Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/30/2016
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat Security Launches Healthcare Security Awareness and Training Program

Program designed to help healthcare companies assess and manage growing security risk, protect critical patient data

Pittsburgh, PA – March 29, 2016 Wombat Security Technologies (Wombat), the leading provider of cyber security awareness and training solutions, today launched a comprehensive new healthcare program designed to help healthcare providers protect critical patient information as the threat of a data breach continues to rise.

According to Symantec’s 2015 Internet Security Breach Report, the healthcare sector has reported the largest number of data breaches for four years in a row.  The report states that there are 37 percent of breaches are within healthcare more than triple the number of breaches that happen in retail which was reported to be only 11 percent.

Wombat’s solution is a bundled package, offering CyberStrength knowledge assessments, ThreatSim simulated phishing attack tool, interactive training modules, and security awareness materials. It is designed to give healthcare providers the necessary tools to protect and deflect data breaches within the busy pace of their organizations. The program includes automatically assigning training to users who need it most, allowing users to track and measure progress and dynamically tailoring program efforts to address specific threats as they continue to evolve.  Wombat’s auto-enrollment feature, and short, interactive training modules are an ideal fit for an industry faced with unique challenges in regard to staff and shift management.

Monongahela Valley Hospital drove a 90 percent reduction in successful phishing attacks and malware infections using Wombat’s solutions. “Since partnering with Wombat, we've seen a significant increase in user awareness and recognition of suspicious emails,” said the Senior Manager of IT Operation at Monongahela Valley Hospital. “Instead of clicking on these messages, our employees have caught and alerted us to more than ten separate phishing attacks, and in the ten months following the launch of our Wombat training program, we have seen a dramatic decline in infections caused by inappropriate email activity.”

“Our partnership with Wombat has been a true success and has helped us to educate individuals at all levels of our organization, which we feel is critical to protecting our patient's healthcare information, our employees' data, and our internal networks and systems,” he added.

The cost of a data breach is a rising concern for the healthcare industry. A report by Ponemon/IBM, 2015 Cost of a Data Breach Study, found that the average global per-record cost of a healthcare data breach is $363, which is more than twice the $154 average per-record cost across all global industries.

“Healthcare institutions are increasingly targeted by hackers, making it absolutely critical to deliver effective training to anyone who is not well-informed of HIPAA-mandated safeguards,” said Joe Ferrara, President and CEO of Wombat Security. “Our new healthcare program gives organizations a powerful suite of tools to protect healthcare information and patient records, while improving an organizations security posture. We are committed to providing our customers with the tools they need to change employee behavior and reduce risk within their organizations.”

The Healthcare Security Awareness and Training Program includes a best practices document, providing guidance on running a successful program in a healthcare setting and showing how all of the pieces of this bundle fit into the four key steps of Wombat’s Continuous Training Methodology: Assess, Educate, Reinforce, and Measure).  The complete program components are:

1.       Assessments (for baseline measurements and to track improvements)

·         CyberStrength – Predefined Health Info (PHI) CyberStrengh assessment that includes questions specific to PHI and the latest HIPAA standard

·         ThreatSim – Wombat’s simulated phishing attack tool, including healthcare-specific simulated phishing templates

2.       Education Modules -  Short, interactive training modules available on-demand

·         Protected Health Information

·         Email Security

·         Data Protection and Destruction

·         Physical Security

3.       Reinforcement Components

·         PhishAlarm - Email Button for quick reporting of suspicious emails

·         Security Awareness Materials - Posters, articles, images and security-minded giveaways

4.       Measurement Tools

·         Each product has reporting and analytic tools to identify areas of weakness and measure progress

Wombat’s Continuous Training Methodology has been shown to reduce successful phishing and malware infections by up to 90%. Their market-leading approach and award winning Security Education Platform currently helps over 1,000 enterprise organizations change employee behavior and dramatically reduce the risk of a cyber-attack.

About Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS-based cyber security education solution includes a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. Wombat, recognized by Gartner as a leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors, is helping Fortune 1000 and Global 2000 customers in industry segments such as finance and banking, energy, technology, higher education, retail and consumer packaged goods to strengthen their cyber security defenses

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
IoT Vulnerability Disclosure Platform Launched
Dark Reading Staff 10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26649
PUBLISHED: 2020-10-22
AtomXCMS 2.0 is affected by Incorrect Access Control via admin/dump.php
CVE-2020-26650
PUBLISHED: 2020-10-22
AtomXCMS 2.0 is affected by Arbitrary File Read via admin/dump.php
CVE-2020-27533
PUBLISHED: 2020-10-22
A Cross Site Scripting (XSS) issue was discovered in the search feature of DedeCMS v.5.8 that allows malicious users to inject code into web pages, and other users will be affected when viewing web pages.
CVE-2020-24033
PUBLISHED: 2020-10-22
An issue was discovered in fs.com S3900 24T4S 1.7.0 and earlier. The form does not have an authentication or token authentication mechanism that allows remote attackers to forge requests on behalf of a site administrator to change all settings including deleting users, creating new users with escala...
CVE-2020-27560
PUBLISHED: 2020-10-22
ImageMagick 7.0.10-34 allows Division by Zero in OptimizeLayerFrames in MagickCore/layer.c, which may cause a denial of service.