• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   Cybersecurity in Healthcare: a Unique Challenge

Cybersecurity in Healthcare: a Unique Challenge

  • Posted on:December 10, 2014
  • Posted in:Security
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

Well-established cybersecurity vendors like Trend Micro have long had something of a dual role in the industry. On the one hand, we work tirelessly around the clock and across the globe to keep businesses, governments and consumers safe from the latest security threats. But on the other, we’re also working to educate those individuals and organizations better about the threat landscape – to make the world a safer place in which to exchange digital information.

Healthcare is a focus for us right now on both counts. It’s a sector increasingly targeted by cybercriminals but also one in which some organizations have been slow to react to the threat of data breaches of Patient Health Information (PHI).

The goods

Healthcare records represent an extremely attractive target for cybercriminals, containing as they do various bits of sensitive information like Social Security numbers all in one place. This treasure trove of data can fetch a high price on the underground markets of the dark web, as it gives cybercriminals a greater chance of success in identity fraud campaigns. Given the value of this data, it is clear why the Identity Theft Resource Center’s latest 2014 Data Breach Category Summary found that healthcare accounted for 43 percent of all breaches year-to-date.

With this kind of backdrop, it’s not surprising that the non-profit ECRI Institute listed “data integrity failures with health IT systems” as its number one patient safety concern for 2014. When you see that this came above even drug shortages or test result reporting errors, it’s obviously a serious issue.

Top challenges

The challenge for IT and security professionals working in healthcare is that they must improve data protection without impeding healthcare professionals’ speedy access to potentially life-saving patient information. Combined with the sheer size and complexity of many hospital IT environments, it’s certainly an uphill task, but it’s not an impossible one.

Here’s a brief list of some key challenges facing health IT workers:

  • BYOD, Big Data, Internet of Everything
  • Incident Response – Cyber Disaster Recovery
  • Virtual Desktop Infrastructure – Mobile Computing
  • Access Control
  • PHI DLP
  • Application Vulnerabilities (legacy and new)

With the attacks themselves getting more covert, targeted and insidious, health IT workers will have to up their game to minimize the risk of more damaging PHI losses. In the next two blog posts, we’ll explore how threat intelligence and a few key best practice steps can help.

Related posts:

  1. Deep Discovery Success Drives Pioneering Healthcare Info Sharing Scheme
  2. Healthcare field looks to take on cloud security challenge
  3. Leading by Example at the HITRUST Annual Healthcare Cybersecurity Conference
  4. Teaming Up with HITRUST to Raise Cybersecurity Standards in Healthcare

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.