CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Document

Beyond Compliance: Cyber Threats and Healthcare

Fire Eye

Reading Time: 2 mins read
in Document, Healthcare, Report

EXECUTIVE SUMMARY

The healthcare vertical faces a range of threat actors and malicious activity. Given the critical role it plays within society and its relationship with our most sensitive information, the risk to this sector is especially consequential. In some cases, criminals seek to monetize personally identifiable information (PII) and protected health information (PHI); nation states carry out intrusions to steal valuable research and mass records for intelligence gathering purposes; and disruptive threats like ransomware have the potential to wreak havoc among hospital networks and impact the most critical biomedical devices and systems.

To move beyond compliance with current regulations and address the everchanging threat landscape, organizations in this sector should utilize threat intelligence to understand these threats continue to evolve and minimize risks appropriately.

Based on FireEye’s observances of threat activity across this vertical, the threats facing healthcare organizations can be grouped into the following:

Theft of Data
• Financially motivated threat activity represents a high-frequency, high-impact threat to healthcare organizations. Cybercrime actors may conduct focused intrusions into specific targets that house or have access to valuable patient records and data or carry out opportunistic targeting of poorly secured organizations and networks.
• In comparison to cybercrime activity, cyber espionage campaigns pose a lower frequency but still noteworthy impact risk to healthcare organizations, particularly those in some subsets of the industry. Much of what FireEye has observed from such threat actors—particularly those with a nexus to China—appears to be driven by an interest in acquiring medical research and collecting large data sets of information, potentially for the purposes of fostering intelligence operations.
• In our 2018 M-Trends report, FireEye observed that healthcare was the third-highest industry to be retargeted following an incident.

Disruptive and Destructive Threats
• Disruptive threats driven by extortionist cyber criminals and nation state actors continue to present a threat to continuity of operations for healthcare providers and others in this space.
• Both targeted activity such as ransomware delivered post-compromise, and less frequent but widespread nation-state-originated threats like WannaCry can pose threats to poorly secured infrastructure.
• Similar to operational technology networks within critical infrastructure, security organizations within healthcare providers face difficulties in maintaining visibility of threats targeting these systems.

Looking forward, the increasing number of biomedical devices used for critical functions within hospitals and healthcare providers presents a growing security challenge. Furthermore—given their importance and value—a growing willingness by cybercrime, or, in a period of heightened geopolitical tensions, nation state actors—to deploy disruptive and destructive tools may significantly increase the impact from these threats we have observed to date.

 

GET DOCUMENT

Tags: Beyond Compliance: Cyber Threats and HealthcareComplianceDocumentsFire EyeHealthcareHealthcare DocumentsHealthcare ReportsPersonally Identifiable InformationProtected Health Information (PHI)Reports
ADVERTISEMENT

Related Posts

Cybersecurity: A Self-Defense Guide

Cybersecurity: A Self-Defense Guide

February 5, 2023
Your digital footprint

Your digital footprint

February 5, 2023
An Insider’s Digital Footprint and Associated Risks

An Insider’s Digital Footprint and Associated Risks

February 5, 2023
WhoTracks.Me: Shedding light on the opaque world of online tracking

WhoTracks.Me: Shedding light on the opaque world of online tracking

February 5, 2023

More Articles

It’s 5 O’SOC Somewhere podcast: Episode 4: Threat Hunting

June 30, 2022
Alerts

Google Releases Security Updates for Chrome

March 2, 2022

Cox Media Group took down broadcasts after a ransomware attack

October 9, 2021
Cyber101

Data Governance – Definition

March 18, 2022

Evolution of ransomware gangs

March 25, 2021
Entertainment

Ed’s Edge – Podcast

January 29, 2023
Alerts

Ivanti Releases Security Update for Pulse Connect Secure

August 6, 2021
Certification

GBFA: GIAC Battlefield Forensics and Acquisition

April 19, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.