DepEd Reiterates The Importance Of Transparency In Improving Education Outcomes

The Department of Education highlights transparency as an essential factor in raising the quality of learning outcomes.

Chef Tatung Wins Big At 21st Philippine Quill Awards For “Gulay vs. Goolai” Campaign

Chef Tatung’s “Gulay vs. Goolai” campaign wins big at the 21st Philippine Quill Awards, showcasing the power of food in building communities and promoting nutrition in challenging times—through his flagship platform, Simpol. #ChefTatung #21stPhilippineQuill #PhilippineQuillAwards #QuillAwards #IABCPhilippines

Unleash Greatness: Gabbi Garcia, Sam YG, & More Celebrities Share Wellness Habits

Celebrities are opening up about their wellness routines, and their insights could inspire anyone to pursue a healthier lifestyle.

PAGEONE Group And Clients Dominate The 21st Philippine Quill Awards With 35 Trophies

Dominating the 21st Philippine Quill Awards, PAGEONE Group and its clients brought home 35 trophies—including groundbreaking campaigns for Chef Tatung, World Vision Philippines, NLEX, STI, TALA, and SM Foundation. With its fourth straight Agency of the Year title, PAGEONE has made history as the winningest agency in Quill Awards history. #PAGEONEGroup #21stPhilippineQuill #PhilippineQuillAwards #QuillAwards #IABCPhilippines

Healthcare Cyberattack Trends In 2019

Healthcare Cyberattack Trends In 2019

24
24

How do you feel about this story?

Like
Love
Haha
Wow
Sad
Angry

During the first five months of 2019, healthcare organizations were under nearly constant cyberattack attempts ranging from targeted phishing and customized ransomware incidents to more common exploits such as malware and botnets. The examples below serve as a takeaway so that we can learn from what has come before.

Traditional Healthcare Network Threats

One of the most prevalent threats was the Android/Generic.AP malware that targets Android mobile devices. Once installed on a phone, this trojan can capture keystrokes, collect system information, download/upload files, perform denial-of-service attacks, and run/terminate processes. In networks where healthcare providers rely on their mobile devices to provide real-time patient information, compromised phones can become a conduit for introducing additional malware into the network and gaining unauthorized access to patient information.

Botnets have been another challenge so far in 2019. Gh0st RAT is able to take full control of a victim’s machine, as well as log keystrokes and hijack webcam and microphone data. Bladabindi is similar, but it can also steal stored credentials such as usernames/passwords and other PII.

Targeted Attacks

We have also seen a spike in targeted attacks against healthcare networks. Incidences of an older trojan called Kwampirs, that targets the systems of MRI and X-ray machines and siphons their configuration data, have been documented being actively deployed inside specific networks.

SamSam ransomware has also been targeting the healthcare industry, but we are now seeing [2] additional capabilities being developed and additional malware being included with the ransomware payload, which should worry security administrators.

What You Can Do

Four Steps To Security Hygiene

The best place to start is with the basics. Best security hygiene practice involves four essential elements:

* Patch your devices religiously.
* Update hardware and software when possible.
* Replace older systems that can no longer be patched or updated.
* Implement strong proximity controls for systems that cannot be replaced.

You Can’t Secure What You Can’t See

Visibility not only requires seeing every device on your network, but also knowing what they are and the role they play. Here are a few:

* MISSION-CRITICAL SYSTEMS – It’s crucial that you understand your mission-critical processes, including critical care areas that cannot withstand downtime.

* ONLINE ASSETS – Maintain an automatically updated inventory of every asset on your network. Those resources that rely on remote access, such as telemedicine or remote clinics, need extra attention.

* EXTENDED INFRASTRUCTURE – You need to not only understand your network topology, but cloud resources such as SaaS applications and infrastructures, as well as remote and branch offices.

* MEDICAL IOT – Monitoring or treatment systems need to be identified, tracked, and secured, including mobile devices that move between hospital departments or even into patient homes.

Segmentation Is Crucial

Once an attacker manages to gain access to the network, they will continue to drive deeper to achieve their goals. Proper network segmentation can limit lateral movement, thereby slowing down attacks and even discouraging attackers – giving you more time for detection and response.

Ransomware – Not If, But When

Given their user’s preference for healthcare networks, healthcare IT administrators need to assume they will continue to be the target of a ransomware attack. Proper preparation includes an aggressive backup strategy, storing backups and recover systems offline, and running restoration drills so recovery can be fast and effective.