Collaborative Care: How Health Systems Can Reduce Industry Cyber Risk

  • 📰 ForbesTech
  • ⏱ Reading Time:
  • 80 sec. here
  • 5 min. at publisher
  • 📊 Quality Score:
  • News: 42%
  • Publisher: 59%

Healthcare News

Cybersecurity,Forbes Technology Council

Successful CIOs, CTOs & executives from Forbes Technology Council offer firsthand insights on tech & business.

hospital systems in the U.S. were hit with successful ransomware attacks, and in May 2024, the St. Louis-based Ascension system was hit with a ransomware attack thatredirected ambulances, postponed medical procedures and other alarming service delays and disruptions.

Advanced threat actors often target specific types of systems in clustered locations due to shared vulnerabilities, which often arise from systems using similar technologies or vendors. By exchanging real-time data on suspicious domains, IP addresses and attacker infrastructure in general, healthcare organizations can identify and block threats early, thus preventing further attacks across the sector.

Account compromise attacks are the most common method being used to plant ransomware that cripples healthcare systems. These organizations should implement verified identity for employees and customers usingcertified technologies and processes. This is the only way to truly know who is accessing a healthcare network or resource and prevent attacks that impersonate legitimate users. -

Healthcare systems can prevent cyberattacks by leveraging proactive threat intelligence. This involves continuous monitoring and analysis of potential threats before they infiltrate the network. By collecting and analyzing data from various sources, including the Dark Web, healthcare systems can identify threats and vulnerabilities specific to their operations and take action to mitigate them. -

Most cyberattacks stem from stolen credentials, and since people are essential in healthcare, a new approach is needed. Healthcare systems can enhance security by adopting advanced data protection methods that decentralize storage and limit access points. Implement robust encryption, real-time monitoring and proactive threat detection to stay ahead of evolving cyberthreats. -

We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

 /  🏆 318. in MY
 

Thank you for your comment. Your comment will be published after being reviewed.
Please try again later.

Malaysia Malaysia Latest News, Malaysia Malaysia Headlines