Story image

How to effectively address security challenges in a digital healthcare world

23 May 2018

Businesses operating in the healthcare industry are increasingly going digital – and protecting themselves from cybercriminals should be a core part of their business.

According to Wavelink, criminals are often looking to steal sensitive information or make money through ransomware attacks, which is why it’s important for healthcare firms to maintain organisation-wide security that is both up-to-date and automated.

The 2017 Ponemon Cost of a Data Breach report says that healthcare is the most expensive industry for data breaches across the world – often costing 2.5 times the global average across industries.

According to Wavelink’s Hugo Hutchinson, healthcare need to be aware of their responsibilities about protecting patients’ privacy as well as protecting themselves against attacks.

He suggests a multi-layered approach that includes firewalls, cloud security, advanced threat protection, application security, access management, network operation centres, and security operation centres.

Often there can be a large number of people and devices that need to access healthcare firms’ networks. Employees, patients, and visitors are likely to use their own devices, while the organisation’s own devices also need to be managed.

Wavelink notes that it can be hard to keep track of who is being given access to what parts of the network.

“Best practice is to enforce access policies for all users and devices. This requires micro-segmentation of the network using internal network security firewalls so people can only get into the parts of the network that they’re authorised to access,” Hutchinson explains.

Wavelink adds that it’s essential to have strong security policies and processes, but these must not hinder the organisation from providing excellent patient care.

This means applications must perform at expected levels without being compromised by security measures such as slow packet processing, content inspection, or policy management processing.

The company also states that advanced threat protection can help to minimise the risk of a successful cyber attack. Sandboxing is able to create an isolated, secure environment to validate incoming threats. It could then share that threat information with the security community and disrupt zero-day threats.

“Threats are emerging and evolving too fast for manual processes to keep up. Organisations can’t expect to adequately fight the growing threats just by throwing more resources at them; automation is the only answer. It’s faster and less error-prone than humans, and it’s better at prioritising threats so organisations don’t spend time fighting every apparent threat,” Hutchinson says.

“An automated system means security staff can work on minimising vulnerabilities and educating staff to help reduce the impact of human error on the organisation’s security.”

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.