SlideShare a Scribd company logo
1 of 31
Understanding the Impact of
Cyber Security in Health
Care
©Blue Cross Blue Shield of Michigan
Why is Cyber Security Crucial
for the Health Care Industry?
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Illegal hacking
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Illegal hacking
Ransomware
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Illegal hacking
Ransomware
Malware
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Illegal hacking
Ransomware
Malware
Phishing
There is an endless amount of personal data
shared and stored on the internet, including
members’ health care information…
Cyber Security is Critical
There is an endless amount of personal data
shared and stored on the internet, including
members’ health care information…
…Cyber security is the first line of defense in
ensuring it is safely shared and strongly
protected.
Cyber Security is Critical
How Has the Landscape of
Cyber Security Evolved?
Online threats against health care data and
information have become increasingly
sophisticated, driving Blue Cross’ IT team to
continually evolve its protective measures to
remain first-in-class for data protection.
Over the Years
Historically, hackers have been more focused on
wreaking havoc within the financial service sector.
However, stealing health care information has become
more lucrative by selling it to hackers on the “dark
web.”
Cyber Crime is “Big Business”
Ransomware is used as a form of extortion, holding
data hostage until payment is received. To activate,
simply calls for a click on the wrong link by an
unsuspecting user, like a company employee.
Cyber Crime is “Big Business”
Malware, or malicious software, is computer
software created solely with the intent of harming
and devices, making their functions inactive.
Cyber Crime is “Big Business”
Case in Point
In May and June 2017, the “WannaCry” and “Petya” ransomware attacks
affected the computer systems of governmental and professional
associations in Ukraine, France, India, as well as some hospitals and
health care organizations in the United States.
Upon attempting to use their computer, users affected with these
programs received a message stating that their files had been encrypted
and that a payment of $300-$410 worth of Bitcoin (a form of digital
currency) was required to be able to access their data.
Experts say that “WannaCry” is the
worst digital event to occur in
recent years, affecting more than
200,000 systems.
Combined, these two attacks
affected more than 210,000
systems in 150 countries,
compromising millions of pieces
of member and user information
globally.
Case in Point
Cyber crime manipulates the
unsuspecting and victimizes
the vulnerable.
How Do We Secure
Member Data?
Data Security is a Team Effort
Blue Cross’ IT employees are a critical line of defense – they
are educated on an ongoing basis about how to recognize
potential threats to Blue Cross and member data.
Our social engineering exercises equip our employees with
the tools they need to identify tricks used by hackers to
infiltrate our system.
Data Security is a Team Effort
These social engineering exercises consist of trainings and tests
completed throughout the year, with employees chosen at
random to see if they are able to identify a phishing email.
Data Security is a Team Effort
These social engineering exercises consist of trainings and tests
completed throughout the year, with employees chosen at
random to see if they are able to identify a phishing email.
We consider it successful when they correctly identify a phishing
email, in addition to an opportunity for education when they are
having difficulty identifying them.
Data Security is a Team Effort
Social engineering exercises consist of trainings and tests completed
throughout the year, with employees chosen at random to see if they
are able to identify a phishing email.
We consider it successful when they correctly identify a phishing
email, in addition to an opportunity for education when they are
having difficulty identifying them.
This helps us strengthen security awareness and training programs so
we can better understand our employees’ thought process in
identifying scams, as well as keep a pulse on the evolution of hackers’
sophisticated schemes.
Secure Health Care Service
We also assess the cyber threat landscape to stay one step ahead
of hackers and others with malicious intent who are looking to
threaten Blue Cross or member security.
We connect with experts who are able to plug into trends on the
dark web for insights on how to proactively prepare for hackers
actively working to obtain information illegally.
Identifying ways hackers can
gain access is key to stopping
attacks before they happen.
The Blue Cross IT Team
As a company, we invest in creating new IT positions as
technology continues to advance.
As a tech employer, we find value in hiring candidates with a
variety of professional backgrounds, providing them room to
grow and expand their skillsets.
Just as hackers don’t all come from the same background,
Information Security experts who bring in a variety of
experiences can bring valuable insights to the profession.
Investing in Employees and the Future
It is a commonly-held misconception that IT
professionals have to have a technological
background…
A Place For Everyone
It is a commonly-held misconception that IT
professionals have to have a technological
background…
…However, the ability to learn new skills,
problem solve and adapt to new situations are
key strengths of an IT team member.
A Place For Everyone
There are a number of careers one can pursue as a
member of the Blue Cross IT team, including:
A Place For Everyone
Security
Analyst
Applications
Security
Testing
Engineering and
Architecture
The route to becoming an IT
professional can be curved,
with opportunities to develop a
variety of skills that contribute
to success.
To learn more about Blue Cross IT and
opportunities to join our team, visit:
MIBlueTech.com
Blue Cross Blue Shield of Michigan and Blue Care Network are nonprofit corporations and independent licensees of
the Blue Cross and Blue Shield Association.

More Related Content

What's hot

What's hot (20)

[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 

Similar to Understanding the Impact of Cyber Security in Health Care

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 

Similar to Understanding the Impact of Cyber Security in Health Care (20)

Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
 
A handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needsA handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needs
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Unlocking Lucrative Career Paths with Information Security Training.pdf
Unlocking Lucrative Career Paths with Information Security Training.pdfUnlocking Lucrative Career Paths with Information Security Training.pdf
Unlocking Lucrative Career Paths with Information Security Training.pdf
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 

More from Blue Cross Blue Shield of Michigan

More from Blue Cross Blue Shield of Michigan (19)

The Blue Cross ENGAGE Portal: Your Resource for Employee Education
The Blue Cross ENGAGE Portal: Your Resource for Employee EducationThe Blue Cross ENGAGE Portal: Your Resource for Employee Education
The Blue Cross ENGAGE Portal: Your Resource for Employee Education
 
The Go-To Handbook for the Newly Insured
The Go-To Handbook for the Newly InsuredThe Go-To Handbook for the Newly Insured
The Go-To Handbook for the Newly Insured
 
Top Nine Questions Around Open Enrollment
Top Nine Questions Around Open EnrollmentTop Nine Questions Around Open Enrollment
Top Nine Questions Around Open Enrollment
 
Manufacturers build a better benefits package with private exchange
Manufacturers build a better benefits package with private exchangeManufacturers build a better benefits package with private exchange
Manufacturers build a better benefits package with private exchange
 
How to tell if your employees should be wearing protective eye wear
How to tell if your employees should be wearing protective eye wear How to tell if your employees should be wearing protective eye wear
How to tell if your employees should be wearing protective eye wear
 
Types of specialty benefits
Types of specialty benefitsTypes of specialty benefits
Types of specialty benefits
 
Gift Guide for the Sports Enthusiast
Gift Guide for the Sports Enthusiast Gift Guide for the Sports Enthusiast
Gift Guide for the Sports Enthusiast
 
Gift Guide for the Health Guru
Gift Guide for the Health GuruGift Guide for the Health Guru
Gift Guide for the Health Guru
 
Your tour of tart cherries
Your tour of tart cherriesYour tour of tart cherries
Your tour of tart cherries
 
The where of health care matters
The where of health care mattersThe where of health care matters
The where of health care matters
 
Guy's guide to their health
Guy's guide to their healthGuy's guide to their health
Guy's guide to their health
 
Common Health Insurance Terms
Common Health Insurance TermsCommon Health Insurance Terms
Common Health Insurance Terms
 
Hey Michigan, let's kick breast cancer
Hey Michigan, let's kick breast cancerHey Michigan, let's kick breast cancer
Hey Michigan, let's kick breast cancer
 
Michigan cares about diabetes prevention
Michigan cares about diabetes preventionMichigan cares about diabetes prevention
Michigan cares about diabetes prevention
 
Healthcare reform overview for employers, delivered 5/15/13
Healthcare reform overview for employers, delivered 5/15/13Healthcare reform overview for employers, delivered 5/15/13
Healthcare reform overview for employers, delivered 5/15/13
 
BCBSM Testimony about SB 61 and 62
BCBSM Testimony about SB 61 and 62BCBSM Testimony about SB 61 and 62
BCBSM Testimony about SB 61 and 62
 
Most Favored Nation status and competing health plans
Most Favored Nation status and competing health plansMost Favored Nation status and competing health plans
Most Favored Nation status and competing health plans
 
A Healthier Michigan's Diabetes eCookbook
A Healthier Michigan's Diabetes eCookbookA Healthier Michigan's Diabetes eCookbook
A Healthier Michigan's Diabetes eCookbook
 
Presented to the Michigan Senate Insurance Committee
Presented to the Michigan Senate Insurance CommitteePresented to the Michigan Senate Insurance Committee
Presented to the Michigan Senate Insurance Committee
 

Recently uploaded

Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Sheetaleventcompany
 
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Sheetaleventcompany
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
dilpreetentertainmen
 
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Sheetaleventcompany
 
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Sheetaleventcompany
 
💚 Low Rate Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
💚 Low Rate  Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...💚 Low Rate  Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
💚 Low Rate Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
Sheetaleventcompany
 
BLOOD-Physio-D&R-Agam blood physiology notes
BLOOD-Physio-D&R-Agam blood physiology notesBLOOD-Physio-D&R-Agam blood physiology notes
BLOOD-Physio-D&R-Agam blood physiology notes
surgeryanesthesiamon
 
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Sheetaleventcompany
 
Call Girls Goa Just Call 9xx000xx09 Top Class Call Girl Service Available
Call Girls Goa Just Call 9xx000xx09 Top Class Call Girl Service AvailableCall Girls Goa Just Call 9xx000xx09 Top Class Call Girl Service Available
Call Girls Goa Just Call 9xx000xx09 Top Class Call Girl Service Available
Sheetaleventcompany
 
❤️ Zirakpur Call Girl Service ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
❤️ Zirakpur Call Girl Service  ☎️9878799926☎️ Call Girl service in Zirakpur ☎...❤️ Zirakpur Call Girl Service  ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
❤️ Zirakpur Call Girl Service ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
daljeetkaur2026
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024
Sheetaleventcompany
 
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
Sheetaleventcompany
 
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Sheetaleventcompany
 

Recently uploaded (20)

💞 Safe And Secure Call Girls Nanded 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Nanded 🧿 9332606886 🧿 High Class Call Girl Servi...💞 Safe And Secure Call Girls Nanded 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Nanded 🧿 9332606886 🧿 High Class Call Girl Servi...
 
Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
 
Independent Call Girls Service Chandigarh Sector 17 | 8868886958 | Call Girl ...
Independent Call Girls Service Chandigarh Sector 17 | 8868886958 | Call Girl ...Independent Call Girls Service Chandigarh Sector 17 | 8868886958 | Call Girl ...
Independent Call Girls Service Chandigarh Sector 17 | 8868886958 | Call Girl ...
 
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
Call Girl In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indor...
 
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
 
❤️Chandigarh Escorts☎️9814379184☎️ Call Girl service in Chandigarh☎️ Chandiga...
❤️Chandigarh Escorts☎️9814379184☎️ Call Girl service in Chandigarh☎️ Chandiga...❤️Chandigarh Escorts☎️9814379184☎️ Call Girl service in Chandigarh☎️ Chandiga...
❤️Chandigarh Escorts☎️9814379184☎️ Call Girl service in Chandigarh☎️ Chandiga...
 
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
Call Girls In Indore 📞9235973566📞Just Call Inaaya📲 Call Girls Service In Indo...
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
 
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
Low Rate Call Girls Lucknow {9xx000xx09} ❤️VVIP NISHA Call Girls in Lucknow U...
 
Call Now ☎ 8868886958 || Call Girls in Chandigarh Escort Service Chandigarh
Call Now ☎ 8868886958 || Call Girls in Chandigarh Escort Service ChandigarhCall Now ☎ 8868886958 || Call Girls in Chandigarh Escort Service Chandigarh
Call Now ☎ 8868886958 || Call Girls in Chandigarh Escort Service Chandigarh
 
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
 
💚 Low Rate Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
💚 Low Rate  Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...💚 Low Rate  Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
💚 Low Rate Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
 
BLOOD-Physio-D&R-Agam blood physiology notes
BLOOD-Physio-D&R-Agam blood physiology notesBLOOD-Physio-D&R-Agam blood physiology notes
BLOOD-Physio-D&R-Agam blood physiology notes
 
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
 
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
 
Call Girls Goa Just Call 9xx000xx09 Top Class Call Girl Service Available
Call Girls Goa Just Call 9xx000xx09 Top Class Call Girl Service AvailableCall Girls Goa Just Call 9xx000xx09 Top Class Call Girl Service Available
Call Girls Goa Just Call 9xx000xx09 Top Class Call Girl Service Available
 
❤️ Zirakpur Call Girl Service ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
❤️ Zirakpur Call Girl Service  ☎️9878799926☎️ Call Girl service in Zirakpur ☎...❤️ Zirakpur Call Girl Service  ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
❤️ Zirakpur Call Girl Service ☎️9878799926☎️ Call Girl service in Zirakpur ☎...
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024
 
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
💚Chandigarh Call Girls Service 💯Jiya 📲🔝8868886958🔝Call Girls In Chandigarh No...
 
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
 

Understanding the Impact of Cyber Security in Health Care

  • 1. Understanding the Impact of Cyber Security in Health Care ©Blue Cross Blue Shield of Michigan
  • 2. Why is Cyber Security Crucial for the Health Care Industry?
  • 3. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like…
  • 4. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like… Illegal hacking
  • 5. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like… Illegal hacking Ransomware
  • 6. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like… Illegal hacking Ransomware Malware
  • 7. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like… Illegal hacking Ransomware Malware Phishing
  • 8. There is an endless amount of personal data shared and stored on the internet, including members’ health care information… Cyber Security is Critical
  • 9. There is an endless amount of personal data shared and stored on the internet, including members’ health care information… …Cyber security is the first line of defense in ensuring it is safely shared and strongly protected. Cyber Security is Critical
  • 10. How Has the Landscape of Cyber Security Evolved?
  • 11. Online threats against health care data and information have become increasingly sophisticated, driving Blue Cross’ IT team to continually evolve its protective measures to remain first-in-class for data protection. Over the Years
  • 12. Historically, hackers have been more focused on wreaking havoc within the financial service sector. However, stealing health care information has become more lucrative by selling it to hackers on the “dark web.” Cyber Crime is “Big Business”
  • 13. Ransomware is used as a form of extortion, holding data hostage until payment is received. To activate, simply calls for a click on the wrong link by an unsuspecting user, like a company employee. Cyber Crime is “Big Business”
  • 14. Malware, or malicious software, is computer software created solely with the intent of harming and devices, making their functions inactive. Cyber Crime is “Big Business”
  • 15. Case in Point In May and June 2017, the “WannaCry” and “Petya” ransomware attacks affected the computer systems of governmental and professional associations in Ukraine, France, India, as well as some hospitals and health care organizations in the United States. Upon attempting to use their computer, users affected with these programs received a message stating that their files had been encrypted and that a payment of $300-$410 worth of Bitcoin (a form of digital currency) was required to be able to access their data.
  • 16. Experts say that “WannaCry” is the worst digital event to occur in recent years, affecting more than 200,000 systems. Combined, these two attacks affected more than 210,000 systems in 150 countries, compromising millions of pieces of member and user information globally. Case in Point
  • 17. Cyber crime manipulates the unsuspecting and victimizes the vulnerable.
  • 18. How Do We Secure Member Data?
  • 19. Data Security is a Team Effort Blue Cross’ IT employees are a critical line of defense – they are educated on an ongoing basis about how to recognize potential threats to Blue Cross and member data. Our social engineering exercises equip our employees with the tools they need to identify tricks used by hackers to infiltrate our system.
  • 20. Data Security is a Team Effort These social engineering exercises consist of trainings and tests completed throughout the year, with employees chosen at random to see if they are able to identify a phishing email.
  • 21. Data Security is a Team Effort These social engineering exercises consist of trainings and tests completed throughout the year, with employees chosen at random to see if they are able to identify a phishing email. We consider it successful when they correctly identify a phishing email, in addition to an opportunity for education when they are having difficulty identifying them.
  • 22. Data Security is a Team Effort Social engineering exercises consist of trainings and tests completed throughout the year, with employees chosen at random to see if they are able to identify a phishing email. We consider it successful when they correctly identify a phishing email, in addition to an opportunity for education when they are having difficulty identifying them. This helps us strengthen security awareness and training programs so we can better understand our employees’ thought process in identifying scams, as well as keep a pulse on the evolution of hackers’ sophisticated schemes.
  • 23. Secure Health Care Service We also assess the cyber threat landscape to stay one step ahead of hackers and others with malicious intent who are looking to threaten Blue Cross or member security. We connect with experts who are able to plug into trends on the dark web for insights on how to proactively prepare for hackers actively working to obtain information illegally.
  • 24. Identifying ways hackers can gain access is key to stopping attacks before they happen.
  • 25. The Blue Cross IT Team
  • 26. As a company, we invest in creating new IT positions as technology continues to advance. As a tech employer, we find value in hiring candidates with a variety of professional backgrounds, providing them room to grow and expand their skillsets. Just as hackers don’t all come from the same background, Information Security experts who bring in a variety of experiences can bring valuable insights to the profession. Investing in Employees and the Future
  • 27. It is a commonly-held misconception that IT professionals have to have a technological background… A Place For Everyone
  • 28. It is a commonly-held misconception that IT professionals have to have a technological background… …However, the ability to learn new skills, problem solve and adapt to new situations are key strengths of an IT team member. A Place For Everyone
  • 29. There are a number of careers one can pursue as a member of the Blue Cross IT team, including: A Place For Everyone Security Analyst Applications Security Testing Engineering and Architecture
  • 30. The route to becoming an IT professional can be curved, with opportunities to develop a variety of skills that contribute to success.
  • 31. To learn more about Blue Cross IT and opportunities to join our team, visit: MIBlueTech.com Blue Cross Blue Shield of Michigan and Blue Care Network are nonprofit corporations and independent licensees of the Blue Cross and Blue Shield Association.

Editor's Notes

  1. https://techcrunch.com/2017/06/27/petya-eternalblue-ransomware-microsoft-vulnerability-june-2017/ https://www.inverse.com/article/33469-petya-ransomware-attack-united-states http://www.zdnet.com/article/petya-ransomware-attack-how-many-victims-are-there-really/
  2. https://techcrunch.com/2017/06/27/petya-eternalblue-ransomware-microsoft-vulnerability-june-2017/ https://www.inverse.com/article/33469-petya-ransomware-attack-united-states