Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Healthcare

Cybersecurity in Healthcare: Beyond the Myths

This article was originally published at TheHackerNews Let's begin with a thought-provoking question: among a credit card number, a social security number, and an Electronic Health Record (EHR), which commands the highest price on a dark web forum? Surprisingly, it's the EHR, and the difference is stark: according to a study, EHRs can sell for up to $1,000 each, compared to a mere $5 for a credit card number and $1 for a social security number.

Guest Blog: Bolstering Medical Cybersecurity - How ZTNA Platforms Stand as Guardians

A guest blog, written by Jaye Tilson, Field CTO at HPE Aruba. The healthcare industry, the very lifeline entrusted with safeguarding our most sensitive data, is under relentless attack. Cybercriminals see medical records, financial information, and even critical patient monitoring data as their golden goose, with breaches inflicting unimaginable harm. In this ever-evolving threat landscape, healthcare companies must prioritize building robust cybersecurity strategies.

3 Key Areas to Consider for Data Protection in Healthcare

A Zero Trust Approach to Protect Data Privacy Data protection in healthcare is critical. From the hospitals at the front line, to the insurance providers behind the scenes, all such organizations bear the dual responsibility of protecting themselves, as well as their patients. They must safeguard their data privacy, identity, security, and finances of their patients. They must also protect their own organization from costly breaches, regulatory fines, and damage to their business, reputation, and patient relationships.

Transforming and Securing Healthcare with Rubrik

With the digitalization of patient data, the healthcare industry has significantly improved and transformed healthcare processes. This shift to digital data has brought many benefits, like improved quality of care, reduction in errors, and improved communication. However, the shift to digitalization has also led to the exponential collection of data, which is primarily unstructured. To put things in perspective, a typical healthcare and life sciences organization manages over 32.6 million sensitive files.

How to Strengthen Cybersecurity in the Healthcare Industry

Technology is a crucial part of today’s healthcare and pharmaceutical industries. Advances in medical devices, data use, and interconnected systems have significantly improved patient care, reduced costs, and increased efficiency. However, as the sector’s reliance on technology grows, so does the risk of cyberattacks.

Why Therapists need Data Protection and Cybersecurity

Did you know the New-Age Therapeutic sector is unregulated? If that surprises you, then you’re not alone. I was a little surprised, too. Yes, there are various professional bodies a practitioner can join, and there are courses they can attend, but they aren’t forced to.

Mental Health Center Targeted by Disruptions, Quarter of a Million Exposures

The Harris Center for Mental Health and Intellectual and Developmental Disabilities (IDD) has six regional locations and assists those with behavioral health and developmental needs. Every year, they serve thousands within Harris County and deliver over a million services nationwide. In November, Harris experienced a network disruption; an unauthorized actor accessed and compromised the data of 238,463 individuals within Harris’ network.

Singing River Health Strangled by Network Ransomware Encryptions

Singing River Health System (SRHS) is a healthcare network located in the tail of Mississippi (and northern Alabama). They provide a comprehensive network of medical services for residents, including cancer, emergency, hospice, pediatrics, and urgent care. SRHS’ emergency departments at Gulfport Hospital, Ocean Springs Hospital, and Pascagoula Hospital serve over 100,000 patients yearly.

Why Do Hackers Want Medical Records?

Hackers want stolen medical records to commit identity theft, use the stolen data as a ransom, sell it on the dark web or impersonate the victim to receive medical services. Medical records are valuable to cybercriminals as they allow cybercriminals to commit fraud and go undetected longer than they can with other Personally Identifiable Information (PII).