SlideShare a Scribd company logo
1 of 4
Healthcare systems run on the performance of critical patient care applications,
and those who use them to save lives. The slightest latencies could have fatal results.
When safe, swift patient treatment hangs in the balance, see how our visibility helps
diagnose challenging IT problems within your patient-impacting applications.
Learn more at netscout.com/healthcare
THERE’S NO SUCH
THING AS “DOWNTIME”
IN A HOSPITAL.
AS SEEN IN BECKER’S HOSPITAL REVIEW
Sponsored by:
H
ealthcare is increasingly reliant on digital
information. To support this critical need, the size
and complexity of hospitals’ IT infrastructures have
grown exponentially. The added complexity has created
new challenges and risks for hospitals and health systems.
Becker’s Hospital Review recently spoke with two
NETSCOUT technology experts about the digital
complexities impacting healthcare institutions. Eileen
Haggerty, AVP, product and solutions marketing, and
Tom Bienkowski, director of product marketing, shared
perspectives for how IT leaders can overcome challenges
and mitigate risks.
COVID-19 has accelerated the size and complexity of
hospitals’ digital infrastructure
The importance of digital technologies within hospitals
continues to grow. These include technologies to
improve patient outcomes — like EHRs and imaging — and
technologies to improve the patient experience, such as
smart beds. Hospitals now provide internet connectivity
to numerous “internet of things” devices, including tablets
and phones that run myriad mobile applications. Digitally-
connected food carts deliver food to patients’ rooms, and
patient devices monitor cardiac or diabetic patients in the
hospital and after they leave.
Ms. Haggerty said, “The applications themselves are
more demanding and complex, and they’ve become
more sophisticated because they’re managing everything
from patient records to diagnostic tests to radiology and
prescriptions.” Increasingly, hospitals are using cloud-
based business services and various software-as-a-service
offerings alongside these applications.
This increase in the number of devices, users, and
applications on the network has forced hospitals to
increase their network bandwidth. Ms. Haggerty has seen
hospitals with 10 gigs of bandwidth increase to 40 gigs,
and many are now deploying 100 gigs.
In addition to these trends, COVID-19 has spurred the
exponential increase in telehealth services. One customer
informed Ms. Haggerty that during the last two weeks
of March, the hospital experienced a fourfold increase
in telehealth volume. This increased network traffic has
strained the capacity of some healthcare organizations.
Even after the pandemic, the use of telehealth will remain
high.
“These are some of the big evolutions happening,” said Ms.
Haggerty, “which are dramatically altering many aspects of
the hospital IT environment.”
Healthcare is unique since hospital networks operate 24
hours every day, seven days a week, 365 days per year.
Having optimal network performance is critical in executing
the hospital’s mission. Ms. Haggerty emphasized, “Any
unplanned disruption can be truly catastrophic, and even
planned migrations, application upgrades, or system
changes can be disruptive.”
Achieving the required performance level is complicated in
environments where organizations leverage technologies
from multiple vendors, which is the case in most hospitals.
In such environments, IT teams must deal with integration
and interoperability challenges and issues related to
visibility.
Ms. Haggerty explained that each vendor typically provides
visibility related to their equipment’s or application’s
performance that assesses how they’re working. However,
a report might show that each application appears to be
performing well, the databases look good, and all the
network and cloud tools are operating well. Yet a patient
might still experience a slow load time for a web page or
have difficulty accessing their medical record. “Each one
of the siloed tools says that it’s working fine, but IT is still
receiving help desk tickets,” states Ms. Haggerty. In her
view, the major problem is the lack of visibility across the
entire IT infrastructure.
Hospital IT leaders need visibility into the performance
of all of the organization’s applications regardless of
which vendor provides the products and solutions. This
functionality evaluates the data, traffic, voice, video, and
more to understand any errors or disruptions throughout
the infrastructure and look at performance holistically for
the entire end-to-end patient experience.
The emphasis on complete visibility is part of NETSCOUT’s
mission since network performance is essential to ensure
that healthcare providers can deliver consistent, safe, high-
quality patient care. As Ms. Haggerty conveyed, “We’re
going to give you visibility across your private data center,
your public cloud, your user experience, and your SaaS.”
Focus on distributed denial-of-service attacks as they
are often overlooked and misunderstood
IT leaders must be attuned to a wide range of security
threats to the hospital’s network and data. As Mr.
Bienkowski pointed out, “There’s been a major uptick in
malware, phishing and all kinds of attempts to penetrate
hospital IT infrastructure.” The threat of ransomware has
generated a great deal of attention with frequent reports
of hospital attacks.
Information security during COVID-19 and the era of remote care:
Challenges and safety measures for health systems
2Executive Briefing
Visibility Without Borders. Services Without Interruption.
Clinical and patient care IT ecosystems are evolving to keep pace with digital transformations.
As the complexity continues to mount, we continue to deliver unparalleled application and
network visibility, ensuring that your hospital can focus on what matters most – the patients.
See how we’re helping hospital IT teams maintain the health of their most complex and
critical patient care applications.
Learn more at netscout.com/healthcare
Application performance should 
be the last thing on your mind.
BECAUSE IT’S THE FIRST
THING ON OURS.
“Flying under the radar,” Mr. Bienkowski observed, “is the
threat of DDoS (distributed denial-of-service) attacks. One
of the biggest threats to the performance of the hospital’s
digital infrastructure, as well as the availability of services,
is a DDoS attack.”
Recent statistics shared by Mr. Bienkowski illustrate how the
threat of DDoS attacks has increased during the pandemic.
In the first half of 2020, when much of the world was locked-
down, there were over 4.3 million DDoS attacks, which
is a 15 percent increase from the same period in 2019,
according to NETSCOUT research. Analyzing the period
from March 2020 through the end of June, DDoS attacks
increased by 25 percent compared to a year ago. During
this time, NETSCOUT saw around 12,000 DDoS attacks
within the healthcare industry, representing an increase of
12.5 percent compared to 2019. Mr. Bienkowski concluded,
“The number and sophistication of DDoS attacks have
increased not only during the first half of 2020 but during
the COVID-19 pandemic itself.”
Mr. Bienkowski expressed admiration for IT leaders for
what has occurred over the past few months. “IT has had to
absorb this massive uptick in need for higher bandwidth
performance while also dealing on the front lines with a
rise in DDoS attacks.”
As threatening and disruptive as DDoS attacks can be,
in Mr. Bienkowski’s experience, a majority of enterprises
don’t have a good understanding of these attacks, which
take three forms.
1.	 Large volumetric, bandwidth-consuming events. When
most people think of a DDoS attack, this is what comes
to mind. This type of attack aims to saturate routers
and circuits.
2.	 Application layer attacks. These attacks go after specific
applications, such as web servers or database servers.
The objective of this type of attack, which comes in
low and slow, is to exhaust the servers’ resources.
These attacks are difficult to detect but can be just as
damaging as the large volumetric events.
3.	 State exhaustion attacks. These are stealthy attacks that
go after stateful devices, such as firewalls and virtual
private network concentrators, sitting at the edge of
healthcare networks. During the pandemic, with more
people working from home, VPN concentrators have
become primary targets.
Unfortunately, many vulnerable IoT devices are becoming
part of large botnets. By using free Do-It-Yourself attack
tools or inexpensive DDoS for Hire Services, anyone can
easily use these botnets to launch sophisticated DDoS
attacks.
Mr. Bienkowski recommended, “The very first thing that
leaders should do to protect your organization is to become
educated about the true threat of DDoS. Many folks believe
that a DDoS attack is a volumetric event. But this is not true.
The modern-day DDoS attack is quite complex and uses
multiple attack vectors.” After becoming educated, the
next step is to put various forms of protection in place.
For protection against the volumetric attacks,which saturate
internet-facing circuits, on-premises security measures
are obsolete. For these attacks, you need a cloud-based
solution. NETSCOUT provides a cloud-based mitigation
service, Arbor Cloud, with worldwide scrubbing and
mitigation centers to handle the world’s most significant
attacks. Attack traffic redirects to these off-premise centers.
To stop the smaller application layer and state exhaustion
attacks, NETSCOUT provides an on-premise solution,
Arbor Edge Defense, that sits just inside the internet
router in front of stateful devices like firewalls and VPN
concentrators. It protects devices from stateful and block
attacks targeting application servers.
Conclusion
A hospital’s IT network and infrastructure have never
been more critical. Technology and information are
imperative for clinicians to operate efficiently in providing
safe, consistent, high-quality healthcare. But providing
adequate bandwidth, access, availability, and security is
challenging. Using technologies from multiple vendors
makes interoperability and visibility more difficult. New
applications such as telehealth demand more bandwidth,
and the increase in sophisticated DDoS attacks threatens
the entire infrastructure.
IT leaders must have a solid understanding of their
organizations’ security and visibility issues within the
complex healthcare environment. It is also important to
partner with organizations with the in-depth knowledge
and expertise required to address these performance and
security challenges. n
NETSCOUT’s business is Smart Data: distilling real time, precise intelligence from the noise of traffic data. We
get the right data, fast, to the people and the systems that need it, providing the real-time intelligence you
need to drive network and application performance, deliver unmatched user experience, and find and fix
advanced cyber and DDoS threats.
4Executive Briefing

More Related Content

What's hot

Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Citrix
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKHappiest Minds Technologies
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for SuccessCitrix
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of ThingsTripwire
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseCitrix
 
CSX Megatrends Cloud Risk Assurance Oct 15 FINAL
CSX Megatrends Cloud Risk Assurance Oct 15 FINALCSX Megatrends Cloud Risk Assurance Oct 15 FINAL
CSX Megatrends Cloud Risk Assurance Oct 15 FINALSatchit Dokras
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cAanchal579958
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Wheatstone
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustrySoftware Park Thailand
 

What's hot (20)

Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.Transforming Business with Citrix: Customers Share Their Stories.
Transforming Business with Citrix: Customers Share Their Stories.
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of Things
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
 
CSX Megatrends Cloud Risk Assurance Oct 15 FINAL
CSX Megatrends Cloud Risk Assurance Oct 15 FINALCSX Megatrends Cloud Risk Assurance Oct 15 FINAL
CSX Megatrends Cloud Risk Assurance Oct 15 FINAL
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
 

Similar to There's No Such Thing As "Downtime" In a Hospital

HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerAmer Nazar
 
Security and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devicesSecurity and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devicesZoe Gilbert
 
Role of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfRole of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfrectified
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front doorRyan Coleman
 
Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review IJECEIAES
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...The Lifesciences Magazine
 
The Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria
The Adoption of a National Cloud Framework for Healthcare Delivery in NigeriaThe Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria
The Adoption of a National Cloud Framework for Healthcare Delivery in NigeriaIJERA Editor
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world editedAhmed Banafa
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoGlen Koskela
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...SG Analytics
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 

Similar to There's No Such Thing As "Downtime" In a Hospital (20)

HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
 
Security and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devicesSecurity and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devices
 
Role of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfRole of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdf
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review Distributed reflection denial of service attack: A critical review
Distributed reflection denial of service attack: A critical review
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
 
The Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria
The Adoption of a National Cloud Framework for Healthcare Delivery in NigeriaThe Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria
The Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria
 
188
188188
188
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Cyber Crime is Wreaking Havoc
Cyber Crime is Wreaking HavocCyber Crime is Wreaking Havoc
Cyber Crime is Wreaking Havoc
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
 
Health Information Technology Implementation Challenges and Responsive Soluti...
Health Information Technology Implementation Challenges and Responsive Soluti...Health Information Technology Implementation Challenges and Responsive Soluti...
Health Information Technology Implementation Challenges and Responsive Soluti...
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 

More from NETSCOUT

DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseNETSCOUT
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service ProvidersNETSCOUT
 
RF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignRF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignNETSCOUT
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance NETSCOUT
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudNETSCOUT
 
nGeniusPULSE Quick Look
nGeniusPULSE Quick LooknGeniusPULSE Quick Look
nGeniusPULSE Quick LookNETSCOUT
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT
 
Hybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomHybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomNETSCOUT
 
Digital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceDigital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceNETSCOUT
 
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiNETSCOUT
 
Planning for a Digital Future
Planning for a Digital FuturePlanning for a Digital Future
Planning for a Digital FutureNETSCOUT
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility SolutionNETSCOUT
 
Enterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindEnterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindNETSCOUT
 

More from NETSCOUT (16)

DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers
 
RF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignRF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and Design
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
nGeniusPULSE Quick Look
nGeniusPULSE Quick LooknGeniusPULSE Quick Look
nGeniusPULSE Quick Look
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
 
Hybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomHybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital Transformatiom
 
Digital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceDigital Transformation starts with Service Assurance
Digital Transformation starts with Service Assurance
 
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
 
Planning for a Digital Future
Planning for a Digital FuturePlanning for a Digital Future
Planning for a Digital Future
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility Solution
 
Enterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindEnterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left Behind
 

There's No Such Thing As "Downtime" In a Hospital

  • 1. Healthcare systems run on the performance of critical patient care applications, and those who use them to save lives. The slightest latencies could have fatal results. When safe, swift patient treatment hangs in the balance, see how our visibility helps diagnose challenging IT problems within your patient-impacting applications. Learn more at netscout.com/healthcare THERE’S NO SUCH THING AS “DOWNTIME” IN A HOSPITAL. AS SEEN IN BECKER’S HOSPITAL REVIEW
  • 2. Sponsored by: H ealthcare is increasingly reliant on digital information. To support this critical need, the size and complexity of hospitals’ IT infrastructures have grown exponentially. The added complexity has created new challenges and risks for hospitals and health systems. Becker’s Hospital Review recently spoke with two NETSCOUT technology experts about the digital complexities impacting healthcare institutions. Eileen Haggerty, AVP, product and solutions marketing, and Tom Bienkowski, director of product marketing, shared perspectives for how IT leaders can overcome challenges and mitigate risks. COVID-19 has accelerated the size and complexity of hospitals’ digital infrastructure The importance of digital technologies within hospitals continues to grow. These include technologies to improve patient outcomes — like EHRs and imaging — and technologies to improve the patient experience, such as smart beds. Hospitals now provide internet connectivity to numerous “internet of things” devices, including tablets and phones that run myriad mobile applications. Digitally- connected food carts deliver food to patients’ rooms, and patient devices monitor cardiac or diabetic patients in the hospital and after they leave. Ms. Haggerty said, “The applications themselves are more demanding and complex, and they’ve become more sophisticated because they’re managing everything from patient records to diagnostic tests to radiology and prescriptions.” Increasingly, hospitals are using cloud- based business services and various software-as-a-service offerings alongside these applications. This increase in the number of devices, users, and applications on the network has forced hospitals to increase their network bandwidth. Ms. Haggerty has seen hospitals with 10 gigs of bandwidth increase to 40 gigs, and many are now deploying 100 gigs. In addition to these trends, COVID-19 has spurred the exponential increase in telehealth services. One customer informed Ms. Haggerty that during the last two weeks of March, the hospital experienced a fourfold increase in telehealth volume. This increased network traffic has strained the capacity of some healthcare organizations. Even after the pandemic, the use of telehealth will remain high. “These are some of the big evolutions happening,” said Ms. Haggerty, “which are dramatically altering many aspects of the hospital IT environment.” Healthcare is unique since hospital networks operate 24 hours every day, seven days a week, 365 days per year. Having optimal network performance is critical in executing the hospital’s mission. Ms. Haggerty emphasized, “Any unplanned disruption can be truly catastrophic, and even planned migrations, application upgrades, or system changes can be disruptive.” Achieving the required performance level is complicated in environments where organizations leverage technologies from multiple vendors, which is the case in most hospitals. In such environments, IT teams must deal with integration and interoperability challenges and issues related to visibility. Ms. Haggerty explained that each vendor typically provides visibility related to their equipment’s or application’s performance that assesses how they’re working. However, a report might show that each application appears to be performing well, the databases look good, and all the network and cloud tools are operating well. Yet a patient might still experience a slow load time for a web page or have difficulty accessing their medical record. “Each one of the siloed tools says that it’s working fine, but IT is still receiving help desk tickets,” states Ms. Haggerty. In her view, the major problem is the lack of visibility across the entire IT infrastructure. Hospital IT leaders need visibility into the performance of all of the organization’s applications regardless of which vendor provides the products and solutions. This functionality evaluates the data, traffic, voice, video, and more to understand any errors or disruptions throughout the infrastructure and look at performance holistically for the entire end-to-end patient experience. The emphasis on complete visibility is part of NETSCOUT’s mission since network performance is essential to ensure that healthcare providers can deliver consistent, safe, high- quality patient care. As Ms. Haggerty conveyed, “We’re going to give you visibility across your private data center, your public cloud, your user experience, and your SaaS.” Focus on distributed denial-of-service attacks as they are often overlooked and misunderstood IT leaders must be attuned to a wide range of security threats to the hospital’s network and data. As Mr. Bienkowski pointed out, “There’s been a major uptick in malware, phishing and all kinds of attempts to penetrate hospital IT infrastructure.” The threat of ransomware has generated a great deal of attention with frequent reports of hospital attacks. Information security during COVID-19 and the era of remote care: Challenges and safety measures for health systems 2Executive Briefing
  • 3. Visibility Without Borders. Services Without Interruption. Clinical and patient care IT ecosystems are evolving to keep pace with digital transformations. As the complexity continues to mount, we continue to deliver unparalleled application and network visibility, ensuring that your hospital can focus on what matters most – the patients. See how we’re helping hospital IT teams maintain the health of their most complex and critical patient care applications. Learn more at netscout.com/healthcare Application performance should be the last thing on your mind. BECAUSE IT’S THE FIRST THING ON OURS.
  • 4. “Flying under the radar,” Mr. Bienkowski observed, “is the threat of DDoS (distributed denial-of-service) attacks. One of the biggest threats to the performance of the hospital’s digital infrastructure, as well as the availability of services, is a DDoS attack.” Recent statistics shared by Mr. Bienkowski illustrate how the threat of DDoS attacks has increased during the pandemic. In the first half of 2020, when much of the world was locked- down, there were over 4.3 million DDoS attacks, which is a 15 percent increase from the same period in 2019, according to NETSCOUT research. Analyzing the period from March 2020 through the end of June, DDoS attacks increased by 25 percent compared to a year ago. During this time, NETSCOUT saw around 12,000 DDoS attacks within the healthcare industry, representing an increase of 12.5 percent compared to 2019. Mr. Bienkowski concluded, “The number and sophistication of DDoS attacks have increased not only during the first half of 2020 but during the COVID-19 pandemic itself.” Mr. Bienkowski expressed admiration for IT leaders for what has occurred over the past few months. “IT has had to absorb this massive uptick in need for higher bandwidth performance while also dealing on the front lines with a rise in DDoS attacks.” As threatening and disruptive as DDoS attacks can be, in Mr. Bienkowski’s experience, a majority of enterprises don’t have a good understanding of these attacks, which take three forms. 1. Large volumetric, bandwidth-consuming events. When most people think of a DDoS attack, this is what comes to mind. This type of attack aims to saturate routers and circuits. 2. Application layer attacks. These attacks go after specific applications, such as web servers or database servers. The objective of this type of attack, which comes in low and slow, is to exhaust the servers’ resources. These attacks are difficult to detect but can be just as damaging as the large volumetric events. 3. State exhaustion attacks. These are stealthy attacks that go after stateful devices, such as firewalls and virtual private network concentrators, sitting at the edge of healthcare networks. During the pandemic, with more people working from home, VPN concentrators have become primary targets. Unfortunately, many vulnerable IoT devices are becoming part of large botnets. By using free Do-It-Yourself attack tools or inexpensive DDoS for Hire Services, anyone can easily use these botnets to launch sophisticated DDoS attacks. Mr. Bienkowski recommended, “The very first thing that leaders should do to protect your organization is to become educated about the true threat of DDoS. Many folks believe that a DDoS attack is a volumetric event. But this is not true. The modern-day DDoS attack is quite complex and uses multiple attack vectors.” After becoming educated, the next step is to put various forms of protection in place. For protection against the volumetric attacks,which saturate internet-facing circuits, on-premises security measures are obsolete. For these attacks, you need a cloud-based solution. NETSCOUT provides a cloud-based mitigation service, Arbor Cloud, with worldwide scrubbing and mitigation centers to handle the world’s most significant attacks. Attack traffic redirects to these off-premise centers. To stop the smaller application layer and state exhaustion attacks, NETSCOUT provides an on-premise solution, Arbor Edge Defense, that sits just inside the internet router in front of stateful devices like firewalls and VPN concentrators. It protects devices from stateful and block attacks targeting application servers. Conclusion A hospital’s IT network and infrastructure have never been more critical. Technology and information are imperative for clinicians to operate efficiently in providing safe, consistent, high-quality healthcare. But providing adequate bandwidth, access, availability, and security is challenging. Using technologies from multiple vendors makes interoperability and visibility more difficult. New applications such as telehealth demand more bandwidth, and the increase in sophisticated DDoS attacks threatens the entire infrastructure. IT leaders must have a solid understanding of their organizations’ security and visibility issues within the complex healthcare environment. It is also important to partner with organizations with the in-depth knowledge and expertise required to address these performance and security challenges. n NETSCOUT’s business is Smart Data: distilling real time, precise intelligence from the noise of traffic data. We get the right data, fast, to the people and the systems that need it, providing the real-time intelligence you need to drive network and application performance, deliver unmatched user experience, and find and fix advanced cyber and DDoS threats. 4Executive Briefing