Sunday, March 7, 2021
  • AC.1.001 Basic Security Requirements (CMMC Level 1)
  • Worldwide Hack: Microsoft Exchange Server Zero-day Exploits
  • BSides Calgary 2020 – Richard Rowlandson’s ‘Developing A Holistic Approach To Threat Hunting: Welcome To The Jungle’
  • Commit Strips’ ‘Call The Police’
  • BEST PRACTICES – 9 must-do security protocols companies must embrace to stem remote work risks

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » 5 Ways Attackers Are Targeting the Healthcare Industry

5 Ways Attackers Are Targeting the Healthcare Industry

by Tripwire Guest Authors on October 11, 2018

The healthcare industry is one of the largest industries in the United States and potentially the most vulnerable. The healthcare sector is twice as likely to be the target of a cyberattack as other sectors, resulting in countless breaches and millions of compromised patients per year. Advancements in the techniques and technology of hackers and identity thieves could escalate these vulnerabilities into a major crisis if the healthcare industry doesn’t adapt.

Cybersecurity in Healthcare

In 2015, over 113 million patients in the healthcare industry were the victims of an information breach, resulting in lost patient revenue and identity theft. The high volume of cyberattacks on healthcare organizations may be an indicator; the average organization receives 32,000 cyberattacks on a daily basis, a much higher rate than other industries experience. A lack of cybersecurity infrastructure and the high value of personal information makes these organizations likely targets for cybercriminals.

The healthcare industry’s increasing reliance on electronic medical records and internet-connected medical devices means the problem of data breaches could increase in the coming years. In 2017, the estimated total losses from cyberattacks amounted to $1.2 billion, and this number is expected to grow as the attack surface of the healthcare industry increases. The same way consumers and patients have their own resources to protect against identity theft, healthcare organizations need their own systems in place to protect against cyber threats. The following list covers the biggest threats to the industry going forward.

  1. Data Breaches

The healthcare industry has the highest rates of data breaches out of any sector. Of the 551 data breaches in 2017, 60% were in the healthcare industry. In some cases, hackers have broken into healthcare databases undetected and maintained access for weeks before they were discovered.

The most common types of data breaches are (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/healthcare/attackers-targeting-healthcare-industry/

October 11, 2018October 11, 2018 Tripwire Guest Authors healthcare, pii, Ransomware, security
  • ← Clarifying the Misconceptions: Monitoring and Auditing for Container Security
  • Microsoft’s Johnson: Data Breach Disclosures a Delicate Balance →

TechStrong TV – Live

Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it
Chinese Exchange Hack: At Best, Microsoft is Incompetent
A Close Call Prompts Security Reassessment
Breach Clarity Data Breach Report: Week of March 1
Okta Acquisition of Auth0 Signals DevSecOps Shift Left
Payroll/HR Giant PrismHR Hit by Ransomware?
Tactical Approach to Combat Cyber Attacks in 2021
Why Less Can Be More When It Comes to Cybersecurity
Eight Rules for Effective Password Protection
Three Top Russian Cybercrime Forums Hacked

Upcoming Webinars

Tue 09

Zero Trust Journey – A Security Leader’s Story

March 9 @ 11:00 am - 12:00 pm
Mon 15

Don’t Get Attached to Your Attachment!

March 15 @ 9:00 am - 10:00 am
Mon 15

Managing Security in a Decentralized World

March 15 @ 1:00 pm - 2:00 pm
Wed 17

API Security: Everything You Need to Know To Protect Your APIs

March 17 @ 1:00 pm - 2:00 pm
Mon 22

The Main Application Security Technologies to Adopt in 2021

March 22 @ 1:00 pm - 2:00 pm
Tue 30

Application Security in the Rapid Digital Transformation Age

March 30 @ 1:00 pm - 2:00 pm
Wed 31

The Anatomy of an Account Takeover Attack

March 31 @ 3:00 pm - 4:00 pm
Apr 01

Pharma Drama: An Interactive Crisis Simulation of an Insider Threat

April 1 @ 11:00 am - 12:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Decentralizing Cloud Security Management
Cloud Security Cybersecurity Governance, Risk & Compliance Industry Spotlight Security Awareness Security Boulevard (Original) 

Decentralizing Cloud Security Management

March 5, 2021 Michael Salleo | 2 days ago 0
A Close Call Prompts Security Reassessment
Application Security Cybersecurity Data Security Industry Spotlight Malware Security Boulevard (Original) 

A Close Call Prompts Security Reassessment

March 4, 2021 Rui Ribeiro | 3 days ago 0
Breach Clarity Data Breach Report: Week of March 1
Cybersecurity Industry Spotlight Security Boulevard (Original) Threats & Breaches Vulnerabilities 

Breach Clarity Data Breach Report: Week of March 1

March 3, 2021 Kyle Marchini | 4 days ago 0

Top Stories

Chinese Exchange Hack: At Best, Microsoft is Incompetent
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Chinese Exchange Hack: At Best, Microsoft is Incompetent

March 4, 2021 Richi Jennings | 2 days ago 0
Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it

March 2, 2021 Richi Jennings | 4 days ago 0
‘Dangerous’ RCE in VMware: Patch, or the Puppy Gets It
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Featured Identity & Access Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Dangerous’ RCE in VMware: Patch, or the Puppy Gets It

February 26, 2021 Richi Jennings | Feb 26 0

Security Humor

via     the comic delivery system monikered   Randall Munroe   resident at   XKCD  !

XKCD ‘Manage Your Preferences’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2021 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.