Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Cybersecurity and Compliance for Healthcare Organizations
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Cybersecurity and Compliance for Healthcare Organizations

5 years ago Anastasios Arampatzis
Cybersecurity and Compliance for Healthcare Organizations

Amidst the pandemic overwhelming the capacity of many hospital systems, malicious hackers have been quick to target healthcare providers and medical agencies. These cyber-attacks have hit both the United States and Europe in recent months, serving as a reminder for organizations to closely review their information security posture during these times of uncertainty.

Despite certain attacker groups stating their intent to refrain from targeting healthcare organizations for the duration of the COVID-19 crisis, publicly reported cyber-attacks included a ransomware attack on the Champaign-Urbana Public Health District in the United States and the downing of critical systems at Brno University Hospital in the Czech Republic. In addition, attacks against the World Health Organization have more than doubled, while the U.S. Department of Health and Human Services was hit by an attempted DDoS attack.

Attack surface is expanding

Hospitals and healthcare organizations were an attractive target even before the coronavirus pandemic. Patient records have almost everything an attacker needs in a single record to carry out sophisticated insurance fraud schemes, purchase medical supplies or drugs and/or commit other types of fraud including outright identity theft. Medical records are lucrative targets and are expensive assets in the dark market.

The deployment of new devices—especially those categorized as IoT that use wireless networks and sensors to collect and exchange information—is a double-edged sword. While these devices offer medical environments tremendous capabilities to care for patients and increase efficiencies, each device increases an organization’s attack surface.

Compliance challenges

Adding to the complexity of these security challenges are compliance and regulatory frameworks such as GDPR and NIS Directive,that are typically enacted to protect systems and sensitive data. However, since they frequently evolve to keep pace with information technology, industry influences and new threats to systems and data, healthcare organizations face multiple moving targets for managing controls and meeting requirements.

For example, in the UK, hospitals and other healthcare entities of the National Health System (NHS) that are using digital services are responsible for ensuring they meet the minimum standards in the areas of network security and data protection.

Requirements for network protection are described in the NCSC Cloud Security Principles and in the 10 steps to cybersecurity guidance. Healthcare organizations can demonstrate compliance with these requirements by taking a self-assessment like the Cyber Essentials.

In the field of data protection, healthcare organizations need to comply with the requirements of Data Protection Act of 2018, which transposed GDPR into the UK legislation. To demonstrate compliance, hospitals and other NHS entities need to consider the 12 steps detailed by the Information Commissioner’s Office (ICO).

All this said, securing patient, customer and organizational data must be a top priority. The high price for patient records, combined with new and growing vulnerabilities, provide a great impetus for cybercriminals to attack.

How to Keep Your Healthcare Organization Safe

There are several key measures to follow that help lower the risks of breaches and keep your company’s and customers’ data safe.

  • Build a risk-aware culture. This means:
    • Thoroughly examine and determine where security risks lie in your organization.
    • Educate and communicate with employees to help them understand how they can help close the gaps.
    • Implement the right tools that continuously monitor and identify vulnerabilities as well as alert employees so that your organization can act quickly to reduce the risks.
  • Implement foundational controls and basic security hygiene.
    • According to SANS, implementing the first six CIS Controls provide a highly effective and efficient level of defense against the majority of real-world attacks. They also help to create the necessary foundation for dealing with more advanced attacks.
  • Automate all security and compliance efforts. This helps to:
    • Discover and profile all business-critical assets such as patient care systems, medical devices and payment systems.
    • Quickly repair configurations errors.
    • Adjust security controls based on system changes and business impact.
    • Monitor, measure and report compliance with security and privacy requirements.
  • Manage incidents with intelligence to help your organization to respond more quickly. To do this:
    • Implement intelligent analytics to help monitor operations.
    • Implement automated response capabilities.
    • Integrate next generation threat intelligence solutions with change detection for advanced threat detection and response.

Good Security Delivers Effective Compliance

The solution to the unprecedented cyber threat problem that healthcare organizations face is to implement foundational controls that integrate into other solutions to proactively respond to threats. If an organization has implemented good security processes and controls, they could be well on their way to meeting multiple compliance and/or security standards.

Tripwire supports many compliance mandates (including HIPAA and FDA) as well as guidelines from NIST. That support, combined with Tripwire’s advanced cybersecurity and compliance solutions, gives you proven, industry-recognized security and the ability to meet almost any compliance mandate. All while helping you detect and respond to any threat to your organization’s—and customers’—data.

To learn more about how Tripwire can help healthcare organization maintain compliance by strengthening its cybersecurity posture, click here: https://www.tripwire.com/solutions/solutions-by-industry/healthcare.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Cybersecurity and Compliance for Healthcare Organizations” appeared first on TripWire

Source:TripWire – Anastasios Arampatzis

Tags: Cloud, Compliance, Coronavirus, COVID-19, Critical Severity, Goverment, High Severity, Malware, Privacy, Ransomware, TripWire

Continue Reading

Previous Ransomware Cyber Attack Forced the Largest U.S. Fuel Pipeline to Shut Down
Next NAME:WRECK DNS Bugs: What You Need to Know

More Stories

  • Critical Vulnerability

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

13 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Vulnerabilities

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

18 hours ago [email protected] (The Hacker News)
  • Vulnerabilities

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

2 days ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
  • Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
  • Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception
  • ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
  • [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT