Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/30/2016
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat Security Launches Healthcare Security Awareness and Training Program

Program designed to help healthcare companies assess and manage growing security risk, protect critical patient data

Pittsburgh, PA – March 29, 2016 Wombat Security Technologies (Wombat), the leading provider of cyber security awareness and training solutions, today launched a comprehensive new healthcare program designed to help healthcare providers protect critical patient information as the threat of a data breach continues to rise.

According to Symantec’s 2015 Internet Security Breach Report, the healthcare sector has reported the largest number of data breaches for four years in a row.  The report states that there are 37 percent of breaches are within healthcare more than triple the number of breaches that happen in retail which was reported to be only 11 percent.

Wombat’s solution is a bundled package, offering CyberStrength knowledge assessments, ThreatSim simulated phishing attack tool, interactive training modules, and security awareness materials. It is designed to give healthcare providers the necessary tools to protect and deflect data breaches within the busy pace of their organizations. The program includes automatically assigning training to users who need it most, allowing users to track and measure progress and dynamically tailoring program efforts to address specific threats as they continue to evolve.  Wombat’s auto-enrollment feature, and short, interactive training modules are an ideal fit for an industry faced with unique challenges in regard to staff and shift management.

Monongahela Valley Hospital drove a 90 percent reduction in successful phishing attacks and malware infections using Wombat’s solutions. “Since partnering with Wombat, we've seen a significant increase in user awareness and recognition of suspicious emails,” said the Senior Manager of IT Operation at Monongahela Valley Hospital. “Instead of clicking on these messages, our employees have caught and alerted us to more than ten separate phishing attacks, and in the ten months following the launch of our Wombat training program, we have seen a dramatic decline in infections caused by inappropriate email activity.”

“Our partnership with Wombat has been a true success and has helped us to educate individuals at all levels of our organization, which we feel is critical to protecting our patient's healthcare information, our employees' data, and our internal networks and systems,” he added.

The cost of a data breach is a rising concern for the healthcare industry. A report by Ponemon/IBM, 2015 Cost of a Data Breach Study, found that the average global per-record cost of a healthcare data breach is $363, which is more than twice the $154 average per-record cost across all global industries.

“Healthcare institutions are increasingly targeted by hackers, making it absolutely critical to deliver effective training to anyone who is not well-informed of HIPAA-mandated safeguards,” said Joe Ferrara, President and CEO of Wombat Security. “Our new healthcare program gives organizations a powerful suite of tools to protect healthcare information and patient records, while improving an organizations security posture. We are committed to providing our customers with the tools they need to change employee behavior and reduce risk within their organizations.”

The Healthcare Security Awareness and Training Program includes a best practices document, providing guidance on running a successful program in a healthcare setting and showing how all of the pieces of this bundle fit into the four key steps of Wombat’s Continuous Training Methodology: Assess, Educate, Reinforce, and Measure).  The complete program components are:

1.       Assessments (for baseline measurements and to track improvements)

·         CyberStrength – Predefined Health Info (PHI) CyberStrengh assessment that includes questions specific to PHI and the latest HIPAA standard

·         ThreatSim – Wombat’s simulated phishing attack tool, including healthcare-specific simulated phishing templates

2.       Education Modules -  Short, interactive training modules available on-demand

·         Protected Health Information

·         Email Security

·         Data Protection and Destruction

·         Physical Security

3.       Reinforcement Components

·         PhishAlarm - Email Button for quick reporting of suspicious emails

·         Security Awareness Materials - Posters, articles, images and security-minded giveaways

4.       Measurement Tools

·         Each product has reporting and analytic tools to identify areas of weakness and measure progress

Wombat’s Continuous Training Methodology has been shown to reduce successful phishing and malware infections by up to 90%. Their market-leading approach and award winning Security Education Platform currently helps over 1,000 enterprise organizations change employee behavior and dramatically reduce the risk of a cyber-attack.

About Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS-based cyber security education solution includes a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. Wombat, recognized by Gartner as a leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors, is helping Fortune 1000 and Global 2000 customers in industry segments such as finance and banking, energy, technology, higher education, retail and consumer packaged goods to strengthen their cyber security defenses

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27569
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27570
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27571
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27572
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.
CVE-2021-27573
PUBLISHED: 2021-05-07
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.