SlideShare a Scribd company logo
1 of 31
Understanding the Impact of
Cyber Security in Health
Care
©Blue Cross Blue Shield of Michigan
Why is Cyber Security Crucial
for the Health Care Industry?
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Illegal hacking
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Illegal hacking
Ransomware
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Illegal hacking
Ransomware
Malware
Cyber Security is…
A vital aspect of Information Technology that
protects companies’ and organizations’ online
networks, computer programs and sensitive data
from malicious cyberattacks like…
Illegal hacking
Ransomware
Malware
Phishing
There is an endless amount of personal data
shared and stored on the internet, including
members’ health care information…
Cyber Security is Critical
There is an endless amount of personal data
shared and stored on the internet, including
members’ health care information…
…Cyber security is the first line of defense in
ensuring it is safely shared and strongly
protected.
Cyber Security is Critical
How Has the Landscape of
Cyber Security Evolved?
Online threats against health care data and
information have become increasingly
sophisticated, driving Blue Cross’ IT team to
continually evolve its protective measures to
remain first-in-class for data protection.
Over the Years
Historically, hackers have been more focused on
wreaking havoc within the financial service sector.
However, stealing health care information has become
more lucrative by selling it to hackers on the “dark
web.”
Cyber Crime is “Big Business”
Ransomware is used as a form of extortion, holding
data hostage until payment is received. To activate,
simply calls for a click on the wrong link by an
unsuspecting user, like a company employee.
Cyber Crime is “Big Business”
Malware, or malicious software, is computer
software created solely with the intent of harming
and devices, making their functions inactive.
Cyber Crime is “Big Business”
Case in Point
In May and June 2017, the “WannaCry” and “Petya” ransomware attacks
affected the computer systems of governmental and professional
associations in Ukraine, France, India, as well as some hospitals and
health care organizations in the United States.
Upon attempting to use their computer, users affected with these
programs received a message stating that their files had been encrypted
and that a payment of $300-$410 worth of Bitcoin (a form of digital
currency) was required to be able to access their data.
Experts say that “WannaCry” is the
worst digital event to occur in
recent years, affecting more than
200,000 systems.
Combined, these two attacks
affected more than 210,000
systems in 150 countries,
compromising millions of pieces
of member and user information
globally.
Case in Point
Cyber crime manipulates the
unsuspecting and victimizes
the vulnerable.
How Do We Secure
Member Data?
Data Security is a Team Effort
Blue Cross’ IT employees are a critical line of defense – they
are educated on an ongoing basis about how to recognize
potential threats to Blue Cross and member data.
Our social engineering exercises equip our employees with
the tools they need to identify tricks used by hackers to
infiltrate our system.
Data Security is a Team Effort
These social engineering exercises consist of trainings and tests
completed throughout the year, with employees chosen at
random to see if they are able to identify a phishing email.
Data Security is a Team Effort
These social engineering exercises consist of trainings and tests
completed throughout the year, with employees chosen at
random to see if they are able to identify a phishing email.
We consider it successful when they correctly identify a phishing
email, in addition to an opportunity for education when they are
having difficulty identifying them.
Data Security is a Team Effort
Social engineering exercises consist of trainings and tests completed
throughout the year, with employees chosen at random to see if they
are able to identify a phishing email.
We consider it successful when they correctly identify a phishing
email, in addition to an opportunity for education when they are
having difficulty identifying them.
This helps us strengthen security awareness and training programs so
we can better understand our employees’ thought process in
identifying scams, as well as keep a pulse on the evolution of hackers’
sophisticated schemes.
Secure Health Care Service
We also assess the cyber threat landscape to stay one step ahead
of hackers and others with malicious intent who are looking to
threaten Blue Cross or member security.
We connect with experts who are able to plug into trends on the
dark web for insights on how to proactively prepare for hackers
actively working to obtain information illegally.
Identifying ways hackers can
gain access is key to stopping
attacks before they happen.
The Blue Cross IT Team
As a company, we invest in creating new IT positions as
technology continues to advance.
As a tech employer, we find value in hiring candidates with a
variety of professional backgrounds, providing them room to
grow and expand their skillsets.
Just as hackers don’t all come from the same background,
Information Security experts who bring in a variety of
experiences can bring valuable insights to the profession.
Investing in Employees and the Future
It is a commonly-held misconception that IT
professionals have to have a technological
background…
A Place For Everyone
It is a commonly-held misconception that IT
professionals have to have a technological
background…
…However, the ability to learn new skills,
problem solve and adapt to new situations are
key strengths of an IT team member.
A Place For Everyone
There are a number of careers one can pursue as a
member of the Blue Cross IT team, including:
A Place For Everyone
Security
Analyst
Applications
Security
Testing
Engineering and
Architecture
The route to becoming an IT
professional can be curved,
with opportunities to develop a
variety of skills that contribute
to success.
To learn more about Blue Cross IT and
opportunities to join our team, visit:
MIBlueTech.com
Blue Cross Blue Shield of Michigan and Blue Care Network are nonprofit corporations and independent licensees of
the Blue Cross and Blue Shield Association.

More Related Content

What's hot

[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sectorSeqrite
 
Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4jNeo4j
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityIllumeo
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?RONIKMEHRA
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing TechniquesIRJET Journal
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandeyRithikaD1
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 

What's hot (20)

[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 

Similar to Understanding the Impact of Cyber Security in Health Care

Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in DemandSamidha Takle
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptxCompanySeceon
 
A handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needsA handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needsSecuraa
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxArindamGhosal6
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docxArindamGhosal6
 
Unlocking Lucrative Career Paths with Information Security Training.pdf
Unlocking Lucrative Career Paths with Information Security Training.pdfUnlocking Lucrative Career Paths with Information Security Training.pdf
Unlocking Lucrative Career Paths with Information Security Training.pdfMilind Agarwal
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 

Similar to Understanding the Impact of Cyber Security in Health Care (20)

Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
 
A handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needsA handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needs
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Unlocking Lucrative Career Paths with Information Security Training.pdf
Unlocking Lucrative Career Paths with Information Security Training.pdfUnlocking Lucrative Career Paths with Information Security Training.pdf
Unlocking Lucrative Career Paths with Information Security Training.pdf
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 

More from Blue Cross Blue Shield of Michigan

The Blue Cross ENGAGE Portal: Your Resource for Employee Education
The Blue Cross ENGAGE Portal: Your Resource for Employee EducationThe Blue Cross ENGAGE Portal: Your Resource for Employee Education
The Blue Cross ENGAGE Portal: Your Resource for Employee EducationBlue Cross Blue Shield of Michigan
 
Manufacturers build a better benefits package with private exchange
Manufacturers build a better benefits package with private exchangeManufacturers build a better benefits package with private exchange
Manufacturers build a better benefits package with private exchangeBlue Cross Blue Shield of Michigan
 
How to tell if your employees should be wearing protective eye wear
How to tell if your employees should be wearing protective eye wear How to tell if your employees should be wearing protective eye wear
How to tell if your employees should be wearing protective eye wear Blue Cross Blue Shield of Michigan
 

More from Blue Cross Blue Shield of Michigan (19)

The Blue Cross ENGAGE Portal: Your Resource for Employee Education
The Blue Cross ENGAGE Portal: Your Resource for Employee EducationThe Blue Cross ENGAGE Portal: Your Resource for Employee Education
The Blue Cross ENGAGE Portal: Your Resource for Employee Education
 
The Go-To Handbook for the Newly Insured
The Go-To Handbook for the Newly InsuredThe Go-To Handbook for the Newly Insured
The Go-To Handbook for the Newly Insured
 
Top Nine Questions Around Open Enrollment
Top Nine Questions Around Open EnrollmentTop Nine Questions Around Open Enrollment
Top Nine Questions Around Open Enrollment
 
Manufacturers build a better benefits package with private exchange
Manufacturers build a better benefits package with private exchangeManufacturers build a better benefits package with private exchange
Manufacturers build a better benefits package with private exchange
 
How to tell if your employees should be wearing protective eye wear
How to tell if your employees should be wearing protective eye wear How to tell if your employees should be wearing protective eye wear
How to tell if your employees should be wearing protective eye wear
 
Types of specialty benefits
Types of specialty benefitsTypes of specialty benefits
Types of specialty benefits
 
Gift Guide for the Sports Enthusiast
Gift Guide for the Sports Enthusiast Gift Guide for the Sports Enthusiast
Gift Guide for the Sports Enthusiast
 
Gift Guide for the Health Guru
Gift Guide for the Health GuruGift Guide for the Health Guru
Gift Guide for the Health Guru
 
Your tour of tart cherries
Your tour of tart cherriesYour tour of tart cherries
Your tour of tart cherries
 
The where of health care matters
The where of health care mattersThe where of health care matters
The where of health care matters
 
Guy's guide to their health
Guy's guide to their healthGuy's guide to their health
Guy's guide to their health
 
Common Health Insurance Terms
Common Health Insurance TermsCommon Health Insurance Terms
Common Health Insurance Terms
 
Hey Michigan, let's kick breast cancer
Hey Michigan, let's kick breast cancerHey Michigan, let's kick breast cancer
Hey Michigan, let's kick breast cancer
 
Michigan cares about diabetes prevention
Michigan cares about diabetes preventionMichigan cares about diabetes prevention
Michigan cares about diabetes prevention
 
Healthcare reform overview for employers, delivered 5/15/13
Healthcare reform overview for employers, delivered 5/15/13Healthcare reform overview for employers, delivered 5/15/13
Healthcare reform overview for employers, delivered 5/15/13
 
BCBSM Testimony about SB 61 and 62
BCBSM Testimony about SB 61 and 62BCBSM Testimony about SB 61 and 62
BCBSM Testimony about SB 61 and 62
 
Most Favored Nation status and competing health plans
Most Favored Nation status and competing health plansMost Favored Nation status and competing health plans
Most Favored Nation status and competing health plans
 
A Healthier Michigan's Diabetes eCookbook
A Healthier Michigan's Diabetes eCookbookA Healthier Michigan's Diabetes eCookbook
A Healthier Michigan's Diabetes eCookbook
 
Presented to the Michigan Senate Insurance Committee
Presented to the Michigan Senate Insurance CommitteePresented to the Michigan Senate Insurance Committee
Presented to the Michigan Senate Insurance Committee
 

Recently uploaded

Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipurseemahedar019
 
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...Vip call girls In Chandigarh
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsHelenBevan4
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Call Girls Service Chandigarh Ayushi
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...High Profile Call Girls Chandigarh Aarushi
 
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking Modelsindiancallgirl4rent
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service GurgaonRussian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliCall Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliHigh Profile Call Girls Chandigarh Aarushi
 

Recently uploaded (20)

Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
 
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skills
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
 
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service GuwahatiCall Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
 
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service GurgaonRussian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
Russian Call Girls Gurgaon Swara 9711199012 Independent Escort Service Gurgaon
 
Russian Call Girls in Dehradun Komal 🔝 7001305949 🔝 📍 Independent Escort Serv...
Russian Call Girls in Dehradun Komal 🔝 7001305949 🔝 📍 Independent Escort Serv...Russian Call Girls in Dehradun Komal 🔝 7001305949 🔝 📍 Independent Escort Serv...
Russian Call Girls in Dehradun Komal 🔝 7001305949 🔝 📍 Independent Escort Serv...
 
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service DehradunCall Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliCall Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
 
VIP Call Girls Lucknow Isha 🔝 9719455033 🔝 🎶 Independent Escort Service Lucknow
VIP Call Girls Lucknow Isha 🔝 9719455033 🔝 🎶 Independent Escort Service LucknowVIP Call Girls Lucknow Isha 🔝 9719455033 🔝 🎶 Independent Escort Service Lucknow
VIP Call Girls Lucknow Isha 🔝 9719455033 🔝 🎶 Independent Escort Service Lucknow
 

Understanding the Impact of Cyber Security in Health Care

  • 1. Understanding the Impact of Cyber Security in Health Care ©Blue Cross Blue Shield of Michigan
  • 2. Why is Cyber Security Crucial for the Health Care Industry?
  • 3. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like…
  • 4. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like… Illegal hacking
  • 5. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like… Illegal hacking Ransomware
  • 6. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like… Illegal hacking Ransomware Malware
  • 7. Cyber Security is… A vital aspect of Information Technology that protects companies’ and organizations’ online networks, computer programs and sensitive data from malicious cyberattacks like… Illegal hacking Ransomware Malware Phishing
  • 8. There is an endless amount of personal data shared and stored on the internet, including members’ health care information… Cyber Security is Critical
  • 9. There is an endless amount of personal data shared and stored on the internet, including members’ health care information… …Cyber security is the first line of defense in ensuring it is safely shared and strongly protected. Cyber Security is Critical
  • 10. How Has the Landscape of Cyber Security Evolved?
  • 11. Online threats against health care data and information have become increasingly sophisticated, driving Blue Cross’ IT team to continually evolve its protective measures to remain first-in-class for data protection. Over the Years
  • 12. Historically, hackers have been more focused on wreaking havoc within the financial service sector. However, stealing health care information has become more lucrative by selling it to hackers on the “dark web.” Cyber Crime is “Big Business”
  • 13. Ransomware is used as a form of extortion, holding data hostage until payment is received. To activate, simply calls for a click on the wrong link by an unsuspecting user, like a company employee. Cyber Crime is “Big Business”
  • 14. Malware, or malicious software, is computer software created solely with the intent of harming and devices, making their functions inactive. Cyber Crime is “Big Business”
  • 15. Case in Point In May and June 2017, the “WannaCry” and “Petya” ransomware attacks affected the computer systems of governmental and professional associations in Ukraine, France, India, as well as some hospitals and health care organizations in the United States. Upon attempting to use their computer, users affected with these programs received a message stating that their files had been encrypted and that a payment of $300-$410 worth of Bitcoin (a form of digital currency) was required to be able to access their data.
  • 16. Experts say that “WannaCry” is the worst digital event to occur in recent years, affecting more than 200,000 systems. Combined, these two attacks affected more than 210,000 systems in 150 countries, compromising millions of pieces of member and user information globally. Case in Point
  • 17. Cyber crime manipulates the unsuspecting and victimizes the vulnerable.
  • 18. How Do We Secure Member Data?
  • 19. Data Security is a Team Effort Blue Cross’ IT employees are a critical line of defense – they are educated on an ongoing basis about how to recognize potential threats to Blue Cross and member data. Our social engineering exercises equip our employees with the tools they need to identify tricks used by hackers to infiltrate our system.
  • 20. Data Security is a Team Effort These social engineering exercises consist of trainings and tests completed throughout the year, with employees chosen at random to see if they are able to identify a phishing email.
  • 21. Data Security is a Team Effort These social engineering exercises consist of trainings and tests completed throughout the year, with employees chosen at random to see if they are able to identify a phishing email. We consider it successful when they correctly identify a phishing email, in addition to an opportunity for education when they are having difficulty identifying them.
  • 22. Data Security is a Team Effort Social engineering exercises consist of trainings and tests completed throughout the year, with employees chosen at random to see if they are able to identify a phishing email. We consider it successful when they correctly identify a phishing email, in addition to an opportunity for education when they are having difficulty identifying them. This helps us strengthen security awareness and training programs so we can better understand our employees’ thought process in identifying scams, as well as keep a pulse on the evolution of hackers’ sophisticated schemes.
  • 23. Secure Health Care Service We also assess the cyber threat landscape to stay one step ahead of hackers and others with malicious intent who are looking to threaten Blue Cross or member security. We connect with experts who are able to plug into trends on the dark web for insights on how to proactively prepare for hackers actively working to obtain information illegally.
  • 24. Identifying ways hackers can gain access is key to stopping attacks before they happen.
  • 25. The Blue Cross IT Team
  • 26. As a company, we invest in creating new IT positions as technology continues to advance. As a tech employer, we find value in hiring candidates with a variety of professional backgrounds, providing them room to grow and expand their skillsets. Just as hackers don’t all come from the same background, Information Security experts who bring in a variety of experiences can bring valuable insights to the profession. Investing in Employees and the Future
  • 27. It is a commonly-held misconception that IT professionals have to have a technological background… A Place For Everyone
  • 28. It is a commonly-held misconception that IT professionals have to have a technological background… …However, the ability to learn new skills, problem solve and adapt to new situations are key strengths of an IT team member. A Place For Everyone
  • 29. There are a number of careers one can pursue as a member of the Blue Cross IT team, including: A Place For Everyone Security Analyst Applications Security Testing Engineering and Architecture
  • 30. The route to becoming an IT professional can be curved, with opportunities to develop a variety of skills that contribute to success.
  • 31. To learn more about Blue Cross IT and opportunities to join our team, visit: MIBlueTech.com Blue Cross Blue Shield of Michigan and Blue Care Network are nonprofit corporations and independent licensees of the Blue Cross and Blue Shield Association.

Editor's Notes

  1. https://techcrunch.com/2017/06/27/petya-eternalblue-ransomware-microsoft-vulnerability-june-2017/ https://www.inverse.com/article/33469-petya-ransomware-attack-united-states http://www.zdnet.com/article/petya-ransomware-attack-how-many-victims-are-there-really/
  2. https://techcrunch.com/2017/06/27/petya-eternalblue-ransomware-microsoft-vulnerability-june-2017/ https://www.inverse.com/article/33469-petya-ransomware-attack-united-states