HEALTHCARE CYBERSECURITY 2021 - ANDY HEINS & SCOTT BREECE
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
AGENDA Learning Objectives Healthcare Attacks 2020 Cybersecurity Review Ransomware Remote Workforce Third Party Risk Risks of Cloud Computing Proactive Security Top Security Trend for 2021 Q&A
LEARNING OBJECTIVES 1 2 3 4 Understand the Explain the new Analyze your risk Demonstrate the Impacts of landscape as a result exposure that third risks associated with ransomware of the pandemic, the parties present to on premise solutions remote workforce your organization being relocated to someone’s cloud
HEALTHCARE ATTACKS
HEALTHCARE CYBERSECURITY IN 2020 KEY ASSETS OF HEALTHCARE ORGANIZATIONS THAT CYBERATTACKS TARGET Patient’s health that can be Patient’s health records includes Availability of healthcare affected by tampering availability valuable personally identifiable services including critical of medical devices, patient information (PII) and protected clinical services and health records, medicine health information (PHI). These administrative services inventory system and power have huge monetary value in the supply or HVAC systems black market Intellectual property assets Reputation of the organization includes experimental that can be affected as data procedures, test and studies breaches or unavailability of results, test subject information services due to cyber-attacks go or drug formulas and is public attractive researchers or competitors
HEALTHCARE CYBERSECURITY IN 2020 KEY ASSETS OF HEALTHCARE ORGANIZATIONS THAT CYBERATTACKS TARGET Phishing / social Teleworking and Ransomware Third-party risks Data exfiltration engineering Telehealth risks Breaches can be caused by Business Email Compromise Typically, ransomware infects Healthcare organizations work Organizations are sending many different types of (BEC) scammers use a spoofed victim IT systems making them with numerous third parties to some of their workforce home incidents, and sensitive data email/texts or compromised inoperable unless a ransom is support their operations, and to keep them safe and help can be extracted/leaked by an account to trick employees into paid. It is done in one of three they are often managed minimize the spread of COVID- outsider or an insider initiating a money transfer to ways: across the organization, 19. Some health systems an alternate (fraudulent) making it difficult to have a might not be prepared for the Health Information is more ► Through phishing emails accounts view of all vendor relationships shift from in-office to remote valuable on the black market containing a malicious and related risks settings than credit card credentials or attachment regular Personally Identifiable Scammers may use COVID-19 ► Via a user clicking on a A number of recent data There are new risks evolving as Information (PII). Therefore, as a topic in phishing and malicious link breaches were caused by a result of the surge in there is a higher incentive for spam emails to increase vulnerabilities initially teleworking. For example, cyber criminals to target urgency in complying with exploited at third parties, and medical databases requests It is common to see an ► Unmanaged then used to access the software/assets increase in ransomware systems of the companies they attacks during a pandemic do business with ► Machines off company Credit card numbers can be network replaced, PHI cannot be replaced ► Patch deferrals
https://www.beckershospitalreview.com/finance/uhs-records- 944m-annual-profit-notes-cyberattack-cost-67m.html Cost: $67 million, $55 million in Q4 and $12 in Q1 of 2021 UNIVERSAL September to October of 2020 HEALTH SERVICES (UHS) Diverted patients to competitor hospitals RANSOMWARE Increased labor expenses to restore network Administrative functions in coding and billing delayed
RISKS OF A REMOTE WORKFORCE Insecure Home Networks • This include the Internet of Things (IoT) Expanded Attack Vectors • The vast majority of work is now happening over the Internet Limited Remediation • Infected devices require immediate attention Opportunities Strained Security Resources • Lack of cybersecurity resources that the average enterprise provides in house Isolated Information Technology • Devices contain vulnerabilities that can’t be addressed (IT) Assets 8
https://www.healthcareitnews.com/news/hackers- hit-nuance-again-2017-while-notpetya-cost-98-million- lost-revenue THIRD PARTY Increased Incidents Related To Vendors Regulators Focusing on RISKS Emerging Trends Supplier Risk Pressures from Economic Violatility Financial / Reputational Common Risks Legal & Regulatory Operational 9
RISKS OF CLOUD COMPUTING Contract violations Theft or loss of Compliance with clients intellectual Malware attacks End user control violations and/or business property partners Shared Denial of Service Loss of data Revenue loss vulnerabilities attacks 10
Security Awareness Training •Social Engineering / Phishing Penetration Testing PROACTIVE •White Hat Hackers SECURITY Proactive Endpoint and Network Monitoring •Machine Learning Threat Hunting and Threat Intelligence •Arm Skilled Staff with Data 11
Questions & Answers
You can also read