SBN

Why Healthcare Cybercrime is the Perfect Storm

It’s Friday night. You, your husband, and your two children are settling in for a fun pizza and movie night together.  Unexpectedly, your elderly neighbor, Anne, calls in a panic. Her husband Steve is having severe chest pains. While Anne has already called emergency services, she asks that you come over to help. As an internal medicine doctor, you know that Steve’s treatment in the next several minutes and hours is absolutely vital. While Steve has the benefit of world-class care at your local medical facility, his recovery and, survival may be hindered by an unlikely yet increasingly pervasive and insidious factor in healthcare – it’s called cybercrime. And it’s running rampant, skyrocketing vulnerabilities, bankrupting healthcare organizations, and—of grave concern–degrading patient care. This is happening at healthcare facilities around the world, none of which are exempt from its potential and often devastating impacts.

How cyber vulnerabilities impact patient care

Specifically, cybercrime can disrupt care, delay prognosis or treatment, and in the worst cases, cause fatalities. That’s because cyberattacks hinder the availability, reliability, and trust of healthcare records, insurance coverage, and access to medical networks. There is a broad array of potential attack surfaces in healthcare, all of which are linked to patient care, such as payment systems, applications, electronic patient data, claims processing, and care management.

In one report, it was found that “hospitals hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts.” For healthcare organizations, full recovery from a cyberattack, which can take months or years, can disrupt the timeliness of care, upset patient processes, and worsen patient outcomes. Patient care is also impacted by facility closures. After weathering a cyberattack and its financial consequences, including compliance violations, some healthcare facilities are shutting down, reducing the availability of local patient care options.

Why healthcare data breaches are the most expensive attacks

  • Across industries, cybercrime is on the rise. Healthcare, however, is the largest[1] and fastest-growing target for cybercrime. When a healthcare data breach occurs, it is also the most expensive attack, at double the average cost of breaches in other industries. Faced with strict compliance requirements (i.e., from HIPAA and CMS), lower margins, and steep regulatory fines, events of this magnitude can devastate a healthcare organization, financially and reputationally.
  • Why is healthcare such a highly targeted industry? There are several factors in play:
  • Medical data’s worth. On the black market, medical data is worth 10 times more than credit card information. In other words, healthcare provides high profit for cybercriminals.
  • PHI’s growth. Patient health information (PHI) and thus personally identifiable information (PII) data is growing exponentially. Electronic information in hospitals is increasing by about 40 percent on a compounded annual growth rate basis. Some applications, such as electronic medical records (EMRs), are growing up to 70 percent per year.
  • Healthcare IT transformations. As healthcare providers offer improved patient experiences via telehealth and other digital channels, the adoption of in-house and third-party cloud-based technologies and applications has risen rapidly. With a dearth of concrete security approaches, together with public cloud usage, cyber gaps and vulnerabilities are created—and often unknowingly remain unaddressed.
  • Inherent vulnerabilities. As systems go, healthcare systems are a relatively easy target for cybercriminals.
  • In addition to public cloud usage, there is the rise of remote work that also increases the attack surface. And, comprehensive care requires that system and data access be provided to a large number of people, including the supply ecosystem, spurring additional vulnerability.
  • Common shortfalls. Layered on top of these factors are outdated IT systems and limited IT staff, which are commonly found in healthcare organizations that operate on slim budgets and narrow profit margins.
  • Inadequate cybersecurity protocols. Most healthcare organizations have aging cybersecurity protocols in place. For example, perimeter and network security are not enough protection. In addition, insufficient security controls are often deployed at the data layer to meet mandatory compliance requirements and regulations. That’s because encryption, access control, and DLP, while helpful, are deficient, especially to insider threats. These gaps introduce security and compliance risks by creating a false sense of protection, leaving vulnerabilities unrecognized, unmitigated, and under-prioritized.

Simply put, the numbers and factors show that healthcare organizations are facing a gravely serious, “not if, but when” situation – in terms of breaches in both cybersecurity and regulatory compliance.

The dark, stark reality of healthcare data breaches

Cybercriminals are exploiting these vulnerabilities. Healthcare organizations and their PHI and PII data are under intense attack and those attacks are increasingly successful. Studies show that over 93 percent of healthcare organizations have experienced a data breach in the past three years and 57 percent have had more than five data breaches during the same time frame. These elevated attack levels are forecasted to keep growing. Cybersecurity Ventures estimates the global healthcare cybersecurity market will increase 15 percent year-over-year during the next five years, reaching $125 billion cumulatively over 2020-2025.

The most prevalent types of attack in healthcare are ransomware attacks. They encrypt patient data and hold it hostage until a ransom is paid, significantly disrupting and broadly disabling patient care until the data is restored. Similar in impact is a distributed denial of service (DDoS) attack that “hides” patient data from healthcare organizations until a ransom is paid to restore the data.

Sadly, the longtail impacts of breaches are often devastating to healthcare organizations. Data breach costs in highly regulated environments like healthcare linger for two or more years after the data breach. These are known as “longtail” costs and about 24% of them are accrued more than two years after the breach occurred.

What got us here won’t get us there

These converging factors are leaving patients and healthcare facilities and their PHI and PII data vulnerable to potentially devastating consequences – often unnecessarily and unknowingly. HIPAA and CMS compliance, while helpful and necessary, do not equal data security. Encryption, DLP, and access control do not provide sufficient protection.  Simply put, yesterday’s solutions are inadequate to counter the current cyber and compliance challenges faced in healthcare – both for today and tomorrow. In cybercrime, every minute and day matters, and taking action today is imperative for healthcare companies of all sizes across the globe.

While healthcare organizations have mighty missions, successfully fulfilling those missions relies on comprehensively securing data. The first step is for healthcare to more clearly recognize that good data protection and security are essential to achieve good privacy and ultimately, to deliver better patient care.

Here are some recommendations to help bolster a healthier data security posture:

  • Adopt a risk-based cybersecurity framework that identifies, assesses, and prioritizes risks for rapid remediation is needed to combat the skyrocketing sophistication and escalating volume of cybercrime in healthcare. For instance, comprehensive frameworks are outlined by:
  • Prioritize and reach a consensus on data-centric security measures across all data types, such as structured, semi-structured, and unstructured. And across all data repositories such as multi-cloud, hybrid cloud, on-premises environments, databases, data lakes, file servers, and SaaS.
  • Inventory all sensitive data, user privileges, and access rights using a holistic discovery, classification, and monitoring approach.
  • Prevent data breaches by using a detection-first approach that keeps data accessible AND protected before a breach can cause damage.

Safeguarding data – safeguards patient care

Healthcare organizations must protect data before a breach occurs and when successful remediation can contain risk and cost at the lowest possible levels. In cybercrime, there are no reverse buttons. Once breached, the damage is underway and escalates over time. Even more importantly, comprehensive data security helps safeguard sensitive patient information and thus patient lives, making it the most urgent imperative and enabler to the collective mission of healthcare organizations around the world.

[1] Cost of a Data Breach 2022, research conducted by Ponemon Institute.

The post Why Healthcare Cybercrime is the Perfect Storm appeared first on Blog.

*** This is a Security Bloggers Network syndicated blog from Blog authored by Terry Ray. Read the original post at: https://www.imperva.com/blog/why-healthcare-cybercrime-is-the-perfect-storm/

Avatar photo

Terry Ray

Terry Ray has served as Chief Technology Officer for Imperva since July 2017. He is responsible for developing and articulating the company’s technical vision and strategy. Previously, he served as Imperva’s Chief Product Strategist where he consulted directly with strategic global customers on industry best practices, threat landscape, data security implementation and industry regulations. Terry is a frequent speaker for RSA, Gartner, ISSA, OWASP, ISACA, IANS, CDM, NLIT, and other organizations worldwide. He holds a B.A. in Management Information Systems from the University of North Texas.

terry-ray has 11 posts and counting.See all posts by terry-ray