Geopolitical uncertainty has dramatically increased the chances that healthcare organisations will experience more security attacks in the next couple years. Keith Bromley from Keysight Technologies shares his insights into the need for SecOps teams to prepare for even more ransomware attacks to extort money along with “lights out attacks” designed to cripple day to day operations.
The Threat is Real – Three Steps to Securing Your Healthcare Network.
The last two years have proven that the statement — “No one would want to hurt a hospital or healthcare clinic” — is a false narrative.
Cyberattacks against network servers in the healthcare sector rose 35% in 2020 and another 53% in 2021, according to Fortified Health Security reports.
Expect The Unexpected
A focus on cyber resiliency is key to your success.
Once a cyber-attack or breach has been launched, you obviously need to stop the threat.
However, it is just as important to get back to normal operations as fast as possible to maintain business continuity and satisfy patient needs.
The key to making cyber resiliency work safely is to engineer your security architecture with self-healing capabilities from the start.
See the highlight box below for some examples of engineered cyber resilience.
Bad actors are making sure that healthcare organizations either spend now on security defenses or pay later for ransoms, fines and lawsuits.
You can start the process with a three-point plan focused on prevention, detection, and vigilance.
Here are some focused recommendations from this three-point plan:
1. Deploy an inline security solution to reduce as many vulnerabilities within the network as possible
Inline security solutions are a high impact technique that address security threats, especially ransomware targeting healthcare networks.
These solutions can eliminate 90% or more of incoming security threats before they even enter your network.
(more…)
Tech Focus: The Threat is Real – 3 Steps to Securing Your Healthcare Network
Thursday, July 14th, 2022Geopolitical uncertainty has dramatically increased the chances that healthcare organisations will experience more security attacks in the next couple years. Keith Bromley from Keysight Technologies shares his insights into the need for SecOps teams to prepare for even more ransomware attacks to extort money along with “lights out attacks” designed to cripple day to day operations.
The Threat is Real – Three Steps to Securing Your Healthcare Network.
The last two years have proven that the statement — “No one would want to hurt a hospital or healthcare clinic” — is a false narrative.
Cyberattacks against network servers in the healthcare sector rose 35% in 2020 and another 53% in 2021, according to Fortified Health Security reports.
Expect The Unexpected
A focus on cyber resiliency is key to your success.
Once a cyber-attack or breach has been launched, you obviously need to stop the threat.
However, it is just as important to get back to normal operations as fast as possible to maintain business continuity and satisfy patient needs.
The key to making cyber resiliency work safely is to engineer your security architecture with self-healing capabilities from the start.
See the highlight box below for some examples of engineered cyber resilience.
Bad actors are making sure that healthcare organizations either spend now on security defenses or pay later for ransoms, fines and lawsuits.
You can start the process with a three-point plan focused on prevention, detection, and vigilance.
Here are some focused recommendations from this three-point plan:
1. Deploy an inline security solution to reduce as many vulnerabilities within the network as possible
Inline security solutions are a high impact technique that address security threats, especially ransomware targeting healthcare networks.
These solutions can eliminate 90% or more of incoming security threats before they even enter your network.
(more…)
Tags:commentary, healthcare, interviews, Keysight, networks, opinion, security byline, Tech Focus, technology
Posted in Business IT, Healthcare, Interview, Keysight, Opinion, Security, Tech Focus | 2 Comments »