| |||||||||
| |||||||||
Current Filter: Network>>>>>News> Why protecting healthcare records from cyber attacks is a game of cat and mouse Editorial Type: News Date: 03-2015 Views: 2512 Key Topics: Networking Security Health Sector Cybercrime Data Breaches DM/ECM Key Companies: Lancope Key Products: Key Industries: Education Health Insurance | |||
By Mike Potts, CEO, Lancope. The never-ending battle between healthcare organisations and cyber attackers has always been like a game of cat and mouse. The hacker plays the role of the mouse, constantly trying to sneak past the company’s cat that is guarding information. For years, the cat not only consistently beat the mouse, he would help his fellow cats identify new mice and keep them out of their cupboards too. But as the successful data breaches over the past year demonstrate, including one earlier this year that made headlines after millions of health insurance records were compromised, the mice are now kicking the cats in their tails. As the healthcare sector continues its collective effort to move to a 100-percent electronic records system, these recent attacks should serve to do two things. First, it should shine a light on why your existing cybersecurity system is likely inadequate – even if it complies with HIPAA’s Security Rule. Second, it should prompt you to immediately call your CSO, CIO and IT administrators into your office to overhaul your security posture and establish new employee education and incident response training programs. While you may not have thought of this industry as a primary target for attackers, I hope you understand that cyber criminals consider healthcare information just as valuable as credit card numbers and other financial records if not more so given the longer shelf life of social security numbers and other personal information. And furthermore, traditional security solutions alone are incapable of keeping thieves out of your network. Healthcare security needs a more holistic approach that keeps watch both outside and inside your network and can help your security personnel more quickly identify and remediate threats. Here is why:
A Game of Cat and Mouse In fact, the cat often does not even realise the mouse has snuck in and has been sitting for weeks, possibly months, stealing whatever it finds valuable. The solution is not to add more cats that keep their ever-watchful eyes trained outside your network in order to spot outside attackers from trying to get in. That’s still important, the cat hasn’t become obsolete. But now building a better mouse trap requires a more holistic approach that guards both from the outside-in and from the inside-out. This requires monitoring activity across your entire network in real time, including who is accessing and moving data stored in third party cloud-based services like Dropbox or Salesforce.com. Simply put, security cannot be a one-time “set it and forget it†process. In addition to implementing technology tools to enable you to see who is in your network and what, exactly, they are doing, you need to educate and train all of your employees, not just those in the IT department. Practice makes perfect. Just as you run regular fire drills, do the same to ensure your teams know what to do when a security threat is identified outside or inside your network? You want to put out a fire in a trash can long before it becomes a blaze that engulfs the whole building and causes irreparable damage.
A Holistic Approach Also, for more information about just how serious the insider threat has become to healthcare organisations, please review our infographic “The Reality of Insider Threatsâ€Â here: http://www.lancope.com/resources/infographics/reality-insider-threats | |||
Like this article? Click here to get the Newsletter and Magazine Free! | |||
Email The Editor! OR Forward Article | Go Top | ||
PREVIOUS | NEXT |