If you're excited about exploring how healthcare organizations can fortify their cyberdefenses to protect against attacks, then you've come to the right place. If you missed the first part of this blog series, or want a refresher on the importance of cybersecurity in healthcare organizations, you can find it here.
In this second and final part, you'll learn about the measures that healthcare organizations can take to protect sensitive patient health information from attackers and thus save patients' lives. For example, ransomware attacks can bring a hospital to a standstill because all the infected devices, including the surgical display monitors that inform the surgeons about the patients' vitals, will display only the ransom message. This could even cost a patient's life!
According to Gartner, "by 2025, threat actors will have weaponized operational technology environments successfully to cause human casualties." From locking hospital staff members out of critical facilities to stopping them from accepting new patients to preventing them from accessing patient records, a ransomware attack targeting a hospital's operational technology (OT) systems will have catastrophic consequences. If Gartner's prediction comes true, it's not only patient data that healthcare organizations will need to worry about but also the patients themselves. Besides IT security, organizations should also start focusing on ensuring OT security. From asset inventory to network segmentation to patch management, healthcare organizations should stay up to date to prevent cyberattacks.
Healthcare is a part of critical infrastructure and thus should be protected from attacks at all costs. Yet, as discussed in the previous blog, its criticality is one of the main reasons it is such an attractive target for an attacker. So, it becomes especially crucial for healthcare and healthcare-related organizations to scale up their cybersecurity postures to avoid falling victim to ghastly cyberattacks.
The first step towards solving any problem is to identify the problem, because only when you know what the problem is can you find a suitable solution to it. In the case of healthcare organizations, the main problems from a security standpoint are:
Having identified the problems, let's now take a look at how we can tackle them effectively.
To start off, healthcare organizations should reassess their priorities when it comes to cybersecurity. They should understand how vital it is to be secured against cyberattacks and to allocate a dedicated budget to cybersecurity, including personnel, security analytics solutions, frequent security training for staff, and third-party risk assessments for ensuring supply chain security. However, these measures aren't enough. Healthcare organizations should start adopting the data-centric Zero Trust (ZT) approach that involves verifying and validating the trustworthiness of devices trying to connect to organizational networks.
So, be it inside the network or outside, every user and entity accessing data should be authenticated and authorized at every stage. The principle of implicit trust should be replaced with ZT until verified. This is a reversal of the concept of innocent until proven guilty.
For example, instead of blindly trusting that a request to access the patient database coming from a doctor's device is actually from that doctor, you should take the ZT approach, which dictates that the credentials of the doctor be checked to ensure that they are who they say they are. If they're unable to verify, then they won't be able to access the database.
In other words, you should not grant automatic access to resources just because the device requesting it is connected to the hospital network. You should also ensure that the verification is done as close to the resource as possible. Verification done at the periphery of the network or at the initial login level for a group of applications is not a good ZT practice. In this case, the verification should be done just before the patient database and for the patient database only.
To define the Zero Trust architecture (ZTA) for your organization, you need to know about your assets, especially the medical IoT devices connected to your network, because visibility is the foundation for achieving security. A good way of gaining visibility is to deploy a security analytics solution such as a SIEM tool that provides real-time security monitoring; user and entity behavior analytics; and security orchestration, automation, and response capabilities.
Here are some things to consider for effective planning and implementation of ZTA in your healthcare organization:
ZTA cannot be planned and implemented overnight. It has to be developed in a phased manner. Though time-consuming, the ZT approach is a must for keeping cyberattacks in check. However, attackers will not wait for you while you're implementing your ZT policy. So, assume that a cyberattack is always imminent and stay vigilant. Back up your data frequently and adequately so that even if an attack occurs, the damage can be limited, and recovery can be faster. Most importantly, deploy a unified SIEM solution such as ManageEngine Log360 that can help you improve your cybersecurity posture and thwart various cyberattacks.
To learn how to build a healthcare IT security strategy from scratch, check out our e-book, IT security hardening at healthcare organizations. To personally evaluate how Log360 can help your organization enforce a ZT policy, sign up for a personalized demo and talk to our solution experts. Thanks for reading, folks!
You will receive regular updates on the latest news on cybersecurity.
© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.