Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/12/2020
10:00 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

A 7-Step Cybersecurity Plan for Healthcare Organizations

With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.
Previous
1 of 8
Next

Healthcare organizations, on the front line of combating COVID-19, are under enormous pressure to adapt to new technologies amid work-from-home realities and the escalating cyber threat landscape.

That's why as part of National Cybersecurity Awareness Month, the National Cyber Security Alliance (NCSA) and the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) are focusing on the healthcare industry. In Dark Reading's own discussions with healthcare security experts, most say ransomware and antiquated medical technology are the industry's greatest threats, not distributed denial-of-service (DDoS) attacks as some have feared.

Related Content:

Latest Version of MalLocker Android Ransomware Packs New Tricks

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

"The hackers are businessmen, and for them time is money," says Torsten George, cybersecurity evangelist at Centrify. "It's much more difficult to make money on a DDoS attack. They would have to do the attack and press for a ransom. Overall, the medical world has done well on the administrative side of technology, but I worry more about the vulnerabilities in antiquated firmware in old medical equipment, such as ventilators and heart pumps.”

Piyush Pandey, CEO of Appsian, adds that medical organizations need to start thinking more like tech companies.

"Today large investment banks such as Goldman Sachs and Morgan Stanley think of themselves as technology companies first. That's what has to happen in the medical field as they adapt new technologies, such as telehealth,” Pandey says. "Medical people have to invest in technology in the same way."

Stopping breaches because of bad password management and keeping data safe during telehealth calls are top priorities for medical organizations. Security teams at these organizations have a lot to unpack. This list can help set priorities and pave the path forward.

 

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Ittiey
50%
50%
Ittiey,
User Rank: Apprentice
10/15/2020 | 8:21:11 AM
A 7-Step Cybersecurity Plan for Healthcare Organizations
Interesting article
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...
CVE-2020-28348
PUBLISHED: 2020-11-24
HashiCorp Nomad and Nomad Enterprise 0.9.0 up to 0.12.7 client Docker file sandbox feature may be subverted when not explicitly disabled or when using a volume mount type. Fixed in 0.12.8, 0.11.7, and 0.10.8.
CVE-2020-15928
PUBLISHED: 2020-11-24
In Ortus TestBox 2.4.0 through 4.1.0, unvalidated query string parameters to test-browser/index.cfm allow directory traversal.
CVE-2020-15929
PUBLISHED: 2020-11-24
In Ortus TestBox 2.4.0 through 4.1.0, unvalidated query string parameters passed to system/runners/HTMLRunner.cfm allow an attacker to write an arbitrary CFM file (within the application's context) containing attacker-defined CFML tags, leading to Remote Code Execution.
CVE-2020-28991
PUBLISHED: 2020-11-24
Gitea 0.9.99 through 1.12.x before 1.12.6 does not prevent a git protocol path that specifies a TCP port number and also contains newlines (with URL encoding) in ParseRemoteAddr in modules/auth/repo_form.go.