sb-as logo
Story image

How to effectively address security challenges in a digital healthcare world

23 May 2018

Businesses operating in the healthcare industry are increasingly going digital – and protecting themselves from cybercriminals should be a core part of their business.

According to Wavelink, criminals are often looking to steal sensitive information or make money through ransomware attacks, which is why it’s important for healthcare firms to maintain organisation-wide security that is both up-to-date and automated.

The 2017 Ponemon Cost of a Data Breach report says that healthcare is the most expensive industry for data breaches across the world – often costing 2.5 times the global average across industries.

According to Wavelink’s Hugo Hutchinson, healthcare need to be aware of their responsibilities about protecting patients’ privacy as well as protecting themselves against attacks.

He suggests a multi-layered approach that includes firewalls, cloud security, advanced threat protection, application security, access management, network operation centres, and security operation centres.

Often there can be a large number of people and devices that need to access healthcare firms’ networks. Employees, patients, and visitors are likely to use their own devices, while the organisation’s own devices also need to be managed.

Wavelink notes that it can be hard to keep track of who is being given access to what parts of the network.

“Best practice is to enforce access policies for all users and devices. This requires micro-segmentation of the network using internal network security firewalls so people can only get into the parts of the network that they’re authorised to access,” Hutchinson explains.

Wavelink adds that it’s essential to have strong security policies and processes, but these must not hinder the organisation from providing excellent patient care.

This means applications must perform at expected levels without being compromised by security measures such as slow packet processing, content inspection, or policy management processing.

The company also states that advanced threat protection can help to minimise the risk of a successful cyber attack. Sandboxing is able to create an isolated, secure environment to validate incoming threats. It could then share that threat information with the security community and disrupt zero-day threats.

“Threats are emerging and evolving too fast for manual processes to keep up. Organisations can’t expect to adequately fight the growing threats just by throwing more resources at them; automation is the only answer. It’s faster and less error-prone than humans, and it’s better at prioritising threats so organisations don’t spend time fighting every apparent threat,” Hutchinson says. “An automated system means security staff can work on minimising vulnerabilities and educating staff to help reduce the impact of human error on the organisation’s security.”

Story image
Proofpoint launches new SMB focused security awareness training
Proofpoint has launched security awareness training for small to medium businesses (SMBs) with the aim of reducing successful phishing attacks and malware infections to almost zero. More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Sophos named mobile security Leader in IDC MarketScape
Sophos Intercept X for Mobile has capabilities in protecting Android, iOS and Chrome OS users from known and never before seen mobile threats.More
Story image
Video: 10 Minute IT Jams - Who is CrowdStrike?
Today, Techday speaks to CrowdStrike ANZ channel director Luke Francis about the company's key products and offerings, its upcoming annual security conference, and the infrastructure it leverages in the A/NZ region.More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More