As the healthcare industry continues to become increasingly more digital, more global healthcare organizations (HCOs) continue to suffer from data breaches.

That’s according to Thales eSecurity’s 2018 Thales Data Threat Report, Healthcare Edition, which is compiled of research from 451 interviews with 1,200 senior security executives across the globe.

The report found that only 30% have yet to suffer from a data breach, a 17% decrease from 2016.

Nearly 39% of HCOs were hit in the last year and 55% of respondents claimed they feel “very” or “extremely” vulnerable to data breaches.

This risk is only on the incline as nearly all HCOs (93%) use cloud, big data, IoT, and container technologies with sensitive data. The report also found that over half (54%) of HCOs are using 3+ infrastructure-as-service (IaaS) vendors, a third are using 50 software-as-a-service (SaaS) applications, and 54% are running 3+ platform-as-a-service (PaaS) environments.

Unsurprisingly, nearly all (96%) claim they are using IoT technologies, including internet-connected heart rate monitors, implantable defibrillators, and insulin pumps. With the increased adoption of these connected devices, the risk of a cyberattack continues to increase, including dangerous ransomware attacks on medical devices.   

As healthcare providers increasingly become the ideal candidate for cybercriminals, it’s important to abide by HIPAA compliance but to also implement other additional IT security solutions that will detect and block ransomware before it can do damage to the organization and its patients.

Just last May the NHS was hit by the WannaCry ransomware campaign, locking staff out of their computers and left many trusts to divert emergency patients.

NNT offers an easy to use, but fully featured security and HIPAA compliance solution with HIPAA compliance reports built in based on both CIS and NIST 800-53 recommendation. These hardened build standards can be tailored to your specific healthcare and ePHI systems to ensure access rights and audit trails are provisioned correctly. NNT then monitors for compliance continuously to ensure that if any drift from your security configuration occurs, you can address it immediately before any damage is done.

 

Read the article on InfoSecurity Magazine

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.