th- and 14th-Gen Core processors Canadian news engagement down significantly one year after Meta's ban: study Microsoft's AI Can Be Turned Into an Automated Phishing Machine 'The Godmother of AI' says California's well-intended AI bill will harm the U.S. ecosystem Scoop: X files antitrust lawsuit against ad industry group GARM Scientists Say Secret to Fusion May Lie in Hellmann's Mayonnaise Host: Leo Laporte Guests: Abrar Al-Heeti, Shoshana Weissmann, and Andrew Chow Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit mintmobile.com/twit bitwarden.com/twit expressvpn.com/twit NetSuite.com/TWIT
  1. TWiT 992: Why Not Pudding? – Google's Monopoly, Net Neutrality, AI Phishing
  2. TWiT 991: This Show Is Securities Fraud – Intel Layoffs, KOSA, Don Lemon
  3. TWiT 990: Dogecoin Fort Knox – AI Cheese, SearchGPT, "Free" Facebook
  4. TWiT 989: Executive Laundry Folding Disorder – Crowdstrike, Prime Day, Streaming the Olympics
  5. TWiT 988: Flaming Corn Maze – AT&T Breach, Galaxy Z Fold6, Olympic Disinfo