SlideShare a Scribd company logo
1 of 20
Download to read offline
CUSTOMMEDIA
Sponsored by
Ransomware and
Emerging Cyber Threats:
Why It’s More Than Just
An IT Problem in Healthcare
2Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
2
CUSTOMMEDIA
Table of Contents
03 Ransomware Attacks Will Become Common in 2016; Threats are Under
Combatted and Highly Profitable
07 Are CIOs and CISOs Behind the Curve on Data Security? Results of a New
Survey Say Yes
15 Overcoming the Data Security Threat Tsunami
21 About Symantec & ITS
22 Additional Resources
3Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
3
CUSTOMMEDIA
3Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
3
CUSTOMMEDIA
Ransomware Attacks Will Become Common
in 2016; Threats are Under Combatted and
Highly Profitable
Heather Landi
While the ransomware breach at Hollywood Presbyterian Medical Center in Los Angeles may seem like an
unfortunate, yet isolated, incident, a new report from the Institute for Critical Infrastructure Technology (ICIT)
warns that ransomware threats will likely escalate this year.
According to the ICIT report, 2016 will be the year ransomware will “wreak havoc on America’s critical
infrastructure community.” “To pay or not to pay,” will be the question fueling heated debate in boardrooms
across the country, according to the report authors: James Scott, ICIT senior fellow and Drew Spaniel, ICIT
visiting scholar from Carnegie Mellon University.
ICIT is a non-profit think tank that advises decision makers on technology and cybersecurity trends
in infrastructure sectors including government, defense and healthcare. The report gives an analysis of the
ransomware threat as well as the attacker and targets and provides mitigation strategies.
“Ransomware is less about technological sophistication and more about exploitation of the human element.
Simply, it is a digital spin on a centuries old criminal tactic,” the authors stated.
The report authors also tapped into cybersecurity research contributed by security firms, such as Kaspersky,
Covenant Security Solutions, Securonix, Forcepoint, GRA Quantum and Trend Micro, for insights into
ransomware attacks. These security firms predict a dominant resurgence of ransomware attacks this year,
according to the report, and already healthcare organizations have been targeted, such as the incident at
Hollywood Presbyterian Medical Center.
According to the ICIT
report, 2016 will be the year
ransomware will “wreak
havoc on America’s critical
infrastructure community.”
4Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
4
CUSTOMMEDIA
4Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
4
CUSTOMMEDIA
“The healthcare sector was not a traditional target for ransomware attacks. One theory is that attackers
did not target systems that jeopardized lives,” Scott and Spaniel wrote. However, they noted, recently, that
mentality has changed for at least the group operating the Locky ransomware as evidenced by the incident
at Hollywood Presbyterian Medical Center.
The report authors point out that cyber threat actors are using ransomware attacks because these attacks
are “under combatted and highly profitable.” And, unlike hackers who attempt to exfiltrate or manipulate
data, ransomware criminals only attempt to prevent access to data and during an active ransomware attack,
business operations grind to a halt until the system is restored or replaced.
And, with the prevalence of mobile devices and the growth of the Internet of Things (IoT), the “potential
threat landscape available to ransomware threat actors is too tantalizing a target to ignore.” Consequently,
“Information security specialists and the technical controls that they implement must become adaptable,
responsive, and resilient to combat emerging threats,” Scott and Spaniel wrote.
How profitable is ransomware? According to research provided by security firms, creating a phishing page
and setting up a mass spam email costs about $150. “A trendy crypto ransomware sells for about $2000 on
dark net forums. Locker ransomware probably costs less. This means that an attacker only needs to ransom
eight everyday users (at the average $300) to generate a profit,” the authors wrote.
“Symantec estimated that in 2009, 2.9 percent of the victims paid the ransom. In 2014, CTU researchers
estimated that about 1.1 percent of the Cryptowall ransomware victims paid the ransom (at an average
of $500). Despite this seemingly low response rate, the FBI reported that from the 992 related complaints,
Cryptowall reportedly netted over $18 million from victims between 2014-2015.”
The report specifically details the types of ransomware, such as locker ransomware and crypto ransomware,
with the Locky ransomware being an active example and the type that infected medical systems belonging
to Hollywood Presbyterian Medical Center. In that incident, while healthcare data remained unaffected,
5Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
5
CUSTOMMEDIA
5Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
5
CUSTOMMEDIA
computers essential to laboratory work, CT scans, emergency room systems and pharmacy operations
were infected.
“After ten days, the administration paid attackers 40 Bitcoins ($17,000) to release the systems. Later that week,
five computers belonging to the Los Angeles County health department were infected with a ransomware
variant. The health department refuses to pay the ransom and will restore its systems from backups. Similarly,
two hospitals in Germany were infected with ransomware at roughly the same time as Hollywood Presbyterian
Medical Center. Both are restoring their systems from backup systems,” Scott and Spaniel wrote.
Scott and Spaniel also highlight that ransomware follows the same distribution and infection vectors,
or delivery channels, as traditional malware such as traffic distribution services, malvertisement, phishing
emails, downloaders, social engineering and ransomware as a service (RaaS).
The authors also detail mitigation strategies noting that “preventing infection is preferred over remediation efforts.”
“The first step to mitigating a ransomware threat is to implement a comprehensive cybersecurity strategy,”
the authors stated. “Software and hardware solutions are necessary, but they are not the only necessity. First
and foremost, information security training and awareness must improve. Afterward, organizations can rely
on the layered defenses that they have invested in to secure their network.
The report recommends that organizations have a dedicated information security team to ensure all systems
were updated and patched and that critical systems were backed up. Organizations also should have
layered defenses to protect networks. And, personnel training and awareness are critical as information
security experts often cite that “humans are the weakest link.”
“Employees should be trained to recognize a malicious link or attachment. There is no justifiable reason that
most organizations cannot reduce their personnel’s malicious link click rate below 15 percent,” the authors
stated. “Teach employees to not click on any links in any emails. It takes barely any more time to type a link
into Google as it does to click the link. Personnel should only open attachments from personnel that they
trust and only if they are expecting the file.”
First and foremost,
information security training
and awareness must improve.
Afterward, organizations
can rely on the layered
defenses that they have
invested in to secure
their network.
Employees should be
trained to recognize a
malicious link or attachment.
There is no justifiable reason
that most organizations
cannot reduce their
personnel’s malicious link
click rate below 15 percent.
6Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
6
CUSTOMMEDIA
6Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
6
CUSTOMMEDIA
Healthcare leaders also should focus on administrative policies and procedures to strengthen cyber defense
and consider cyber insurance policies that cover ransomware attacks.
When a compromise does occur, the ICIT report recommends that organizations disengage from communi-
cating with the attack until the situation is thoroughly assessed and a course of action decided.
“The proper response will depend on the risk appetite of the organization, the potential impact of the hos-
tage data, the impact on business continuity, whether a redundant system is available, and the sectorial
regulatory requirements,” Scott and Spaniel wrote.
The report authors concluded that the enlistment of an information security team is the first step in a com-
panywide security strategy. And, the information security team should, at minimum, “conduct an immediate
companywide vulnerability analysis, develop a crisis management strategy that takes into consideration all
know threats and also conduct continuous device and application patching, auditing of third party vendors
and agreements as well as organizational penetration testing and security centric technological upgrades.”
“Together, these actions can profoundly minimize a company’s attack surface,” the authors stated.
7Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
7
CUSTOMMEDIA
Are CIOs and CISOs Behind the Curve on Data
Security? Results of a New Survey Say Yes
Mark Hagland
David Finn, the health IT officer at Symantec, discusses the results of a new
survey of CIOs on data security, and its implications for the next few years
With all the recent headlines and developments around data security breaches, hacking incidents, and even
ransomware attempts, hitting U.S. patient care organizations, one might think that CIOs, their fellow c-suite
executives, and hospital and medical group boards of directors might be farther along on their data cyber-
security journey. In fact, a new survey-based study has found, there is real reason for concern. Leaders from
HIMSS Analytics, a division of the Chicago-based Healthcare Information & Management Systems Society,
and from the Mountain View, Calif.-based Symantec, released the results of a new study, entitled 
“Healthcare IT Security and Risk Management Study.” David Finn, the health IT officer at Symantec, released
and described some of the results on Wednesday, March 2, 2016 on the exhibit floor of the Sands Expo
in Las Vegas, during HIMSS16.
The survey was conducted online in December 2015, and received 115 online respondents. Then interviewers
pursued 10 phone interviews with CIOs and other healthcare IT leaders, in order to obtain more richness
of detail from the online survey results.
With regard to the respondents, 38.3 percent represent hospitals and health systems with 501 or more beds;
26.2 percent represent hospitals and health systems with 251-500 beds; 36.5 percent represents hospitals
and health systems with 101-250 beds; and none represent hospitals and health systems with fewer than 100 beds.
8Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
8
CUSTOMMEDIA
Among the numbers important findings:
When asked what percentage of their total IT budget (operating and capital) is devoted to IT security,
51.6 percent said 0-3 percent; 28.6 percent said 4-6 percent; 9.9 percent said 7-10 percent; and 9.9
percent said more than 10 percent.
Asked how many employees from both inside and outside IT are allocated to IT security in their
organization, the results were as follows: fewer than 1 inside IT, 12.0 percent, fewer than 1 outside
IT, 55.9 percent; 1-5 inside IT, 60.2 percent, 1-5 outside IT, 32.5 percent; 6-10 inside IT, 10.2 percent,
6-10 outside IT, 2.9 percent; 11-20 inside IT, 8.3 percent, 11-20 outside IT, 20.0 percent; 21-30 inside
IT, 3.7 percent, 21-30 outside IT, 1.0 percent; more than 30 inside IT, 5.6 percent, more than 30 out-
side IT, 5.9 percent.
The adjusted total average number of IT employees devoted to IT security was 9.9 FTEs.
With regard to how often IT security was discussed at their organizations’ board meetings, 53.9
percent said it was discussed “upon request of the board or executive management”; 20.9 percent
said, “at most board meetings”; 10.4 percent said, “at every board meeting”; 7.8 percent said,
“never”; and 7.0 percent said, “other.”
Unfortunately, only 46.09 percent of respondents are currently addressing data security threats po-
tentially coming through their organizations’ medical devices, though 33.04 percent are “beginning”
to do so, and another 16.52 percent “plan to do so.” The percentages of respondents whose
organizations are already addressing IT security on mobile devices and on cloud-based applications
are higher, at 69.57 percent and 61.74 percent, respectively.
9Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
9
CUSTOMMEDIA
Finn, a former hospital CIO, spoke with HCI Editor-in-Chief Mark Hagland regarding the study. Below are
excerpts from that interview.
There are a lot of significant results to talk about from this survey and study. Were you surprised by
any of the results involved?
You know, that’s a great question. We get that asked a lot. And honestly, since I’ve been doing this for so
long, the only surprising thing is, here we are 13 years down the road from the privacy act, and 11 years
down the road from the security act, and the only thing surprising to me is that we still haven’t done very
much, substantively speaking.
We haven’t addressed some of the real issues like medical devices; and we still haven’t addressed issues
like cloud and mobile devices. And we still approach it from this kind of “check-the-box” perspective, as
though it’s a compliance issue, and compliance doesn’t protect you, you’ve still got to be secure.
The now-infamous ransomware situation unfolded at Hollywood-Presbyterian Medical Center after
the survey had been completed. What do you think of that situation in the context of the survey/study?
I went directly to HIMSS from a week on the road, and my weeks on the road are typically with customers.
And every customer that week before HIMSS had noted an uptick in ransomware attempts. And these are
not purely Symantec customers, they also have other products. And they all made it through those ransom-
ware attempts; one struggled, but they all made it through. And there was some bashing about Hollywood
Presbyterian paying the ransom. But the thing is, this is not a security problem. When Hollywood Presbyterian
paid the ransom, it wasn’t to get data back or turn systems on, it was because they couldn’t take care of
patients. This is not a security issue, it’s a patient care issue. And this will continue to happen. And it really
needs to become a concern of the c-suite—and CIOs need to communicate that to the c-suite.
10Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
10
CUSTOMMEDIA
What do CIOs need to do to get their fellow c-suite leaders engaged around data security right now?
The issue is, the IT people do see this as an IT issue, and there is an IT issue, of course, and if IT folks don’t
effectively run anti-virus and anti-malware programs and address patch issues, and maintain good firewalls,
and all that—well, all that is necessary, of course. But the problem is that IT people so often don’t explain the
problem well in terms of the business issues involved.
I’ll tell you a story from when I was a CIO. We went through a network upgrade at one point, and we needed
to upgrade a number of Pyxis (medication dispensing) cabinets in order to keep our network updated. So I
had my CTO address the issue with our information management governance committee. But he came back
to me and told me we hadn’t gotten the money we needed, which was $325,000. That may sound like a lot,
but my annual budget was $20 million, so it wasn’t a huge amount. My CTO had focused on the need to
upgrade systems, etc.; in other words, he had spoken in [technocratic] terms.
So I took him with me and we went and spent some time with a nurse manager. And what we ended up
with was good data on the real costs involved in loss of productivity from non-replacement of those cabinets.
We found out what the time lag would be if a cabinet couldn’t be unlocked in a timely way. Ultimately, the
costs around loss of productivity meant that the hospital would have to hire more nursing staff, and the
numbers added up. So I went back and said, this is the additional cost to the nursing budget. So needless
to say, we left the meeting without even having to ask for the money. So this is what CIOs need to do: they
need to be able to translate the costs [of non-investment in IT into specific costs] for the clinicians and executives.
11Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
11
CUSTOMMEDIA
Another survey result was that only 19.9 percent of respondents reported that more than 6 percent
of their organization’s total IT budget was being spent on data security. Do you think that that proportion
will change anytime soon?
We are starting to see an uptick in 2016 spending, and most other surveys are seeing that. But if you look at
that, over half of respondents were spending 3 percent or less. And what we find is that federal government
officials say that 16 percent of their IT spend goes to IT security. And in the financial services sector, we
see 12-16 percent on average. So at 3 percent, we’re never going to be secure. And we have much more
valuable data than some other industries. And so who are the bad guys going to go to? I think we see the
answer to that.
Another significant survey result was that on average, most organizations have fewer than five em-
ployees dedicated to data security.
Yes, there are two pieces to that. The first reaction I get from people [when they hear how few staff are
dedicated to data security nationwide] is that they conclude that we’re talking about small hospital organiza-
tions. But 60 percent of our respondents were from organizations with over 250 beds, and 38 percent were
over 500 beds. So these are not critical-access hospitals.
Will that change soon?
Well, we’re actually starting to see security people embedded in [a variety of] business units. That’s why we
asked about security people inside and outside of IT. I’m aware of a couple of hospitals requiring that the
business units in revenue cycle and other areas hire someone to do IT security within the unit rather than IT.
I was a little surprised that the numbers were so small outside IT, but I think it’s the beginning of a trend.
So yes, I was surprised that it was still five or fewer for the most part. And we don’t have a clear idea whether
they’re referring to parts of an FTE; and in fact, that may actually be true. You know, often, they have a
network guy who does half-time firewall and half-time network support.
We are starting to see an
uptick in 2016 spending,
and most other surveys
are seeing that. But if you
look at that, over half of
respondents were spending 
3 percent or less.
I’m aware of a couple of
hospitals requiring that the
business units in revenue
cycle and other areas hire
someone to do IT security
within the unit rather than IT.
12Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
12
CUSTOMMEDIA
One survey result was that CIOs seemed to be more focused on broad strategy than on end-user
education. Would you agree that that is a problem?
It’s a big problem, and even though a high-ranking security strategy sounds good, what’s clear from an addi-
tional survey result is that the regular education of end-users is still a relatively low priority. And it’s quite dis-
turbing that cybersecurity for end-users was the lowest-rated of several priorities. The level of training was a
little higher, but it’s annual end-user training. And we know that the once-a-year, 40-minute, training doesn’t
do very much. But the reality is that every end-user needs to be a security person. And we found that in the
nuance in the in-depth interviews that most of the training is once-a-year stuff. A lot are doing phishing test-
ing of staff, and that’s a good thing, but they need to do more, and do it more regularly.
What did you think about the results around how often data security is discussed at board meetings?
That result looks good, until you realize it’s on request, and that only 10 percent are doing it at every board
meeting. And if we’re saying that cybersecurity strategy is key for the organization and that cybersecurity is
a function of the business, which it should be these days, I believe that every board should get a financial/
spending report and also a quality/adverse event report, at every board meeting. They’re not getting
cybersecurity reports at every board meeting, because it’s not actually as important as their CIO or CISO
tells us it is. And for the CEO or board to be ignoring it means that there’s a huge disconnect there.
Given all of these results, what should CIOs be doing right now?
The first thing is that whether the CIO or CISO or ideally, both of them together, are involved, they need to
go to the board and put in a plan for IT security governance, and the governance committee has to include
stakeholder leaders from across the entire organization. And it has to include additional tools, spending,
and head count. The other thing is that that governance group has to include medical device security now.
We found that over half of organizations were either just beginning to address, or were planning to address,
13Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
13
CUSTOMMEDIA
medical devices. We saw medical devices being used as points of entry for bad stuff. The bad guys have
figured out how to use medical devices to get access to data through the network using that device.
How would you characterize your level of optimism or pessimism around all this, on a scale from 0 to 10?
That is a tough question. I frankly am not optimistic, in the sense that I believe things are still going to get
worse before we change our focus and context. All is not lost; I’m not ready to jump off the top of a tall
building. We haven’t hit bottom yet. We should have, after Anthem and after HP, those were clarion calls, the
message was pretty clear; but I don’t think we’ve figured it out yet.
Is there anything else you’d like to add?
CIOs and CISOs didn’t even understand the threat environment, how dangerous it is, until recently. But I
think they realize that everything is out the window, and we need to refocus away from protecting devices,
but instead protect the data. People are stealing credentials to get in. What’s more, we still don’t fully
understand the data flows, how data flows into the organization, through it, and out of it. And the IT folks are
finally beginning to understand that compliance means that you’re compliant, but it doesn’t mean you’re
secure. And we’ve got to get some of these compliance and risk managers involved, and looking at the
actual risk. We need to change our perspective into one that’s not IT-based, but based on the business, and
on the engagement of top stakeholders in the organization.
And the IT folks are finally
beginning to understand
that compliance means
that you’re compliant, but
it doesn’t mean you’re
secure.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
TRACK, PURSUE, AND
NEUTRALIZE THREATS.
The longer threats remain undetected, the more damaging they become. Take control of your information and
fight threats on your terms. It’s time to start advancing security. Take the next step at symantec.com /healthcare
15Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
15
CUSTOMMEDIA
Overcoming the Data Security Threat Tsunami
Mark Hagland
CynergisTek’s Mac McMillan offers his perspectives on data’s biggest concerns
Mac McMillan, CEO of the Austin, Tex.-based CynergisTek consulting firm, is a very well-known figure
in healthcare IT, and a widely respected healthcare IT security expert. Recently, he spoke with HCI 
Editor-in-Chief Mark Hagland regarding some of the most important—and pressing—developments in data
security right now in U.S. healthcare. Below are excerpts from that interview.
It was great to speak with you when we were both in Las Vegas participating in HIMSS16. Did you find
anything surprising at the 2016 HIMCC Conference? Did anything you see or hear at the conference
change your mind about anything? We spoke at HIMSS after the now-infamous Hollywood Presbyterian
Medical Center ransomware incident.
I don’t think there was anything that changed my mind. But one thing that struck me was that there certainly
was a higher sense of urgency around these advanced threats in healthcare. And a lot of people had either
been hit by an advanced threat—either ransomware or a virus—or they knew someone who had been. And
everybody wanted to know what to do to avoid it, because it was becoming a big issue. And that hasn’t
stopped. It was non-stop from just before HIMSS, through HIMSS, and after HIMSS.
Every week now—I don’t visit a hospital now that doesn’t say to me, we’ve had two or three ransomware
attacks or incidents. And in most cases, they also know of the experiences of folks in their local area. And
the number of incidents that actually get reported versus the number of incidents that are occurring, is tiny
—it’s like an iceberg phenomenon.
16Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
16
CUSTOMMEDIA
The good news is that most of these ransomware incidents are not turning out to be debilitating for hospitals,
but they’re certainly causing a loss of time and a lot of costs, and anxiety, and are causing a tremendous
amount of anxiety in our IT people. No one wants to be the hospital that goes down and is incapable
of delivering services.
The appropriate resources have to be devoted to this. I was talking to a COO yesterday, and that COO’s
hospital had just had two incidents. And there were several things we had recommended to them over a year
ago, and they hadn’t done them. And his CIO readily admitted that they needed to do something about it.
And do we really have hurt, do we really have to have the pain, before we do something?
What is at the core of the poor handling of these incidents by some leaders of some patient care or-
ganizations? Is it a lack of vision, strategy, tactics, resources?
At the end of the day, a hospital is a business. And there are things that they’re trying to do with their
resources that enhance the business and grow the revenue. And certainly, security does not do those things.
It enables those things, but it’s a cost center.
And people are being reactive, essentially, rather than proactive, about this threat?
Yes, and to me, that’s a very short-sighted way to manage. I get it that there needs to be a balance and that
you only have X dollars to spend, but I don’t think you should allow this to be put off and become a problem.
Now it’s affecting our ability to move forward. So at some point, you need a better barometer.
Is a successful ransomware attack inevitable, or can it be prevented?
The research we’ve seen indicates that if you’re doing the right things, the majority of ransomware attacks
can be avoided. But even the brand-new attacks can be avoided or controlled more effectively if you’re
doing the right things. If you’re doing all the right things, and it’s a variant of one of these known types
No one wants to be
the hospital that goes
down and is incapable
of delivering services.
17Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
17
CUSTOMMEDIA
of attacks, you can avoid it. If it’s a brand-new attack and we don’t have the signature for it, we can still be
more effective at identifying those things, because we now have advanced malware capabilities that look for
anonymous as well as known signatures. Most organizations not getting into trouble are doing those things.
So maybe the virus or malware gets past their initial defenses, and for a few minutes it’s in the environment
and is encrypting file-shares or systems, or locking up systems, or whatever, but with good defenses, it will
eventually be detected and stopped. For organizations doing the right things, a small percentage of attacks
get through, but they’re able to stop those and be successful. So yes, the majority of attacks can be avoided,
and the others we can identify them more quickly and respond accordingly.
What are the fundamentals for health system leaders to prepare for future, unknown, as of yet
unexperienced, situations? Because it seems that it is very important to consider all the new,
as-of-yet-unexperienced, threats that could emerge.
You’re absolutely correct. Once we figure out how to deal with this [ransomware] effectively, the threat will
move somewhere else. That’s the never-ending nature of criminal activity, right? You build a better bank, and
the criminals figure out some other way to rob you. So healthcare leaders need to understand that this is
something that is not going away. It should be elevated to a serious business process that gets leadership
attention. If you’re going to use electronic systems to support your business, and are going to rely on data,
then you need to understand that this is an ongoing situation that is not going away, and that will evolve over time.
A GAO [General Accounting Office] report just came out today. An evaluation of the problems encountered
around the healthcare.gov website, state by state, with regard to potential problem with criminality. The thing
is that this is sophisticated activity that you need to respond to in a sophisticated way. You would never hire
a general practitioner to do a heart transplant. And yet that’s how people view data security. And they need
to recognize that they’ll never be in a place where they’ll be perpetually secure. So they have to do continuous
testing and continuous monitoring of their environment.
If it’s a brand-new attack
and we don’t have the
signature for it, we can
still be more effective at
identifying those things,
because we now have
advanced malware
capabilities that look for
anonymous as well as
known signatures.
18Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
18
CUSTOMMEDIA
And this hospital I recently met with, they’re still trying to do this themselves. One guy—a good kid—has
been trying to manually monitor a dozen different information systems. And there’s no way he could do all
this. And what happened at this hospital is that one of their security systems was disabled. And they never
knew that, because he’s sitting there manually trying to look through all these events; and unless that event
is configured to be reported, he won’t see it. And that’s what happened. For months, that went undetected.
The solution would have been to have a monitoring service monitoring your systems 24/7—a security
operations center, or “SOC.” Because they’re monitoring your service, to make sure that those systems are
still communicating with each other. Because if a particular sensor stopped reporting, they would send an
alert saying, this sensor is no longer working. As it was, this particular sensor had stopped working in
February 2016. And they didn’t know that. And that’s what happens when we’re trying to monitor our own systems.
So you need to employ outside services, essentially?
You need a 24/7 SOC, as I said, really. Think of it this way: an average, medium-sized hospital probably is
producing literally tens of millions of logs or events a month. There’s nobody on this planet that has a good
enough calibrated eyeball to go through tens of millions of events and could figure out what’s going on.
The problem is too big; you can’t do it yourself. This notion that we can test ourselves, that we can monitor
our environment, has got to go away. We need those independent, objective experts to do this for us and
identify issues, as well as bring the greater awareness. My guys do hundreds of risk assessments a year
across the country and tests. Their depth of knowledge is so much broader than that of the guy who’s
working at a single hospital. And to take advantage of that experience—that’s what we need to do.
It’s a failure of management to fail to engage outside services, then, in your view?
Yes, it absolutely is. In the federal government, when I needed to test my systems, someone else had to do
it, I couldn’t do it; that was the rule in the Defense Department. In the banking space, they can’t do their own
We need those independent,
objective experts to do this
for us and identify issues,
as well as bring the greater
awareness.
19Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
19
CUSTOMMEDIA
assessments, by mandate, they have to have an independent part do assessments; same thing in the credit
card industry. In every other industry, they’re required to hire someone else. Healthcare is unique in that
people are trying to do this themselves.
What will be happening in the data security arena in healthcare in the future?
I think that the threat is going to continue to increase in the future in a big way. As we become more of a
knowledge-based society, more and more responsibility will fall onto technology and data. So this makes
sense. And the one thing that healthcare fears more than anything else is not having their data. And ransomware
attacks that very vulnerability, fear. So from an extortion perspective, it is the perfect vehicle for attacking
vulnerability. And even if it’s not successful, it creates a tremendous amount of disruption.
How are hospitals doing in terms of hiring CISOs [chief information security officers]?
I definitely think that hospitals are getting it, and that they’re trying to hire good people. It’s going to take a
while for a couple of reasons: number one, there aren’t enough people to go around with the right skills.
It’s hard to find the people. Second, there’s still a little bit of a challenge in understanding what they’re going
to have to pay those resources. I was talking earlier this week to a large health system looking to hire a
CISO, and they were talking to a recruiting firm, and they were absolutely shocked at the salary requirements
involved. They thought they were going to hire a $150,000-200,000 resource, but according to the recruiters
from what I heard, for the average business of that size and complexity, they typically are placing CISOs at
$400,000-600,000. So the gap there was huge.
20Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
20
CUSTOMMEDIA
I think it’s worth it to pay someone $500,000 a year to prevent even one $1 million ransomware attack
from succeeding, right?
Well, that’s what the recruiter said. And if people are coming out of other industries, that’s what they’re going
to expect to be paid. And look at the breaches with Anthem, Premera, and Community Health. We’re talking
about tens of millions of dollars—and you’re quibbling about $500,000? Now, $500,000 at a smaller hospital,
that’s not gonna fly. But I can tell you, security people are not cheap. And the reason the cost of security is
going up is that it’s tough to find qualified people, and when you do, you have to pay them well.
On a scale of 1-10 on the scale of optimism/pessimism [with 10 most optimistic], where are you right
now?
I’m probably somewhere between a 5 and a 7. I believe in this industry. And I believe that it will do the right
thing. The question is, how fast will it do it? And my concern is that we’re not moving fast enough to avoid
some of the pain that we don’t have to experience.
Is there anything else you’d like to add?
I think it really does come down to the fact that we just have to make security a priority. And for what it’s
worth, I don’t believe you can say it’s a priority in your organization until you resource it properly. Having plat-
itudes and making speeches, doesn’t mean something is a priority. When an organization puts resources to
something, that’s when it’s a priority. So show me the resources, and I’ll believe you.
And look at the breaches
with Anthem, Premera,
and Community Health.
We’re talking about tens
of millions of dollars—and
you’re quibbling about
$500,000?

More Related Content

What's hot

2 factor authentication beyond password : enforce advanced security with au...
2  factor  authentication beyond password : enforce advanced security with au...2  factor  authentication beyond password : enforce advanced security with au...
2 factor authentication beyond password : enforce advanced security with au...NetwayClub
 
Wombat security infographic_ransomware_june2017
Wombat security infographic_ransomware_june2017Wombat security infographic_ransomware_june2017
Wombat security infographic_ransomware_june2017Andrew Brown
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry Seqrite
 
A Secure Network Bridging the Gap
A Secure Network Bridging the GapA Secure Network Bridging the Gap
A Secure Network Bridging the GapColloqueRISQ
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Proofpoint
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignmentharinathinfotech
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced ThreatsHannah Jenney
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksProofpoint
 
A field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the riskA field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the riskPriyanka Aash
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationProofpoint
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 

What's hot (20)

2 factor authentication beyond password : enforce advanced security with au...
2  factor  authentication beyond password : enforce advanced security with au...2  factor  authentication beyond password : enforce advanced security with au...
2 factor authentication beyond password : enforce advanced security with au...
 
Wombat security infographic_ransomware_june2017
Wombat security infographic_ransomware_june2017Wombat security infographic_ransomware_june2017
Wombat security infographic_ransomware_june2017
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 
A Secure Network Bridging the Gap
A Secure Network Bridging the GapA Secure Network Bridging the Gap
A Secure Network Bridging the Gap
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Data Breach Risk Intelligence
Data Breach Risk IntelligenceData Breach Risk Intelligence
Data Breach Risk Intelligence
 
Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignment
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
 
A field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the riskA field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the risk
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 

Viewers also liked

Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesPeter Wood
 
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityEmerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityCisco Canada
 
Emerging threats of cyberterrorism
Emerging threats of cyberterrorismEmerging threats of cyberterrorism
Emerging threats of cyberterrorismNishith Pandit
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
Increase Brand Awareness Medical Marketing
Increase Brand Awareness Medical MarketingIncrease Brand Awareness Medical Marketing
Increase Brand Awareness Medical MarketingJim Banahan
 
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...North Texas Chapter of the ISSA
 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)U.S. News Healthcare of Tomorrow
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesKurt Hagerman
 
Webinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersWebinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersModern Healthcare
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0grp362
 
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical DevicesExtreme Networks
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannFrank Siepmann
 
Securing Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsSecuring Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsHCL Technologies
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizonteam-WIBU
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...Health IT Conference – iHT2
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsClickSSL
 

Viewers also liked (20)

Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack Surfaces
 
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityEmerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber Security
 
Emerging threats of cyberterrorism
Emerging threats of cyberterrorismEmerging threats of cyberterrorism
Emerging threats of cyberterrorism
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
Increase Brand Awareness Medical Marketing
Increase Brand Awareness Medical MarketingIncrease Brand Awareness Medical Marketing
Increase Brand Awareness Medical Marketing
 
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected Machines
 
Webinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersWebinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of Hackers
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
Securing Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsSecuring Medical Devices From Cyber Threats
Securing Medical Devices From Cyber Threats
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
 

Similar to Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem in Healthcare

Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Dan L. Dodson
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docxalinainglis
 
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...The Lifesciences Magazine
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020Matthew Doyle
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxperryk1
 
NYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityNYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityOndrej Krehel
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationMaaz Ahmed Shaikh
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioSusanaFurman449
 

Similar to Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem in Healthcare (20)

Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docx
 
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docx
 
NYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityNYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-Security
 
Compliance
ComplianceCompliance
Compliance
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem in Healthcare

  • 1. CUSTOMMEDIA Sponsored by Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare
  • 2. 2Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 2 CUSTOMMEDIA Table of Contents 03 Ransomware Attacks Will Become Common in 2016; Threats are Under Combatted and Highly Profitable 07 Are CIOs and CISOs Behind the Curve on Data Security? Results of a New Survey Say Yes 15 Overcoming the Data Security Threat Tsunami 21 About Symantec & ITS 22 Additional Resources
  • 3. 3Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 3 CUSTOMMEDIA 3Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 3 CUSTOMMEDIA Ransomware Attacks Will Become Common in 2016; Threats are Under Combatted and Highly Profitable Heather Landi While the ransomware breach at Hollywood Presbyterian Medical Center in Los Angeles may seem like an unfortunate, yet isolated, incident, a new report from the Institute for Critical Infrastructure Technology (ICIT) warns that ransomware threats will likely escalate this year. According to the ICIT report, 2016 will be the year ransomware will “wreak havoc on America’s critical infrastructure community.” “To pay or not to pay,” will be the question fueling heated debate in boardrooms across the country, according to the report authors: James Scott, ICIT senior fellow and Drew Spaniel, ICIT visiting scholar from Carnegie Mellon University. ICIT is a non-profit think tank that advises decision makers on technology and cybersecurity trends in infrastructure sectors including government, defense and healthcare. The report gives an analysis of the ransomware threat as well as the attacker and targets and provides mitigation strategies. “Ransomware is less about technological sophistication and more about exploitation of the human element. Simply, it is a digital spin on a centuries old criminal tactic,” the authors stated. The report authors also tapped into cybersecurity research contributed by security firms, such as Kaspersky, Covenant Security Solutions, Securonix, Forcepoint, GRA Quantum and Trend Micro, for insights into ransomware attacks. These security firms predict a dominant resurgence of ransomware attacks this year, according to the report, and already healthcare organizations have been targeted, such as the incident at Hollywood Presbyterian Medical Center. According to the ICIT report, 2016 will be the year ransomware will “wreak havoc on America’s critical infrastructure community.”
  • 4. 4Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 4 CUSTOMMEDIA 4Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 4 CUSTOMMEDIA “The healthcare sector was not a traditional target for ransomware attacks. One theory is that attackers did not target systems that jeopardized lives,” Scott and Spaniel wrote. However, they noted, recently, that mentality has changed for at least the group operating the Locky ransomware as evidenced by the incident at Hollywood Presbyterian Medical Center. The report authors point out that cyber threat actors are using ransomware attacks because these attacks are “under combatted and highly profitable.” And, unlike hackers who attempt to exfiltrate or manipulate data, ransomware criminals only attempt to prevent access to data and during an active ransomware attack, business operations grind to a halt until the system is restored or replaced. And, with the prevalence of mobile devices and the growth of the Internet of Things (IoT), the “potential threat landscape available to ransomware threat actors is too tantalizing a target to ignore.” Consequently, “Information security specialists and the technical controls that they implement must become adaptable, responsive, and resilient to combat emerging threats,” Scott and Spaniel wrote. How profitable is ransomware? According to research provided by security firms, creating a phishing page and setting up a mass spam email costs about $150. “A trendy crypto ransomware sells for about $2000 on dark net forums. Locker ransomware probably costs less. This means that an attacker only needs to ransom eight everyday users (at the average $300) to generate a profit,” the authors wrote. “Symantec estimated that in 2009, 2.9 percent of the victims paid the ransom. In 2014, CTU researchers estimated that about 1.1 percent of the Cryptowall ransomware victims paid the ransom (at an average of $500). Despite this seemingly low response rate, the FBI reported that from the 992 related complaints, Cryptowall reportedly netted over $18 million from victims between 2014-2015.” The report specifically details the types of ransomware, such as locker ransomware and crypto ransomware, with the Locky ransomware being an active example and the type that infected medical systems belonging to Hollywood Presbyterian Medical Center. In that incident, while healthcare data remained unaffected,
  • 5. 5Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 5 CUSTOMMEDIA 5Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 5 CUSTOMMEDIA computers essential to laboratory work, CT scans, emergency room systems and pharmacy operations were infected. “After ten days, the administration paid attackers 40 Bitcoins ($17,000) to release the systems. Later that week, five computers belonging to the Los Angeles County health department were infected with a ransomware variant. The health department refuses to pay the ransom and will restore its systems from backups. Similarly, two hospitals in Germany were infected with ransomware at roughly the same time as Hollywood Presbyterian Medical Center. Both are restoring their systems from backup systems,” Scott and Spaniel wrote. Scott and Spaniel also highlight that ransomware follows the same distribution and infection vectors, or delivery channels, as traditional malware such as traffic distribution services, malvertisement, phishing emails, downloaders, social engineering and ransomware as a service (RaaS). The authors also detail mitigation strategies noting that “preventing infection is preferred over remediation efforts.” “The first step to mitigating a ransomware threat is to implement a comprehensive cybersecurity strategy,” the authors stated. “Software and hardware solutions are necessary, but they are not the only necessity. First and foremost, information security training and awareness must improve. Afterward, organizations can rely on the layered defenses that they have invested in to secure their network. The report recommends that organizations have a dedicated information security team to ensure all systems were updated and patched and that critical systems were backed up. Organizations also should have layered defenses to protect networks. And, personnel training and awareness are critical as information security experts often cite that “humans are the weakest link.” “Employees should be trained to recognize a malicious link or attachment. There is no justifiable reason that most organizations cannot reduce their personnel’s malicious link click rate below 15 percent,” the authors stated. “Teach employees to not click on any links in any emails. It takes barely any more time to type a link into Google as it does to click the link. Personnel should only open attachments from personnel that they trust and only if they are expecting the file.” First and foremost, information security training and awareness must improve. Afterward, organizations can rely on the layered defenses that they have invested in to secure their network. Employees should be trained to recognize a malicious link or attachment. There is no justifiable reason that most organizations cannot reduce their personnel’s malicious link click rate below 15 percent.
  • 6. 6Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 6 CUSTOMMEDIA 6Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 6 CUSTOMMEDIA Healthcare leaders also should focus on administrative policies and procedures to strengthen cyber defense and consider cyber insurance policies that cover ransomware attacks. When a compromise does occur, the ICIT report recommends that organizations disengage from communi- cating with the attack until the situation is thoroughly assessed and a course of action decided. “The proper response will depend on the risk appetite of the organization, the potential impact of the hos- tage data, the impact on business continuity, whether a redundant system is available, and the sectorial regulatory requirements,” Scott and Spaniel wrote. The report authors concluded that the enlistment of an information security team is the first step in a com- panywide security strategy. And, the information security team should, at minimum, “conduct an immediate companywide vulnerability analysis, develop a crisis management strategy that takes into consideration all know threats and also conduct continuous device and application patching, auditing of third party vendors and agreements as well as organizational penetration testing and security centric technological upgrades.” “Together, these actions can profoundly minimize a company’s attack surface,” the authors stated.
  • 7. 7Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 7 CUSTOMMEDIA Are CIOs and CISOs Behind the Curve on Data Security? Results of a New Survey Say Yes Mark Hagland David Finn, the health IT officer at Symantec, discusses the results of a new survey of CIOs on data security, and its implications for the next few years With all the recent headlines and developments around data security breaches, hacking incidents, and even ransomware attempts, hitting U.S. patient care organizations, one might think that CIOs, their fellow c-suite executives, and hospital and medical group boards of directors might be farther along on their data cyber- security journey. In fact, a new survey-based study has found, there is real reason for concern. Leaders from HIMSS Analytics, a division of the Chicago-based Healthcare Information & Management Systems Society, and from the Mountain View, Calif.-based Symantec, released the results of a new study, entitled  “Healthcare IT Security and Risk Management Study.” David Finn, the health IT officer at Symantec, released and described some of the results on Wednesday, March 2, 2016 on the exhibit floor of the Sands Expo in Las Vegas, during HIMSS16. The survey was conducted online in December 2015, and received 115 online respondents. Then interviewers pursued 10 phone interviews with CIOs and other healthcare IT leaders, in order to obtain more richness of detail from the online survey results. With regard to the respondents, 38.3 percent represent hospitals and health systems with 501 or more beds; 26.2 percent represent hospitals and health systems with 251-500 beds; 36.5 percent represents hospitals and health systems with 101-250 beds; and none represent hospitals and health systems with fewer than 100 beds.
  • 8. 8Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 8 CUSTOMMEDIA Among the numbers important findings: When asked what percentage of their total IT budget (operating and capital) is devoted to IT security, 51.6 percent said 0-3 percent; 28.6 percent said 4-6 percent; 9.9 percent said 7-10 percent; and 9.9 percent said more than 10 percent. Asked how many employees from both inside and outside IT are allocated to IT security in their organization, the results were as follows: fewer than 1 inside IT, 12.0 percent, fewer than 1 outside IT, 55.9 percent; 1-5 inside IT, 60.2 percent, 1-5 outside IT, 32.5 percent; 6-10 inside IT, 10.2 percent, 6-10 outside IT, 2.9 percent; 11-20 inside IT, 8.3 percent, 11-20 outside IT, 20.0 percent; 21-30 inside IT, 3.7 percent, 21-30 outside IT, 1.0 percent; more than 30 inside IT, 5.6 percent, more than 30 out- side IT, 5.9 percent. The adjusted total average number of IT employees devoted to IT security was 9.9 FTEs. With regard to how often IT security was discussed at their organizations’ board meetings, 53.9 percent said it was discussed “upon request of the board or executive management”; 20.9 percent said, “at most board meetings”; 10.4 percent said, “at every board meeting”; 7.8 percent said, “never”; and 7.0 percent said, “other.” Unfortunately, only 46.09 percent of respondents are currently addressing data security threats po- tentially coming through their organizations’ medical devices, though 33.04 percent are “beginning” to do so, and another 16.52 percent “plan to do so.” The percentages of respondents whose organizations are already addressing IT security on mobile devices and on cloud-based applications are higher, at 69.57 percent and 61.74 percent, respectively.
  • 9. 9Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 9 CUSTOMMEDIA Finn, a former hospital CIO, spoke with HCI Editor-in-Chief Mark Hagland regarding the study. Below are excerpts from that interview. There are a lot of significant results to talk about from this survey and study. Were you surprised by any of the results involved? You know, that’s a great question. We get that asked a lot. And honestly, since I’ve been doing this for so long, the only surprising thing is, here we are 13 years down the road from the privacy act, and 11 years down the road from the security act, and the only thing surprising to me is that we still haven’t done very much, substantively speaking. We haven’t addressed some of the real issues like medical devices; and we still haven’t addressed issues like cloud and mobile devices. And we still approach it from this kind of “check-the-box” perspective, as though it’s a compliance issue, and compliance doesn’t protect you, you’ve still got to be secure. The now-infamous ransomware situation unfolded at Hollywood-Presbyterian Medical Center after the survey had been completed. What do you think of that situation in the context of the survey/study? I went directly to HIMSS from a week on the road, and my weeks on the road are typically with customers. And every customer that week before HIMSS had noted an uptick in ransomware attempts. And these are not purely Symantec customers, they also have other products. And they all made it through those ransom- ware attempts; one struggled, but they all made it through. And there was some bashing about Hollywood Presbyterian paying the ransom. But the thing is, this is not a security problem. When Hollywood Presbyterian paid the ransom, it wasn’t to get data back or turn systems on, it was because they couldn’t take care of patients. This is not a security issue, it’s a patient care issue. And this will continue to happen. And it really needs to become a concern of the c-suite—and CIOs need to communicate that to the c-suite.
  • 10. 10Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 10 CUSTOMMEDIA What do CIOs need to do to get their fellow c-suite leaders engaged around data security right now? The issue is, the IT people do see this as an IT issue, and there is an IT issue, of course, and if IT folks don’t effectively run anti-virus and anti-malware programs and address patch issues, and maintain good firewalls, and all that—well, all that is necessary, of course. But the problem is that IT people so often don’t explain the problem well in terms of the business issues involved. I’ll tell you a story from when I was a CIO. We went through a network upgrade at one point, and we needed to upgrade a number of Pyxis (medication dispensing) cabinets in order to keep our network updated. So I had my CTO address the issue with our information management governance committee. But he came back to me and told me we hadn’t gotten the money we needed, which was $325,000. That may sound like a lot, but my annual budget was $20 million, so it wasn’t a huge amount. My CTO had focused on the need to upgrade systems, etc.; in other words, he had spoken in [technocratic] terms. So I took him with me and we went and spent some time with a nurse manager. And what we ended up with was good data on the real costs involved in loss of productivity from non-replacement of those cabinets. We found out what the time lag would be if a cabinet couldn’t be unlocked in a timely way. Ultimately, the costs around loss of productivity meant that the hospital would have to hire more nursing staff, and the numbers added up. So I went back and said, this is the additional cost to the nursing budget. So needless to say, we left the meeting without even having to ask for the money. So this is what CIOs need to do: they need to be able to translate the costs [of non-investment in IT into specific costs] for the clinicians and executives.
  • 11. 11Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 11 CUSTOMMEDIA Another survey result was that only 19.9 percent of respondents reported that more than 6 percent of their organization’s total IT budget was being spent on data security. Do you think that that proportion will change anytime soon? We are starting to see an uptick in 2016 spending, and most other surveys are seeing that. But if you look at that, over half of respondents were spending 3 percent or less. And what we find is that federal government officials say that 16 percent of their IT spend goes to IT security. And in the financial services sector, we see 12-16 percent on average. So at 3 percent, we’re never going to be secure. And we have much more valuable data than some other industries. And so who are the bad guys going to go to? I think we see the answer to that. Another significant survey result was that on average, most organizations have fewer than five em- ployees dedicated to data security. Yes, there are two pieces to that. The first reaction I get from people [when they hear how few staff are dedicated to data security nationwide] is that they conclude that we’re talking about small hospital organiza- tions. But 60 percent of our respondents were from organizations with over 250 beds, and 38 percent were over 500 beds. So these are not critical-access hospitals. Will that change soon? Well, we’re actually starting to see security people embedded in [a variety of] business units. That’s why we asked about security people inside and outside of IT. I’m aware of a couple of hospitals requiring that the business units in revenue cycle and other areas hire someone to do IT security within the unit rather than IT. I was a little surprised that the numbers were so small outside IT, but I think it’s the beginning of a trend. So yes, I was surprised that it was still five or fewer for the most part. And we don’t have a clear idea whether they’re referring to parts of an FTE; and in fact, that may actually be true. You know, often, they have a network guy who does half-time firewall and half-time network support. We are starting to see an uptick in 2016 spending, and most other surveys are seeing that. But if you look at that, over half of respondents were spending  3 percent or less. I’m aware of a couple of hospitals requiring that the business units in revenue cycle and other areas hire someone to do IT security within the unit rather than IT.
  • 12. 12Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 12 CUSTOMMEDIA One survey result was that CIOs seemed to be more focused on broad strategy than on end-user education. Would you agree that that is a problem? It’s a big problem, and even though a high-ranking security strategy sounds good, what’s clear from an addi- tional survey result is that the regular education of end-users is still a relatively low priority. And it’s quite dis- turbing that cybersecurity for end-users was the lowest-rated of several priorities. The level of training was a little higher, but it’s annual end-user training. And we know that the once-a-year, 40-minute, training doesn’t do very much. But the reality is that every end-user needs to be a security person. And we found that in the nuance in the in-depth interviews that most of the training is once-a-year stuff. A lot are doing phishing test- ing of staff, and that’s a good thing, but they need to do more, and do it more regularly. What did you think about the results around how often data security is discussed at board meetings? That result looks good, until you realize it’s on request, and that only 10 percent are doing it at every board meeting. And if we’re saying that cybersecurity strategy is key for the organization and that cybersecurity is a function of the business, which it should be these days, I believe that every board should get a financial/ spending report and also a quality/adverse event report, at every board meeting. They’re not getting cybersecurity reports at every board meeting, because it’s not actually as important as their CIO or CISO tells us it is. And for the CEO or board to be ignoring it means that there’s a huge disconnect there. Given all of these results, what should CIOs be doing right now? The first thing is that whether the CIO or CISO or ideally, both of them together, are involved, they need to go to the board and put in a plan for IT security governance, and the governance committee has to include stakeholder leaders from across the entire organization. And it has to include additional tools, spending, and head count. The other thing is that that governance group has to include medical device security now. We found that over half of organizations were either just beginning to address, or were planning to address,
  • 13. 13Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 13 CUSTOMMEDIA medical devices. We saw medical devices being used as points of entry for bad stuff. The bad guys have figured out how to use medical devices to get access to data through the network using that device. How would you characterize your level of optimism or pessimism around all this, on a scale from 0 to 10? That is a tough question. I frankly am not optimistic, in the sense that I believe things are still going to get worse before we change our focus and context. All is not lost; I’m not ready to jump off the top of a tall building. We haven’t hit bottom yet. We should have, after Anthem and after HP, those were clarion calls, the message was pretty clear; but I don’t think we’ve figured it out yet. Is there anything else you’d like to add? CIOs and CISOs didn’t even understand the threat environment, how dangerous it is, until recently. But I think they realize that everything is out the window, and we need to refocus away from protecting devices, but instead protect the data. People are stealing credentials to get in. What’s more, we still don’t fully understand the data flows, how data flows into the organization, through it, and out of it. And the IT folks are finally beginning to understand that compliance means that you’re compliant, but it doesn’t mean you’re secure. And we’ve got to get some of these compliance and risk managers involved, and looking at the actual risk. We need to change our perspective into one that’s not IT-based, but based on the business, and on the engagement of top stakeholders in the organization. And the IT folks are finally beginning to understand that compliance means that you’re compliant, but it doesn’t mean you’re secure.
  • 14. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. TRACK, PURSUE, AND NEUTRALIZE THREATS. The longer threats remain undetected, the more damaging they become. Take control of your information and fight threats on your terms. It’s time to start advancing security. Take the next step at symantec.com /healthcare
  • 15. 15Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 15 CUSTOMMEDIA Overcoming the Data Security Threat Tsunami Mark Hagland CynergisTek’s Mac McMillan offers his perspectives on data’s biggest concerns Mac McMillan, CEO of the Austin, Tex.-based CynergisTek consulting firm, is a very well-known figure in healthcare IT, and a widely respected healthcare IT security expert. Recently, he spoke with HCI  Editor-in-Chief Mark Hagland regarding some of the most important—and pressing—developments in data security right now in U.S. healthcare. Below are excerpts from that interview. It was great to speak with you when we were both in Las Vegas participating in HIMSS16. Did you find anything surprising at the 2016 HIMCC Conference? Did anything you see or hear at the conference change your mind about anything? We spoke at HIMSS after the now-infamous Hollywood Presbyterian Medical Center ransomware incident. I don’t think there was anything that changed my mind. But one thing that struck me was that there certainly was a higher sense of urgency around these advanced threats in healthcare. And a lot of people had either been hit by an advanced threat—either ransomware or a virus—or they knew someone who had been. And everybody wanted to know what to do to avoid it, because it was becoming a big issue. And that hasn’t stopped. It was non-stop from just before HIMSS, through HIMSS, and after HIMSS. Every week now—I don’t visit a hospital now that doesn’t say to me, we’ve had two or three ransomware attacks or incidents. And in most cases, they also know of the experiences of folks in their local area. And the number of incidents that actually get reported versus the number of incidents that are occurring, is tiny —it’s like an iceberg phenomenon.
  • 16. 16Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 16 CUSTOMMEDIA The good news is that most of these ransomware incidents are not turning out to be debilitating for hospitals, but they’re certainly causing a loss of time and a lot of costs, and anxiety, and are causing a tremendous amount of anxiety in our IT people. No one wants to be the hospital that goes down and is incapable of delivering services. The appropriate resources have to be devoted to this. I was talking to a COO yesterday, and that COO’s hospital had just had two incidents. And there were several things we had recommended to them over a year ago, and they hadn’t done them. And his CIO readily admitted that they needed to do something about it. And do we really have hurt, do we really have to have the pain, before we do something? What is at the core of the poor handling of these incidents by some leaders of some patient care or- ganizations? Is it a lack of vision, strategy, tactics, resources? At the end of the day, a hospital is a business. And there are things that they’re trying to do with their resources that enhance the business and grow the revenue. And certainly, security does not do those things. It enables those things, but it’s a cost center. And people are being reactive, essentially, rather than proactive, about this threat? Yes, and to me, that’s a very short-sighted way to manage. I get it that there needs to be a balance and that you only have X dollars to spend, but I don’t think you should allow this to be put off and become a problem. Now it’s affecting our ability to move forward. So at some point, you need a better barometer. Is a successful ransomware attack inevitable, or can it be prevented? The research we’ve seen indicates that if you’re doing the right things, the majority of ransomware attacks can be avoided. But even the brand-new attacks can be avoided or controlled more effectively if you’re doing the right things. If you’re doing all the right things, and it’s a variant of one of these known types No one wants to be the hospital that goes down and is incapable of delivering services.
  • 17. 17Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 17 CUSTOMMEDIA of attacks, you can avoid it. If it’s a brand-new attack and we don’t have the signature for it, we can still be more effective at identifying those things, because we now have advanced malware capabilities that look for anonymous as well as known signatures. Most organizations not getting into trouble are doing those things. So maybe the virus or malware gets past their initial defenses, and for a few minutes it’s in the environment and is encrypting file-shares or systems, or locking up systems, or whatever, but with good defenses, it will eventually be detected and stopped. For organizations doing the right things, a small percentage of attacks get through, but they’re able to stop those and be successful. So yes, the majority of attacks can be avoided, and the others we can identify them more quickly and respond accordingly. What are the fundamentals for health system leaders to prepare for future, unknown, as of yet unexperienced, situations? Because it seems that it is very important to consider all the new, as-of-yet-unexperienced, threats that could emerge. You’re absolutely correct. Once we figure out how to deal with this [ransomware] effectively, the threat will move somewhere else. That’s the never-ending nature of criminal activity, right? You build a better bank, and the criminals figure out some other way to rob you. So healthcare leaders need to understand that this is something that is not going away. It should be elevated to a serious business process that gets leadership attention. If you’re going to use electronic systems to support your business, and are going to rely on data, then you need to understand that this is an ongoing situation that is not going away, and that will evolve over time. A GAO [General Accounting Office] report just came out today. An evaluation of the problems encountered around the healthcare.gov website, state by state, with regard to potential problem with criminality. The thing is that this is sophisticated activity that you need to respond to in a sophisticated way. You would never hire a general practitioner to do a heart transplant. And yet that’s how people view data security. And they need to recognize that they’ll never be in a place where they’ll be perpetually secure. So they have to do continuous testing and continuous monitoring of their environment. If it’s a brand-new attack and we don’t have the signature for it, we can still be more effective at identifying those things, because we now have advanced malware capabilities that look for anonymous as well as known signatures.
  • 18. 18Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 18 CUSTOMMEDIA And this hospital I recently met with, they’re still trying to do this themselves. One guy—a good kid—has been trying to manually monitor a dozen different information systems. And there’s no way he could do all this. And what happened at this hospital is that one of their security systems was disabled. And they never knew that, because he’s sitting there manually trying to look through all these events; and unless that event is configured to be reported, he won’t see it. And that’s what happened. For months, that went undetected. The solution would have been to have a monitoring service monitoring your systems 24/7—a security operations center, or “SOC.” Because they’re monitoring your service, to make sure that those systems are still communicating with each other. Because if a particular sensor stopped reporting, they would send an alert saying, this sensor is no longer working. As it was, this particular sensor had stopped working in February 2016. And they didn’t know that. And that’s what happens when we’re trying to monitor our own systems. So you need to employ outside services, essentially? You need a 24/7 SOC, as I said, really. Think of it this way: an average, medium-sized hospital probably is producing literally tens of millions of logs or events a month. There’s nobody on this planet that has a good enough calibrated eyeball to go through tens of millions of events and could figure out what’s going on. The problem is too big; you can’t do it yourself. This notion that we can test ourselves, that we can monitor our environment, has got to go away. We need those independent, objective experts to do this for us and identify issues, as well as bring the greater awareness. My guys do hundreds of risk assessments a year across the country and tests. Their depth of knowledge is so much broader than that of the guy who’s working at a single hospital. And to take advantage of that experience—that’s what we need to do. It’s a failure of management to fail to engage outside services, then, in your view? Yes, it absolutely is. In the federal government, when I needed to test my systems, someone else had to do it, I couldn’t do it; that was the rule in the Defense Department. In the banking space, they can’t do their own We need those independent, objective experts to do this for us and identify issues, as well as bring the greater awareness.
  • 19. 19Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 19 CUSTOMMEDIA assessments, by mandate, they have to have an independent part do assessments; same thing in the credit card industry. In every other industry, they’re required to hire someone else. Healthcare is unique in that people are trying to do this themselves. What will be happening in the data security arena in healthcare in the future? I think that the threat is going to continue to increase in the future in a big way. As we become more of a knowledge-based society, more and more responsibility will fall onto technology and data. So this makes sense. And the one thing that healthcare fears more than anything else is not having their data. And ransomware attacks that very vulnerability, fear. So from an extortion perspective, it is the perfect vehicle for attacking vulnerability. And even if it’s not successful, it creates a tremendous amount of disruption. How are hospitals doing in terms of hiring CISOs [chief information security officers]? I definitely think that hospitals are getting it, and that they’re trying to hire good people. It’s going to take a while for a couple of reasons: number one, there aren’t enough people to go around with the right skills. It’s hard to find the people. Second, there’s still a little bit of a challenge in understanding what they’re going to have to pay those resources. I was talking earlier this week to a large health system looking to hire a CISO, and they were talking to a recruiting firm, and they were absolutely shocked at the salary requirements involved. They thought they were going to hire a $150,000-200,000 resource, but according to the recruiters from what I heard, for the average business of that size and complexity, they typically are placing CISOs at $400,000-600,000. So the gap there was huge.
  • 20. 20Ransomware and Emerging Cyber Threats: Why It’s More Than Just An IT Problem in Healthcare 20 CUSTOMMEDIA I think it’s worth it to pay someone $500,000 a year to prevent even one $1 million ransomware attack from succeeding, right? Well, that’s what the recruiter said. And if people are coming out of other industries, that’s what they’re going to expect to be paid. And look at the breaches with Anthem, Premera, and Community Health. We’re talking about tens of millions of dollars—and you’re quibbling about $500,000? Now, $500,000 at a smaller hospital, that’s not gonna fly. But I can tell you, security people are not cheap. And the reason the cost of security is going up is that it’s tough to find qualified people, and when you do, you have to pay them well. On a scale of 1-10 on the scale of optimism/pessimism [with 10 most optimistic], where are you right now? I’m probably somewhere between a 5 and a 7. I believe in this industry. And I believe that it will do the right thing. The question is, how fast will it do it? And my concern is that we’re not moving fast enough to avoid some of the pain that we don’t have to experience. Is there anything else you’d like to add? I think it really does come down to the fact that we just have to make security a priority. And for what it’s worth, I don’t believe you can say it’s a priority in your organization until you resource it properly. Having plat- itudes and making speeches, doesn’t mean something is a priority. When an organization puts resources to something, that’s when it’s a priority. So show me the resources, and I’ll believe you. And look at the breaches with Anthem, Premera, and Community Health. We’re talking about tens of millions of dollars—and you’re quibbling about $500,000?