Network Security

Healthcare Cybersecurity and Industry Data Still A Prime Target For Cyber-Attackers

Last year the FBI issued a Private Industry Notification, also known as PIN, meant to warn healthcare providers that defense and resilience in their industry were not up to the healthcare cybersecurity standards of other industries and “increased intrusions are likely”. That plus the growing sophistication of cyber-attackers has made the healthcare systems more vulnerable to hackers specifically seeking Americans’ personal health insurance data and medical information.

“The healthcare industry is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely,” the FBI said in the private notice distributed to healthcare providers.

Healthcare and its cybersecurity compliance.

Healthcare data is 20 times more valuable than credit card numbers because the data contains information which is used primarily to obtain prescriptions and quick access to bank accounts.

Insurance Journal notes that some criminals are combining stolen medical information with credit card data, making it easier to conduct identity theft. A package of stolen consumer data, known as “fullz” or “kitz” on underground exchanges, sells for $1,000 or more.

The value of healthcare cybersecurity.

Even with the warning issued in 2014, Anthem Healthcare was breached in February of this year, exposing the data of as many as 80 million records of current and former customers. This serves as a real-time reminder of where the threat level is and why implementing a rock-solid, proven cyber-security initiative is critical.

View our Healthcare Cybersecurity Services to learn more about how we can increase your cybersecurity posture.

Ron Samson

Recent Posts

Microsoft Endpoint Detection and Response vs Other EDR Solutions

Organizations heavily invested in the Microsoft ecosystem face an interesting decision when selecting endpoint protection.…

2 weeks ago

Endpoint Detection and Response Vendors: What to Look for in a Trusted Provider

Choosing the right endpoint security solution can make the difference between stopping a breach early…

3 weeks ago

The Role of Security Information and Event Management Tools in Threat Detection

Cyber threats have become so sophisticated that detecting them requires more than just installing antivirus…

3 weeks ago

Cyber Security Operations Center: Key Features for Stronger Cyber Defense

Modern organizations face relentless cyber threats from multiple directions—ransomware gangs, nation-state actors, insider threats, and…

56 years ago

Integrating MDR Software into Your Existing Security Infrastructure

You've invested significantly in security tools over the years. Firewalls, endpoint protection, email security, network…

4 weeks ago

How a Security Information and Event Management System Enhances Threat Detection

Cybersecurity teams face an overwhelming challenge: how do you spot a genuine threat when your…

56 years ago