CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Document

Healthcare Sector Threat Brief

LookingGlass

Reading Time: 2 mins read
in Document, Healthcare, Report

Executive Summary

Over the past several years, cybersecurity attacks targeting the healthcare industry have continued on an upward arc. These attacks are occurring alongside two worrying trends. First, the attack surface has expanded with electronic health records and more use of connected medical devices (e.g., the Internet of Medical Things, or IoMT). Secondly, adversaries have recognized the potential of exploiting older software tied to operational health technology that can be difficult to patch for vulnerabilities, such as compromising an X-ray or MRI machine.

In 2020, reports indicated that cyber-attacks on the healthcare industry more than doubled from 2019, with ransomware accounting for 28 percent of all attacks. While previous healthcare sector cyber-attacks focused primarily on providers, from large hospital systems to smaller private practices, the COVID-19 pandemic exposed vulnerabilities in the entire healthcare sector. Attackers, especially financial cyber criminals, targeted organizations involved in COVID-19 response, such as bio-pharmaceutical companies, university-based.

The purpose of this Threat Brief is to provide an overview of threats LookingGlass has observed from our external attack surface management solution and from regular open-source research and intelligence to support our customers. Healthcare sector organizations can use this Threat Brief to understand adversary/ actor profiles, motivations/objectives, and types of threats and tactics used by adversaries targeting the sector as a whole.

At LookingGlass, we have monitored the healthcare sector since 2009. We believe that understanding one’s cyber vulnerabilities, threats, and threat actors are critical to obtaining a more accurate view of one’s risk exposure. This holistic perspective is necessary for developing incident response plans, implementing mitigations, refactoring compensating controls, and informing adversary management strategies.

 

GET DOCUMENT

Tags: Covid-19DocumentsHealthcareHealthcare DocumentsHealthcare ReportsHealthcare Sector Threat BriefInternet of Medical ThingsIoMTLookingGlassReports
ADVERTISEMENT

Related Posts

Cybersecurity: A Self-Defense Guide

Cybersecurity: A Self-Defense Guide

February 5, 2023
Your digital footprint

Your digital footprint

February 5, 2023
An Insider’s Digital Footprint and Associated Risks

An Insider’s Digital Footprint and Associated Risks

February 5, 2023
WhoTracks.Me: Shedding light on the opaque world of online tracking

WhoTracks.Me: Shedding light on the opaque world of online tracking

February 5, 2023

More Articles

Navigating the Cybersecurity Career Path

December 22, 2021
Alerts

Apple security advisory (AV22-402)

July 21, 2022
Tool

Wifislax

October 20, 2020
Document

Active Directory Enumeration with PowerShell

November 25, 2020
Incidents

Twilio Customer Data Breached

August 8, 2022
Document

Incident Response Plan Template

April 29, 2022

Cross Platform Harassment

November 17, 2021
Certification

EXIN CERTIFIED INTEGRATOR SECURE CLOUD SERVICES

March 28, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.