Healthcare providers are increasingly falling victim of cyber attacks, Rajesh Maurya, Regional Director, India & SAARC, Fortinet, examines the reasons for data breaches in healthcare facilities by pointing out the sensitivity and value of health information and other vulnerabilities.
The healthcare industry is under attack for a reason. Cybercriminals view it as a place thatâs ripe for âbig winsâ, and the number of large healthcare institutions recently falling victim to data breaches shows theyâre having success.
But, what exactly makes healthcare such a popular target among todayâs cyber criminal community? Whatâs so appealing to malicious hackers about the healthcare industry?
Sensitivity and Value of Health Information
Cybercriminals who are able to penetrate healthcare networks gain access to sensitive information through medical records. The value of a stolen record is based on its ability to be replaced. For example, credit cards are easy to replace. It simply involves a phone call to the card issuer and a trip to the bank to get a new one. Patient records and other human data, however, are difficult if not impossible to replace. EMRs serve as a one-stop-shop thanks to the availability of full names, social security numbers, addresses, and more.
This information can be used for financial fraud outside the healthcare industry and if the victimsâ health insurance information is gathered, criminals can then sell the information for even more money on black markets. In fact, one Medicare number can reportedly sell for nearly $500 on todayâs black market (up to 10x the amount of a credit card number). Health insurance information can be leveraged for medical fraud, and arms criminals with the information needed to access free medical care, prescriptions, or even the ability to buy expensive medical equipment that can be sold for profit.
Lastly, stolen medical data can go undetected for much longer periods of time than something like a credit card, which is often closed within days of a breach.
Control of Medical Devices and Systems
More internet-connected medical devices and systems are being incorporated into the framework of healthcare than ever before. As a result, cybercriminals are being provided with more avenues of ingress and surfaces to attack than ever before.
Connected devices like drug pumps or pacemakers that are commandeered by cybercriminals could have fatal consequences. However, cybercriminals also try to breach non-life threatening devices to gain access to systems. Newly introduced connected medical devices are especially vulnerable to threats, as security can oftentimes take a backseat to device performance and convenience across the industry.
Once cybercriminals find their way into networks, they arenât just using access to steal patient data. In the past year, there have been a number of instances where ransom ware was used as a means for quick financial âwins.â With ransom ware attacks, cybercriminals seize control of systems and lock them up until the institution pays them currency for returned access. Healthcare institutions are often pressured into paying the sums of money being asked as prolonged downtime can be damaging to reputation, and more importantly, patient safety.
While ransom ware, or even more traditional denial of service attacks (DDoS) will likely continue to be a popular attack method against healthcare organizations, data we have uncovered here at Fortinet suggests that cybercriminals may now be expanding this ransom-based attack strategy to the manufacturing industry.
Healthcare is Vulnerable
With so many connected pieces of medical equipment and different types of software being run, itâs a challenge for healthcare organizations to successfully defend against attacks. Inadequate budgets and a lack of skilled security personnel, combined with the hurdles presented by a variety of security needs, are all holding healthcare institutions back, and cybercriminals are aware of their struggles.
The industryâs vulnerability makes it an easy target for criminals as a result. A attacker targeting a healthcare organization often has the luxury of gathering a little bit of information from one system, and then moving on to their next target without being detected. The number of vulnerable systems in an existing healthcare network makes it simple for them to collect a bunch of small wins over time that can equate to a big win overall.
As evidenced by the headline-grabbing data breaches over the past few years at large insurers and healthcare systems, hackers are finding the most lucrative information in patient medical records. As a result, there is more pressure than ever for healthcare organizations to refine their cyber security strategies.
Todayâs healthcare organisations need to think about ways to speed up and improve their security. Comprehensive cyber security solutions that address todayâs border-less attack surface make it possible for healthcare institutions to be both secure and high-performing at the same time.