Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/30/2016
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat Security Launches Healthcare Security Awareness and Training Program

Program designed to help healthcare companies assess and manage growing security risk, protect critical patient data

Pittsburgh, PA – March 29, 2016 Wombat Security Technologies (Wombat), the leading provider of cyber security awareness and training solutions, today launched a comprehensive new healthcare program designed to help healthcare providers protect critical patient information as the threat of a data breach continues to rise.

According to Symantec’s 2015 Internet Security Breach Report, the healthcare sector has reported the largest number of data breaches for four years in a row.  The report states that there are 37 percent of breaches are within healthcare more than triple the number of breaches that happen in retail which was reported to be only 11 percent.

Wombat’s solution is a bundled package, offering CyberStrength knowledge assessments, ThreatSim simulated phishing attack tool, interactive training modules, and security awareness materials. It is designed to give healthcare providers the necessary tools to protect and deflect data breaches within the busy pace of their organizations. The program includes automatically assigning training to users who need it most, allowing users to track and measure progress and dynamically tailoring program efforts to address specific threats as they continue to evolve.  Wombat’s auto-enrollment feature, and short, interactive training modules are an ideal fit for an industry faced with unique challenges in regard to staff and shift management.

Monongahela Valley Hospital drove a 90 percent reduction in successful phishing attacks and malware infections using Wombat’s solutions. “Since partnering with Wombat, we've seen a significant increase in user awareness and recognition of suspicious emails,” said the Senior Manager of IT Operation at Monongahela Valley Hospital. “Instead of clicking on these messages, our employees have caught and alerted us to more than ten separate phishing attacks, and in the ten months following the launch of our Wombat training program, we have seen a dramatic decline in infections caused by inappropriate email activity.”

“Our partnership with Wombat has been a true success and has helped us to educate individuals at all levels of our organization, which we feel is critical to protecting our patient's healthcare information, our employees' data, and our internal networks and systems,” he added.

The cost of a data breach is a rising concern for the healthcare industry. A report by Ponemon/IBM, 2015 Cost of a Data Breach Study, found that the average global per-record cost of a healthcare data breach is $363, which is more than twice the $154 average per-record cost across all global industries.

“Healthcare institutions are increasingly targeted by hackers, making it absolutely critical to deliver effective training to anyone who is not well-informed of HIPAA-mandated safeguards,” said Joe Ferrara, President and CEO of Wombat Security. “Our new healthcare program gives organizations a powerful suite of tools to protect healthcare information and patient records, while improving an organizations security posture. We are committed to providing our customers with the tools they need to change employee behavior and reduce risk within their organizations.”

The Healthcare Security Awareness and Training Program includes a best practices document, providing guidance on running a successful program in a healthcare setting and showing how all of the pieces of this bundle fit into the four key steps of Wombat’s Continuous Training Methodology: Assess, Educate, Reinforce, and Measure).  The complete program components are:

1.       Assessments (for baseline measurements and to track improvements)

·         CyberStrength – Predefined Health Info (PHI) CyberStrengh assessment that includes questions specific to PHI and the latest HIPAA standard

·         ThreatSim – Wombat’s simulated phishing attack tool, including healthcare-specific simulated phishing templates

2.       Education Modules -  Short, interactive training modules available on-demand

·         Protected Health Information

·         Email Security

·         Data Protection and Destruction

·         Physical Security

3.       Reinforcement Components

·         PhishAlarm - Email Button for quick reporting of suspicious emails

·         Security Awareness Materials - Posters, articles, images and security-minded giveaways

4.       Measurement Tools

·         Each product has reporting and analytic tools to identify areas of weakness and measure progress

Wombat’s Continuous Training Methodology has been shown to reduce successful phishing and malware infections by up to 90%. Their market-leading approach and award winning Security Education Platform currently helps over 1,000 enterprise organizations change employee behavior and dramatically reduce the risk of a cyber-attack.

About Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS-based cyber security education solution includes a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. Wombat, recognized by Gartner as a leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors, is helping Fortune 1000 and Global 2000 customers in industry segments such as finance and banking, energy, technology, higher education, retail and consumer packaged goods to strengthen their cyber security defenses

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18214
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...