Unless you’ve been living under a rock for the past decade, you’ve already heard of phishing.
After years of research, analysis, and first-hand experience, here's what we’ve learned:
Phishing is a big deal.
Last month we held a webinar, with the aim of helping organizations to fight back against phishing. Hosted by Crane Hassold, our Senior Security Threat Researcher & former FBI analyst, and Dane Boyd, our Lead Solution Manager, this was one of the most comprehensive and entertaining webinars that we have hosted on phishing and security awareness training.
In this article we’ll give you the highlights of the webinar, and help you understand why and how your organization should combat phishing attacks.
The healthcare industry, like most others, is obsessed with compliance.
And that makes sense. After all, fines for HIPAA non-compliance are at an all time high, so who wouldn’t make it a top priority?
But as we already know, compliance doesn’t equal security. Thousands of HIPAA compliant healthcare organizations are breached every year, and unless the framework is dramatically tightened in the near future the same will be true in 2017.
We’ve also covered the main causes of healthcare data breaches, and noted that powerful security awareness training is the most natural starting point for security conscious healthcare organization.
But so far, we haven’t really covered what should be included in a healthcare specific security awareness training program. After all, while some aspects of security are relevant to every industry, healthcare organizations are faced with a few highly specific problems that need to be addressed.
Before we consider what should be included, though, it’s worth looking at things from another perspective.
Since the start of 2015, healthcare has been hit with more ransomware than any other industry.
Headlines abound with tales of healthcare organizations declaring states of emergency, turning away patients, and often opting to pay ransoms just to end their nightmare.
Healthcare data breaches are becoming an almost daily occurrence.
Last year, the volume and scale of healthcare data breaches increased more than ever before. In August of 2016, Advocate Health Care, a network of 12 hospitals and over 200 other treatment centers, was hit with a $5.5 million settlement over a series of three data breaches back in 2013.
So what’s going wrong? If you’ve been following this series so far, you’ll know an unprecedented number of threat actors are now targeting the healthcare industry… but how are all these breaches actually happening?
On April 8th 2014 the FBI issued a warning to the healthcare industry.
The two page report informed providers that healthcare data was far more valuable than credit card data or social security numbers, because it could be used for identity theft. To further accentuate the need for security investment, the report continued:
"The healthcare industry is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely."
Let’s face it, being a healthcare CISO isn’t an easy job. The environments are complex, the staff are almost exclusively non-technical, and as of 2015 healthcare is officially the most attacked industry.
But what is it about healthcare that makes it so uniquely difficult to secure? If gambling websites and financial institutions can (for the most part) avoid major breaches, why can’t hospitals and private clinics?
In recent years, healthcare organizations have been attacked with more frequency, velocity, and fervor than any other industry. IBM dubbed 2015 “the year of the healthcare breach” in their 2016 Cyber Security Intelligence Index, and if recent headlines are anything to go by 2016 wasn’t much better.
But why are healthcare organizations targeted so consistently? On the surface, gambling sites and financial institutions would seem like better targets, so what is it about healthcare organizations that threat actors find so tempting?
In the end, it all comes down to one factor: Money.
On the face of it, there’s really only one reason to invest in security awareness training: To avoid breaches, and save money. In reality there’s a bit more to it than that, but let’s stick with this assumption for now.