HEALTHCARE CYBERSECURITY 2021 - ANDY HEINS & SCOTT BREECE

Page created by Roberto Luna
 
CONTINUE READING
HEALTHCARE CYBERSECURITY 2021 - ANDY HEINS & SCOTT BREECE
HEALTHCARE CYBERSECURITY 2021
ANDY HEINS & SCOTT BREECE
AGENDA

   Learning Objectives
   Healthcare Attacks
   2020 Cybersecurity Review
   Ransomware
   Remote Workforce
   Third Party Risk
   Risks of Cloud Computing
   Proactive Security
   Top Security Trend for 2021
   Q&A
LEARNING OBJECTIVES

       1                   2                      3                      4
  Understand the       Explain the new      Analyze your risk       Demonstrate the
    Impacts of     landscape as a result   exposure that third   risks associated with
   ransomware       of the pandemic, the   parties present to    on premise solutions
                      remote workforce      your organization      being relocated to
                                                                    someone’s cloud
HEALTHCARE ATTACKS
HEALTHCARE CYBERSECURITY IN 2020
 KEY ASSETS OF HEALTHCARE ORGANIZATIONS THAT CYBERATTACKS TARGET

   Patient’s health that can be              Patient’s health records includes            Availability of healthcare
affected by tampering availability            valuable personally identifiable            services including critical
    of medical devices, patient               information (PII) and protected               clinical services and
     health records, medicine                 health information (PHI). These              administrative services
   inventory system and power                have huge monetary value in the
     supply or HVAC systems                             black market

                        Intellectual property assets                   Reputation of the organization
                           includes experimental                        that can be affected as data
                        procedures, test and studies                    breaches or unavailability of
                      results, test subject information               services due to cyber-attacks go
                           or drug formulas and is                                 public
                          attractive researchers or
                                 competitors
HEALTHCARE CYBERSECURITY IN 2020
   KEY ASSETS OF HEALTHCARE ORGANIZATIONS THAT CYBERATTACKS TARGET
   Phishing / social                                                                                         Teleworking and
                                          Ransomware                     Third-party risks                                                    Data exfiltration
     engineering                                                                                             Telehealth risks

                                                                                                                                          Breaches can be caused by
Business Email Compromise         Typically, ransomware infects      Healthcare organizations work      Organizations are sending         many different types of
(BEC) scammers use a spoofed      victim IT systems making them      with numerous third parties to     some of their workforce home      incidents, and sensitive data
email/texts or compromised        inoperable unless a ransom is      support their operations, and      to keep them safe and help        can be extracted/leaked by an
account to trick employees into   paid. It is done in one of three   they are often managed             minimize the spread of COVID-     outsider or an insider
initiating a money transfer to    ways:                              across the organization,           19. Some health systems
an alternate (fraudulent)                                            making it difficult to have a      might not be prepared for the     Health Information is more
                                  ►   Through phishing emails
accounts                                                             view of all vendor relationships   shift from in-office to remote    valuable on the black market
                                      containing a malicious
                                                                     and related risks                  settings                          than credit card credentials or
                                      attachment
                                                                                                                                          regular Personally Identifiable
Scammers may use COVID-19
                                  ►   Via a user clicking on a       A number of recent data            There are new risks evolving as   Information (PII). Therefore,
as a topic in phishing and
                                      malicious link                 breaches were caused by            a result of the surge in          there is a higher incentive for
spam emails to increase
                                                                     vulnerabilities initially          teleworking. For example,         cyber criminals to target
urgency in complying with
                                                                     exploited at third parties, and                                      medical databases
requests                          It is common to see an                                                ►   Unmanaged
                                                                     then used to access the                software/assets
                                  increase in ransomware             systems of the companies they
                                  attacks during a pandemic          do business with                   ►   Machines off company          Credit card numbers can be
                                                                                                            network                       replaced, PHI cannot be
                                                                                                                                          replaced
                                                                                                        ►   Patch deferrals
https://www.beckershospitalreview.com/finance/uhs-records-
                 944m-annual-profit-notes-cyberattack-cost-67m.html

                 Cost: $67 million, $55 million in Q4 and $12 in Q1 of 2021

UNIVERSAL        September to October of 2020
HEALTH
SERVICES (UHS)   Diverted patients to competitor hospitals
RANSOMWARE
                 Increased labor expenses to restore network

                 Administrative functions in coding and billing delayed
RISKS OF A REMOTE WORKFORCE

   Insecure Home Networks         • This include the Internet of Things (IoT)

   Expanded Attack Vectors        • The vast majority of work is now happening over the Internet

     Limited Remediation          • Infected devices require immediate attention
        Opportunities

 Strained Security Resources      • Lack of cybersecurity resources that the average enterprise provides in house

Isolated Information Technology   • Devices contain vulnerabilities that can’t be addressed
            (IT) Assets

                                                                                                                    8
https://www.healthcareitnews.com/news/hackers-
              hit-nuance-again-2017-while-notpetya-cost-98-million-
              lost-revenue

THIRD PARTY                                   Increased Incidents Related To
                                              Vendors
                                              Regulators Focusing on
RISKS         Emerging Trends                 Supplier Risk
                                              Pressures from Economic
                                              Violatility

                                              Financial / Reputational
              Common Risks                    Legal & Regulatory
                                              Operational

                                                                               9
RISKS OF CLOUD COMPUTING

                                                                                 Contract violations
Theft or loss of
                         Compliance                                                 with clients
  intellectual                             Malware attacks    End user control
                          violations                                              and/or business
    property
                                                                                      partners

               Shared           Denial of Service
                                                      Loss of data        Revenue loss
            vulnerabilities         attacks

                                                                                                  10
Security Awareness Training

            •Social Engineering / Phishing

            Penetration Testing

PROACTIVE   •White Hat Hackers
SECURITY
            Proactive Endpoint and Network Monitoring

            •Machine Learning

            Threat Hunting and Threat Intelligence

            •Arm Skilled Staff with Data

                                                        11
Questions & Answers
You can also read