Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Healthcare Data Breaches From Cyberattacks, Criminals Eclipse Employee Error For The First Time
Oldest First  |  Newest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/7/2015 | 8:27:16 AM
User Awareness Responsble?
Many institutions have put great signifance into education and user awareness training in the past couple of years. Could it be that these principles could directly correlate to the decrease in user negligence? Or has the attack vector pivoted to where malicious attempts yield a much higher success rate of infiltrating companies?
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
5/7/2015 | 10:37:15 AM
Re: User Awareness Responsble?
I'm not sure healthcare has been at the leading edge of user education, so my gut is that it's more the bad guys have found a new soft target. 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/7/2015 | 10:39:18 AM
Re: User Awareness Responsble?
I would have to lean in that direction as well. However, the healthcare network I worked for implemented user awareness on an onboarding and yearly process. I would think for the large healthcare organizations that they would follow a similar approach.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
5/7/2015 | 10:41:05 AM
Re: User Awareness Responsble?
Ah, good perspective on that, Ryan. Thanks. The study didn't drill down into the reasons behind it, but a lot of the orgs getting hit were smaller ones, Ponemon said. And my guess is they weren't doing much in user awareness training.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/7/2015 | 10:46:30 AM
Re: User Awareness Responsble?
I feel that you hit one of most quintessential security implementation issues. Small organizations normally do not have as much financial backing to implement strong security safeguards. This is a difficult paradox. You need to implement safeguards to secure the data and to save your organizations financial aspects (reputation, revenue, data), but don't have the financial backing to implement those safeguards.


That being said, there are definitley ways to sure up security w/o breaking the bank.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
5/7/2015 | 12:24:25 PM
Dont Rule Out Fear as a Security Tool
For larger health orgs who have had a large number of internal data breeches, I know from keeping an ear to the grapevine (I work in healthcare IT) that fear has as much to do with the lower numbers than employee awareness training.  Your job should be important to you as an individual regardless your moral compass, and there have been heavy penalties and punishment doled out to those who are intent on breeching patient confidentiality.  That punishment not only removes you from your job, but makes the next one difficult to obtain, too.  If you are serious about remaining employed and developing a solid career, it's a no-brainer that respecting a patient's right to privacy should be your daily responsibility. 

Personally, I feel patient awareness training should include a darker version of what can happen relayed through anecdotes to employees to reinforce this point.  Fear can really work in favor of InfoSec as a form of social engineering.  Sad, but true.
Ulf Mattsson
50%
50%
Ulf Mattsson,
User Rank: Moderator
5/7/2015 | 4:43:01 PM
I think it is time to re-think our security approach
I'm concerned that "close to 45% of all data breaches in healthcare are due to criminal activity," and "a 125% increase in such activity over the past five years."

With more stringent data security requirements and regular audits on the horizon, in addition to
increasing attacks on PHI data, organizations should act now to protect their data, before it's too late.

Ponemon Institute published another interesting survey related to the recent spate of high-profile cyber attacks. According to the survey database security was recommended by 49% of respondents, but the study found that organizations continue to allocate the bulk of their budget (40%) to network security and only 19% to database security.

Ponemon concluded that "This is often because organizations have traditionally spent money on network security and so it is earmarked in the budget and requires no further justification."

We are seeing a number of common issues across recent data breaches, stealing our most sensitive data, and I think it is time to re-think our security approach and be more data-centric.  It is critical to protect sensitive data wherever it is stored. Educating users is not enough and I think that policies should be automatically enforced.


Ulf Mattsson, CTO Protegrity.
DungT593
100%
0%
DungT593,
User Rank: Apprentice
5/13/2015 | 9:40:23 AM
Malicious Insiders and Employees Negligence
What stuck out to me was the percentage for malicious insiders and employees negligence. These numbers can be related since an unattended and unlock workstation can be quickly attacked before the technician, nurse, etc. comes back. In big hospitals, trespassers can be a major threat. Automatic locking tools can add another level of security. 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-43394
PUBLISHED: 2022-01-24
Unisys OS 2200 Messaging Integration Services (NTSI) 7R3B IC3 and IC4, 7R3C, and 7R3D has an Incorrect Implementation of an Authentication Algorithm. An LDAP password is not properly validated.
CVE-2022-0177
PUBLISHED: 2022-01-24
Cross-site Scripting (XSS) - DOM in GitHub repository mrdoob/three.js prior to 0.137.0.
CVE-2021-36343
PUBLISHED: 2022-01-24
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
CVE-2021-36349
PUBLISHED: 2022-01-24
Dell EMC Data Protection Central versions 19.5 and prior contain a Server Side Request Forgery vulnerability in the DPC DNS client processing. A remote malicious user could potentially exploit this vulnerability, allowing port scanning of external hosts.
CVE-2021-43588
PUBLISHED: 2022-01-24
Dell EMC Data Protection Central version 19.5 contains an Improper Input Validation Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service.