Using Threat Intelligence to Protect Healthcare

Cyber attacks in the healthcare industry damage much more than reputations and bottom lines. A single ransomware attack can shut down critical care systems, creating dire consequences for patients. With the rise in this class of cyberattack, healthcare organizations are once again challenged to not only protect their patients and their data, maintain HIPAA compliance, maintain and merge old systems with new technology, protect their remote users, but protect the entire healthcare network from complete failure and lockout—resulting in loss of reputation, potential lawsuit, huge payouts, and in extreme cases, loss of life

Impact of Cyber Attacks on Healthcare

  • 93% of Healthcare Orgs Experienced a Data Breach
  • $10.9M = Average Cost of a Healthcare Data Breach
  • 385M = Number of patient records exposed since 2010

Key Risk Factors

Mounting Cyber Threats

Cyber attacks against healthcare are growing exponentially and having a devastating impact. Ransomware in particular has become a common attack facing healthcare resulting in loss of patients personal identifiable information (PII), costly financial loss, and potentially severe system lockout repercussions.

Regulatory Compliance

HIPAA regulatory compliance is top of mind for the healthcare industry. Healthcare organizations find themselves at risk for both major cyberattacks, as well as financial and criminal penalties under HIPAA regulation when they do not have the appropriate tools in place.

Third-Party, IoT, and Supply Chain Weaknesses

As our healthcare networks and systems have become more interconnected, threat actors are targeting systems and networks that leverage third-party software to attack healthcare systems’ networks. To make matters worse, many healthcare devices and proprietary software needed for patient care are left unpatched and vulnerable for threat actors to exploit.

Challenges Incorporating Threat Intelligence

Proprietary Vendor Perspective

Threat Intelligence from NGFW vendors is proprietary and offers a narrow view of the threat landscape. The ability to take action on threat intelligence from multiple sources is paramount to protecting from today’s targeted attacks.

Accessing Threat Intelligence Sources

There are a plethora of threat intelligence sources including industry specific (LS-ISAO), to commercial sources (DomainTools). The ability to incorporate multiple, trusted sources and then grow as needed, is key.

Operationalizing Threat Intelligence

Managing threat intelligence can be expensive and time consuming. How much threat intelligence is enough? Is there security “know-how” to use it? How well does threat intelligence play with NGFWs? Selecting the right solution is critical.

Use Cases

Admin area