How healthcare providers can stay safe from evolving cybersecurity risks

An abstract image of a lock against a digital background, denoting cybersecurity.
(Image Credit: TheDigitalArtist / Pixabay) (Image credit: Pixabay)

Over the past few years, the healthcare industry has been fighting off cyber criminals from all angles. With reports revealing that healthcare firms were hit with four times the global average of cyber attacks across 2023 - experiencing over 1500 cyber attacks per week in the first three quarters of the year- it is clear that the industry is operating in an increasingly dangerous cyber landscape.

But why is the healthcare industry in the firing line, and what can healthcare providers do to ensure that they remain protected against cybersecurity threats and keep operations running smoothly?

Paul Holland

CEO of Beyond Encryption.

High stakes, low levels of security

The first step in mitigating cyber threats is to understand why healthcare providers are being targeted in the first place.

From patient electronic medical records to payment information - healthcare providers store a vast amount of highly sensitive information. If cyber criminals are able to gain access to this data, they could leverage it for a range of malicious benefits. Whether they decide to sell this information on the dark web or leverage it to engage in identity theft or financial fraud - if this information falls into the wrong hands, the consequences can be catastrophic. As well as this, cyber criminals are very aware that if they are able to gain access to this highly sensitive information, healthcare providers will be more likely to pay their ransom demands, making them even more vulnerable to an attack.

A report from VMO2 revealed that 77% of healthcare providers still use legacy technology. These outdated technologies make healthcare providers an even more lucrative target for cybercriminals, given they are easier for malicious actors to infiltrate and exploit, as their creation pre-dates the emergence of the more sophisticated security threats we see today. Unless healthcare providers embrace digital transformation, they remain a sitting duck.

The direct result of cyber criminals targeting healthcare providers by disrupting their operations causes significant issues for the healthcare system - directly impacting patients. Take the recent attack on the NHS as an example - this attack caused 3,396 outpatient appointments and 1,255 elective procedures to be cancelled since the attack occurred at the beginning of June and also caused the NHS to put out a public appeal for O-type blood as the cyber attack delayed blood transfusions.

Outdated legacy systems are making cyber criminals’ jobs even easier, allowing them to easily extract data for financial benefits. This creates an urgency for the sector to update its security credentials, or face the continuous threat of an attack.

How healthcare providers can fortify their defenses

With the number of attacks on healthcare providers continuing to rise, organizations must consider how they can ensure they are well equipped to stay afloat during the growing cyber crime wave before they are lost altogether.

Phishing attacks are one of the most common types of cyber threat that the healthcare sector specifically faces, and there are many different ways that healthcare providers can mitigate these attacks. Firstly, healthcare providers should utilize anti-spoofing software which can identify and drop any packets with an IP address that is hidden behind one interface, but is actually from a different interface altogether. For example, if an employee received an email from a threat actor posing to be their manager or even a colleague, anti-spoofing software is able to detect that the packet has an external IP address and block it accordingly. 

For an added layer of defense, healthcare providers should also utilize email verification and security software. These solutions automatically alert the relevant parties when any emails pretending to be from inside an organization are actually coming from outside of an organization. On top of this, this software can be programmed to flag certain key phrases such as “transfer funds” and alert relevant parties - making it the perfect tool to mitigate phishing attacks.

Another type of software that healthcare providers should invest in to help prevent phishing attacks is secure email solutions. These solutions allow sensitive documents or emails to be shared securely and will prompt the recipient for a unique password before providing them with access to the email. This is a great way of preventing sensitive emails from being intercepted by threat actors which can then be used to gain access to a business.

As the healthcare industry continues to remain a key target for cyber criminals, malicious actors are beginning to take more creative routes to exploiting these organizations. The most recent attack that the NHS faced involved a threat actor infiltrating Synnovis, which provides key clinical services to the NHS, rather than a direct attack on the NHS itself. Healthcare providers should take this as a warning to ensure there are no loopholes within their supply chain for threat actors to exploit, implementing security measures which are up to scratch.

Finally, healthcare providers must invest in continuous and in-depth cybersecurity training sessions for their team, as a business’ cybersecurity is only as strong as its least cyber-savvy employee. Adopting a box ticking, “one and done” approach to training isn't sufficient, and businesses must take sufficient steps to ensure all employees are educated on both new and emerging threats.

With the healthcare industry remaining firmly in the firing line due to its critical role in public health, these organizations must act now and fortify their defenses before they become nothing more than a cautionary tale.

We've listed the best identity management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Paul Holland, CEO of Beyond Encryption.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Closing the cybersecurity skills gap
The critical need for watertight security across the IT supply chain
A padlock resting on a keyboard.
AI-powered cyber threats demand enhanced security awareness for SMEs and supply chains
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
Latest in Pro
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
A young man working on laptop in office writing notes
Ending the fix/break cycle of End User Computing support
OpenAI
OpenAI wants to help your business build its next generation of AI agents
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
Nation-state threats are targeting UK AI research
A hand reaching out to touch a futuristic rendering of an AI processor.
Business investors are positive about AI’s impact on the economy
Scam alert
Fake jobs and phone calls: How Americans lost $12.5 bn to fraud in 2024
Latest in News
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
An Nvidia GeForce RTX 4060 on a table with its retail packaging
Nvidia RTX 5060 GPU spotted in Acer gaming PC, suggesting rumors of imminent launch are correct – and that it’ll run with only 8GB of video RAM
Indiana Jones talking to a friend in a university setting with a jaunty smile on his face
New leak claims Indiana Jones and the Great Circle PS5 release will come in April
A close up of the limited edition vinyl turntable wrist watch from AndoAndoAndo
This limited-edition timepiece turns the iconic Technics SL-1200 turntable into a watch, and I want one
A close up of Gemma sitting down in Severance season 2 episode 7
'I'm like Gemma – I'm in the dark': Severance star Dichen Lachman shares disappointing filming update for the popular Apple TV+ show's third season
Horizon Zero Dawn Remastered
Future PlayStation games could have AI-powered characters, if this leaked prototype of Aloy is anything to go by