Omnia Health is part of the Informa Markets Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Is healthcare losing the cybersecurity battle?

TAGS: IoT
cybersecurity-1.jpg
When you factor in how long it takes to discover a data breach, it suggests that healthcare is losing the battle against cyber adversaries.

Over the years, a few things have become clear about cyber-attacks in the healthcare industry. Through our own research as well as in the wider industry context, we know the real threat is already in healthcare networks in the form of privileged access misuse — the growth in healthcare internet of things (IoT) devices is overwhelming and dangerous and a majority of attacks occur due to negligence and a lack of security awareness by insiders.

Within the healthcare industry many people have access to patient medical records, making it very easy, and perhaps a bit enticing, for some to take advantage of that privilege. Internal actors — meaning employees who access patient data out of curiosity or to commit identity fraud — are largely responsible for healthcare data loss, and healthcare is the only industry where this occurs at such an alarming rate. Indeed, our own research demonstrated that human error and misuse occurred more frequently in the healthcare industry than external threats such as hacking or ransomware.

While most of us worry about cyber-attacks from someone we’ve never met, security professionals in healthcare mostly worry about the people they talk to in the break room. Even worse, motives seem to be a mix between financial gain — patient records are the most valuable form of digital personal data — and simple curiosity. Those who are curious simply want to know what’s going on with others and the information is there for the taking.

The ongoing proliferation of the IoT in the medical industry doesn’t help either. These medical devices improve clinical care and outcomes but produce massive volumes of data about every patient who comes through the door, and most healthcare organisations don’t have a way to track what or where those devices are, or where they’re connecting to.

IoT devices might be the easiest target for attackers. There are lots of them, a hospital or other healthcare organisation rarely knows how many exist on their site at any one time, and security is often not seen as a priority, especially over clinical imperatives. However, the risk is one that needs to be taken seriously. We’ve seen cyber-attacks evolve from authenticating through default admin passwords and using IoT for botnets, to the outright destruction of IoT devices by wiping their drives. Wiped devices can be restored, but the impact is greater if those are needed to deliver critical care.

Take connected insulin pumps for example. Just last year, U.S. medical device company, Medtronic, recalled a number of insulin pumps after discovering they had potential cybersecurity risks and were vulnerable to hacks. Furthermore, in October 2019, the U.S. Food and Drug Administration (FDA) warned patients, medical providers and hospitals, that software in some medical devices could allow hackers to take control of items that connect to wireless networks or find a back door into entire hospital networks.

When you factor in how long it takes to discover a data breach, it suggests that healthcare is losing the battle against cyber adversaries. It’s not acceptable to find out weeks, months or years after a breach occurs, but unfortunately, that is what’s happening. So, what can be done?

 The answer lies in 360-degree visibility inside the network. This includes the need to monitor across the cloud, data centre, IoT devices, and enterprise networks, as well as having the ability to carry out real-time attacker detection while prioritising all the detected threats so you know where to start. However, that answer must address the challenges mentioned above, and there are four key parts to it.  

 First, it’s important to eliminate the manual, time-consuming work of security analysts by implementing the capability to automate and prioritise detected threats. Second, look at lowering the skills barrier needed to hunt down cyber threats. Third, consider that everything is connected, which makes for an easy target and a huge attack surface. And finally, and perhaps the most vital aspect, provide visibility inside the network to see attackers — where they are, what they’re doing, and the compromised hosts and workloads they’ve exploited, or could potentially exploit.

This fundamental approach is advocated by a growing number of healthcare security professionals. Many of these are augmenting their security teams with AI-derived machine learning models to automate the early detection of cyber attackers, speed up incident response, investigate conclusively, and hunt for threats efficiently.

It’s a battle that has been won by many healthcare organisations, but the industry still has work to do to ensure the protection of all of its patients, as well as their data.

Ammar Enaya - regional director METNA - Vectra - 1.jpg

Ammar Enaya
 
This article appears in the latest issue of Omnia Health Magazine. Read the full issue online today, covering cybersecurity in healthcare, the ongoing rise of telehealth and much more.  
Hide comments
account-default-image

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish