As the healthcare industry continues to become increasingly more digital, more global healthcare organizations (HCOs) continue to suffer from data breaches.
That’s according to Thales eSecurity’s 2018 Thales Data Threat Report, Healthcare Edition, which is compiled of research from 451 interviews with 1,200 senior security executives across the globe.
The report found that only 30% have yet to suffer from a data breach, a 17% decrease from 2016.
Nearly 39% of HCOs were hit in the last year and 55% of respondents claimed they feel “very” or “extremely” vulnerable to data breaches.
This risk is only on the incline as nearly all HCOs (93%) use cloud, big data, IoT, and container technologies with sensitive data. The report also found that over half (54%) of HCOs are using 3+ infrastructure-as-service (IaaS) vendors, a third are using 50 software-as-a-service (SaaS) applications, and 54% are running 3+ platform-as-a-service (PaaS) environments.
Unsurprisingly, nearly all (96%) claim they are using IoT technologies, including internet-connected heart rate monitors, implantable defibrillators, and insulin pumps. With the increased adoption of these connected devices, the risk of a cyberattack continues to increase, including dangerous ransomware attacks on medical devices.
As healthcare providers increasingly become the ideal candidate for cybercriminals, it’s important to abide by HIPAA compliance but to also implement other additional IT security solutions that will detect and block ransomware before it can do damage to the organization and its patients.
Just last May the NHS was hit by the WannaCry ransomware campaign, locking staff out of their computers and left many trusts to divert emergency patients.
NNT offers an easy to use, but fully featured security and HIPAA compliance solution with HIPAA compliance reports built in based on both CIS and NIST 800-53 recommendation. These hardened build standards can be tailored to your specific healthcare and ePHI systems to ensure access rights and audit trails are provisioned correctly. NNT then monitors for compliance continuously to ensure that if any drift from your security configuration occurs, you can address it immediately before any damage is done.
Read the article on InfoSecurity Magazine