Vulnerabilities / Threats

3/30/2016
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat Security Launches Healthcare Security Awareness and Training Program

Program designed to help healthcare companies assess and manage growing security risk, protect critical patient data

Pittsburgh, PA – March 29, 2016 Wombat Security Technologies (Wombat), the leading provider of cyber security awareness and training solutions, today launched a comprehensive new healthcare program designed to help healthcare providers protect critical patient information as the threat of a data breach continues to rise.

According to Symantec’s 2015 Internet Security Breach Report, the healthcare sector has reported the largest number of data breaches for four years in a row.  The report states that there are 37 percent of breaches are within healthcare more than triple the number of breaches that happen in retail which was reported to be only 11 percent.

Wombat’s solution is a bundled package, offering CyberStrength knowledge assessments, ThreatSim simulated phishing attack tool, interactive training modules, and security awareness materials. It is designed to give healthcare providers the necessary tools to protect and deflect data breaches within the busy pace of their organizations. The program includes automatically assigning training to users who need it most, allowing users to track and measure progress and dynamically tailoring program efforts to address specific threats as they continue to evolve.  Wombat’s auto-enrollment feature, and short, interactive training modules are an ideal fit for an industry faced with unique challenges in regard to staff and shift management.

Monongahela Valley Hospital drove a 90 percent reduction in successful phishing attacks and malware infections using Wombat’s solutions. “Since partnering with Wombat, we've seen a significant increase in user awareness and recognition of suspicious emails,” said the Senior Manager of IT Operation at Monongahela Valley Hospital. “Instead of clicking on these messages, our employees have caught and alerted us to more than ten separate phishing attacks, and in the ten months following the launch of our Wombat training program, we have seen a dramatic decline in infections caused by inappropriate email activity.”

“Our partnership with Wombat has been a true success and has helped us to educate individuals at all levels of our organization, which we feel is critical to protecting our patient's healthcare information, our employees' data, and our internal networks and systems,” he added.

The cost of a data breach is a rising concern for the healthcare industry. A report by Ponemon/IBM, 2015 Cost of a Data Breach Study, found that the average global per-record cost of a healthcare data breach is $363, which is more than twice the $154 average per-record cost across all global industries.

“Healthcare institutions are increasingly targeted by hackers, making it absolutely critical to deliver effective training to anyone who is not well-informed of HIPAA-mandated safeguards,” said Joe Ferrara, President and CEO of Wombat Security. “Our new healthcare program gives organizations a powerful suite of tools to protect healthcare information and patient records, while improving an organizations security posture. We are committed to providing our customers with the tools they need to change employee behavior and reduce risk within their organizations.”

The Healthcare Security Awareness and Training Program includes a best practices document, providing guidance on running a successful program in a healthcare setting and showing how all of the pieces of this bundle fit into the four key steps of Wombat’s Continuous Training Methodology: Assess, Educate, Reinforce, and Measure).  The complete program components are:

1.       Assessments (for baseline measurements and to track improvements)

·         CyberStrength – Predefined Health Info (PHI) CyberStrengh assessment that includes questions specific to PHI and the latest HIPAA standard

·         ThreatSim – Wombat’s simulated phishing attack tool, including healthcare-specific simulated phishing templates

2.       Education Modules -  Short, interactive training modules available on-demand

·         Protected Health Information

·         Email Security

·         Data Protection and Destruction

·         Physical Security

3.       Reinforcement Components

·         PhishAlarm - Email Button for quick reporting of suspicious emails

·         Security Awareness Materials - Posters, articles, images and security-minded giveaways

4.       Measurement Tools

·         Each product has reporting and analytic tools to identify areas of weakness and measure progress

Wombat’s Continuous Training Methodology has been shown to reduce successful phishing and malware infections by up to 90%. Their market-leading approach and award winning Security Education Platform currently helps over 1,000 enterprise organizations change employee behavior and dramatically reduce the risk of a cyber-attack.

About Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS-based cyber security education solution includes a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. Wombat, recognized by Gartner as a leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors, is helping Fortune 1000 and Global 2000 customers in industry segments such as finance and banking, energy, technology, higher education, retail and consumer packaged goods to strengthen their cyber security defenses

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: So now we are monitoring the monitor?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14623
PUBLISHED: 2018-12-14
A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulne...
CVE-2018-18093
PUBLISHED: 2018-12-14
Improper file permissions in the installer for Intel VTune Amplifier 2018 Update 3 and before may allow unprivileged user to potentially gain privileged access via local access.
CVE-2018-18096
PUBLISHED: 2018-12-14
Improper memory handling in Intel QuickAssist Technology for Linux (all versions) may allow an authenticated user to potentially enable a denial of service via local access.
CVE-2018-18097
PUBLISHED: 2018-12-14
Improper directory permissions in Intel Solid State Drive Toolbox before 3.5.7 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2018-3704
PUBLISHED: 2018-12-14
Improper directory permissions in the installer for the Intel Parallel Studio before 2019 Gold may allow authenticated users to potentially enable an escalation of privilege via local access.