It’s no secret that everyone needs some form of healthcare at some point in their life. It is also no secret that this represents a $7Trillion+ spend which could exceed $8Trillion by 2020. So why are we surprised that cyber criminals target the healthcare industry specifically with malware, ransomware and phishing attacks amongst many others?
Yes, Cyber Criminals Do Target Healthcare
It turns out that healthcare is actually the most targeted industry for cyber criminals and bad actors. According to Jeff Goldman in his eSecurity Planet article titled “Healthcare Industry Suffers the Most Cyber Attacks”,
“Healthcare is the industry most frequently targeted by cyber attacks, with 164 threats detected per 1,000 host devices, according to a recent Vectra Networks study. Education came in second with 145 detections per 1,000 host devices.”
2018 HIMSS Cybersecurity Survey
The Healthcare Information and Management Systems Society (HIMSS) is a global, cause-based, not-for-profit organization focused on better health through information and technology and yearly they publish a survey of their findings on Cybersecurity for healthcare. The 2018 HIMSS Cybersecurity Survey provides insight into what healthcare organizations are doing to protect their information and assets, in light of increasing cyber-attacks and compromises impacting the healthcare and public health (“HPH”) sector based on input from 239 health information security professionals. According to their findings:
- “Healthcare organizations with cybersecurity programs are making positive efforts towards improvement. More resources are dedicated to cybersecurity programs. Proactive measures are taken as a result of regular risk assessments. Penetration testing and security awareness training are regularly conducted.
- Most healthcare organizations’ cybersecurity programs have room for improvement. Significant barriers exist for remediating and mitigating security incidents. Some organizations do not yet have formal insider threat management programs. Risk assessments widely vary from organization to organization.
- Looking to the future, healthcare organizations have certain concerns and priorities which will shape the direction of healthcare cybersecurity. More resources will continue to be dedicated to cybersecurity programs in the future.”
Clearly, what is needed now is a solution that will prevent malware from affecting your healthcare IT infrastructure. That way, the delays in uncovering a threat with some form of threat intelligence platform and then remediating the damage completely disappears and you can focus on quality of patient care instead of cyber threats.
Truly Evasion Proof Prevention For Healthcare Organizations
Unlike signature-based and behavior-based security, which have both proven to be evaded by determined cyber criminals with publicly documented techniques, Solebit’s SoleGATE, now part of the Mimecast family uses a static analysis which is faster, more accurate, not OS version dependent and covers 100% of your code, with complete visibility. With SoleGATE, every line of code is evaluated, making Sandbox evasion techniques ineffective. On average, Solebit analysis time is between milliseconds up to a few seconds. Network Sandboxes typically take 5-15 minutes to perform the same analysis.
Using deep inspection and analysis methods, SoleGATE is able to interpret and detect code in real time and immediately block threats from penetrating your organization. DvC™ has no assumptions on threat heuristics and behavior, and assumes that there is no legitimate reason for executable code to be present in a data file, it relies solely on identifying code existence on non-executables files
See for yourself what SoleGATE can do to deliver evasion proof security in your organization. Register for a demo today.