Network Security

Healthcare Cybersecurity and Industry Data Still A Prime Target For Cyber-Attackers

Last year the FBI issued a Private Industry Notification, also known as PIN, meant to warn healthcare providers that defense and resilience in their industry were not up to the healthcare cybersecurity standards of other industries and “increased intrusions are likely”. That plus the growing sophistication of cyber-attackers has made the healthcare systems more vulnerable to hackers specifically seeking Americans’ personal health insurance data and medical information.

“The healthcare industry is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely,” the FBI said in the private notice distributed to healthcare providers.

Healthcare and its cybersecurity compliance.

Healthcare data is 20 times more valuable than credit card numbers because the data contains information which is used primarily to obtain prescriptions and quick access to bank accounts.

Insurance Journal notes that some criminals are combining stolen medical information with credit card data, making it easier to conduct identity theft. A package of stolen consumer data, known as “fullz” or “kitz” on underground exchanges, sells for $1,000 or more.

The value of healthcare cybersecurity.

Even with the warning issued in 2014, Anthem Healthcare was breached in February of this year, exposing the data of as many as 80 million records of current and former customers. This serves as a real-time reminder of where the threat level is and why implementing a rock-solid, proven cyber-security initiative is critical.

View our Healthcare Cybersecurity Services to learn more about how we can increase your cybersecurity posture.

Ron Samson

Recent Posts

Top 5 Benefits of Managed Endpoint Detection and Response for Businesses

In today's digital landscape, businesses face an increasing number of sophisticated cyber threats. To combat…

2 weeks ago

SIEM Data Retention Best Practices for Effective Threat Detection

Security Information and Event Management (SIEM) systems play a crucial role in modern cybersecurity strategies.…

2 weeks ago

Cloud SIEM Solutions: A Complete Guide to Streamlined Threat Detection

In today's digital landscape, organizations face an ever-increasing number of cyber threats. To combat these…

3 weeks ago

Endpoint Detection and Response vs Antivirus: Key Differences

In the world of cybersecurity, protecting endpoints - such as computers, laptops, and mobile devices…

3 weeks ago

Explaining What Is EDR in Cyber Security and Its Key Benefits

In the ever-changing world of cyber threats, organizations need robust tools to protect their digital…

3 weeks ago

How a Cyber Security SOC Analyst Responds to Real-Time Threats

In the realm of cybersecurity, the role of a SOC (Security Operations Center) analyst is…

4 weeks ago