DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Document

Beyond Compliance: Cyber Threats and Healthcare

Fire Eye

Reading Time: 2 mins read
in Document, Healthcare, Report

EXECUTIVE SUMMARY

The healthcare vertical faces a range of threat actors and malicious activity. Given the critical role it plays within society and its relationship with our most sensitive information, the risk to this sector is especially consequential. In some cases, criminals seek to monetize personally identifiable information (PII) and protected health information (PHI); nation states carry out intrusions to steal valuable research and mass records for intelligence gathering purposes; and disruptive threats like ransomware have the potential to wreak havoc among hospital networks and impact the most critical biomedical devices and systems.

To move beyond compliance with current regulations and address the everchanging threat landscape, organizations in this sector should utilize threat intelligence to understand these threats continue to evolve and minimize risks appropriately.

Based on FireEye’s observances of threat activity across this vertical, the threats facing healthcare organizations can be grouped into the following:

Theft of Data
• Financially motivated threat activity represents a high-frequency, high-impact threat to healthcare organizations. Cybercrime actors may conduct focused intrusions into specific targets that house or have access to valuable patient records and data or carry out opportunistic targeting of poorly secured organizations and networks.
• In comparison to cybercrime activity, cyber espionage campaigns pose a lower frequency but still noteworthy impact risk to healthcare organizations, particularly those in some subsets of the industry. Much of what FireEye has observed from such threat actors—particularly those with a nexus to China—appears to be driven by an interest in acquiring medical research and collecting large data sets of information, potentially for the purposes of fostering intelligence operations.
• In our 2018 M-Trends report, FireEye observed that healthcare was the third-highest industry to be retargeted following an incident.

Disruptive and Destructive Threats
• Disruptive threats driven by extortionist cyber criminals and nation state actors continue to present a threat to continuity of operations for healthcare providers and others in this space.
• Both targeted activity such as ransomware delivered post-compromise, and less frequent but widespread nation-state-originated threats like WannaCry can pose threats to poorly secured infrastructure.
• Similar to operational technology networks within critical infrastructure, security organizations within healthcare providers face difficulties in maintaining visibility of threats targeting these systems.

Looking forward, the increasing number of biomedical devices used for critical functions within hospitals and healthcare providers presents a growing security challenge. Furthermore—given their importance and value—a growing willingness by cybercrime, or, in a period of heightened geopolitical tensions, nation state actors—to deploy disruptive and destructive tools may significantly increase the impact from these threats we have observed to date.

 

GET DOCUMENT

Tags: Beyond Compliance: Cyber Threats and HealthcareComplianceDocumentsFire EyeHealthcareHealthcare DocumentsHealthcare ReportsPersonally Identifiable InformationProtected Health Information (PHI)Reports
ADVERTISEMENT

Related Posts

2023 Nonprofit Cybersecurity Incident Report

2023 Nonprofit Cybersecurity Incident Report

May 19, 2023
2023 Email Security Threat Report

2023 Email Security Threat Report

May 19, 2023
2023 State of Passwordless Security

2023 State of Passwordless Security

May 19, 2023
Teen Safety in Cyberspace

Teen Safety in Cyberspace

May 19, 2023

More Articles

Cyber101

Hybrid attack – Definitions

March 27, 2023
Definition

Passive Digital Footprint – Definitions

February 3, 2023

Arrested DevOps – Podcast

January 27, 2022
Book

Malware Forensics Field Guide for Linux Systems

December 13, 2021

Small cell densification

April 3, 2021
Incidents

Finland’s parliament hit with cyberattack

August 11, 2022
Book

EU GDPR: A Pocket Guide – Book

March 22, 2022
News

Sekoia.io Raises €35M for Expansion

May 25, 2023
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.