Healthcare Executive's Guide to Ransomware Threats

 
1
 
Healthcare Executives Guide to
Ransomware Threats
 
1
 
Troy Ament
 
Field CISO – Healthcare Fortinet
 
2
 
Field CISO – Healthcare Fortinet
 
Fortinet Field CISO for Healthcare brings
more than 20 years of experience to
Fortinet transforming information
technology and security programs, with
14 years in the healthcare sector as an
executive overseeing clinical technology
implementations and serving as the Chief
Information Security Officer at two of the
largest integrated health delivery systems
in the United States.
 
Troy Ament
 
What is Ransomware?
 
a type of malicious software designed to block access to a computer system
until a sum of money is paid.
 
3
 
4
 
How Does Ransomware Typically Work?
 
How does ransomware get into health systems and
what are some key statistics from 2019 and 2020?
 
5
 
6
 
Email Threats & Phishing
 
Preys on social engineering
Presume security installed and safe
Not looking for minor irregularities in
communications
Attachments
Pop-ups that ask for action
“Invoice attached”
Embedded Links
Lead to malicious websites and downloads
Often 
in 
the attachment
 
 
90%
 
of attacks that
leverage email
 
Verizon 2019 DBIR
 
7
 
Malicious Websites & Advertising
Careless browsing
Drive-by downloads
Spoofed – think we’re safely downloading
Malicious Downloads
“Download additional” things
Scareware – You’re Infected!
Open Door
“Free-WiFi” and no VPN
Open ports like RDP
 
Network Threats
 
30%
 
of Ransomware
attacks started with
malicious content
from a website
 
2017 Ponemon institute
 
8
 
External Devices
USB drives
External hard drives
Other peripherals
Endpoint Threats
 
Minor entry point but possible
 
9
 
 
 
 
 
 
 
B
u
s
i
n
e
s
s
 
I
m
p
a
c
t
 
o
f
 
B
r
e
a
c
h
e
s
 
f
o
r
 
H
e
a
l
t
h
c
a
r
e
 
 
 
 
 
 
 
Repercussions Are Dramatic
:
72%
 
of healthcare data breaches leak medical data
2
$6.45 million 
is the average cost of a healthcare data
breach
3
 
41%
of healthcare
organizations
suffered an
operational
outage that
affected
productivity
 
39%
had an
operational
outage that put
clinical safety
at risk
 
25%
lost business-critical
data
1
 
31%
suffered
impacted
revenue
 
32%
experienced a
breach that
damaged brand
awareness
 
1
 Slide findings based on a series of survey studies with different retail/hospitality/travel personas conducted by Fortinet. Research report forthcoming.
2
 “2019 Data Breach Investigation Report,” Verizon, May 8, 2019.
3
 “2019 Cost of a Data Breach Report,” IBM Security and Ponemon, July 23, 2019.
 
10
 
1.
Adam Oldenburg, 
“Why IoT Devices Are a Worthy Investment for Hospitals,” 
HealthTech Magize, August 22, 2019.
2.
“HIMSS Technology Outlook Survey:The Outlook for Cloud,” 
HIMSS Media and Perficient, June 2019.
3.
“2019 Data Breach Investigation Report,” Verizon, May 8, 2019.
4.
Robert Lemos, “Attacks on Healthcare Jump 60% in 2019 - So Far”, November 14, 2019.
5.
2020 Horizon Report, The State of Cybersecurity in Healthcare,” Fortified Health Security, December 2019
.
6.
"Ransomware Costs Double in Q4 as Ryuk, Sodinokibi Proliferate,” Coveware, January 22, 2020.
 
An estimated 
87%
 
of healthcare providers
use Internet of Things (IoT) devices
1
79%
 
of healthcare providers are making
cloud adoption a strategic priority
2
59%
 
of healthcare data breaches are
carried out by internal threats
3
 
Attacks are
Ongoing
 
Healthcare Providers Must
Protect a Growing Attack
Surface
 
Attacks against healthcare increased by over
60%
 
year over year
4
41% 
of healthcare data breaches are caused
by email
5
18.7% 
of ransomware attacks target
healthcare, making it the second most
targeted industry
6
 
11
 
1.
Jessica Davis, “Majority of Providers Fail to Fully Comply with HIPAA Right of Access,” Health IT Security, August 16, 2019.
2.
“Patient Safety: The Importance of Cybersecurity in Healthcare,” American Medical Association, October 2018.
3.
Mike Miliard, “Healthcare organizations lagging behind NIST Cybersecurity Framework, HIPAA guidance,” Healthcare IT News, April 11, 2019.
 
A
c
h
i
e
v
i
n
g
 
s
e
c
u
r
i
t
y
 
c
o
m
p
l
i
a
n
c
e
 
r
e
q
u
i
r
e
s
 
u
n
d
e
r
s
t
a
n
d
i
n
g
h
e
a
l
t
h
c
a
r
e
 
c
y
b
e
r
s
e
c
u
r
i
t
y
 
c
h
a
l
l
e
n
g
e
s
.
 
Struggling with Compliance:
51%
 
of healthcare providers fail to comply with Health Insurance
Portability and Accountability (HIPAA) Right to Access
1
83%
 
of physicians recognize that HIPAA compliance is not enough to
address cyber threats
2
Healthcare organizations average 
72%
 
compliance with the HIPAA
Security Rule
3
 
Healthcare Compliance Requirements
 
2020 Ransomware during Global COVID-19 Pandemic
 
12
 
75% 
Increase in Reports of Ransomware Attacks on Healthcare.
1
 
 
Large Midwest Academic Health System suffers 1 week of EMR downtime in
September.
 
Large National/Global Health System suffers 2 weeks of EMR and system downtime in
October.
 
1.
“75% Increase in Reports of Ransomware Attacks on Healthcare Entities,” Security Magazine, June, 2020.
 
What are key strategies to protect
from Ransomware?
 
13
 
 
HIE
 
EHR
 
Secure
Patient Data
 
14
 
Healthcare Cyber Security Strategies
 
Information Technology Governance
Enterprise Risk Management (Security Charter)
Information Security Policy, Compliance, Internal Audit Oversight
Executive Leadership and Board Support
Information Security Framework (NIST, SANS, HiTrust)
Information Security Plan/Roadmap
 
15
 
CIS Top 20 Critical Security Controls (Ransomware)
 
Inventory and Control of Hardware Assets
Inventory and Control of Software Assets
Continuous Vulnerability Management
Controlled Use of Administrator Privileges
Secure Configurations Devices, Servers
Maintenance, Monitoring, and Analysis of Audit
Logs
Email and Web Browser Protections
Malware Defenses
Limitation and Control of Network Ports, Protocols,
and Services
Data Recovery Capabilities
 
Security Configuration of Network Devices
Boundary Defense
Data Protection
Controlled Access based on Need to Know
Wireless Access Control
Account Monitoring and Control
Implement a Security Awareness and Training
Program
Application Software Security
Incident Response and Management
Penetration Tests and Red Team Exercises
 
16
 
Security Technology/Partner Strategy
 
Enterprise Security Fabric/Platform
Utilize high 90% of technology products and features
Partners
Understand complex Healthcare Cyber Threat Landscape
Comprehensive Portfolio Security Products
Incident Response and Ransom Negotiation
Invest in Security Staff Training and Development
Threat Intelligence Partnerships
National and Regional Information Security Collaborations
 
THANK YOU!
 
Troy Ament
Field CISO – Healthcare
tament@fortinet.com
healthcare@fortinet.com
Slide Note
Embed
Share

This comprehensive guide covers essential information on ransomware threats in healthcare, including the definition of ransomware, how it works, email and network threats, and statistics. Gain insights from Troy Ament, a seasoned CISO in the healthcare sector, to safeguard your organization against cyber attacks.

  • Healthcare
  • Ransomware
  • Cybersecurity
  • Threats
  • Troy Ament

Uploaded on May 16, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Healthcare Executives Guide to Ransomware Threats Healthcare Executives Guide to Ransomware Threats Troy Ament Field CISO Healthcare Fortinet 1 1

  2. Healthcare Executives Guide to Ransomware Threats Troy Ament Fortinet Field CISO for Healthcare brings more than 20 years of experience to Fortinet transforming information technology and security programs, with 14 years in the healthcare sector as an executive overseeing clinical technology implementations and serving as the Chief Information Security Officer at two of the largest integrated health delivery systems in the United States. 2

  3. Healthcare Executives Guide to Ransomware Threats What is Ransomware? a type of malicious software designed to block access to a computer system until a sum of money is paid. 3

  4. Healthcare Executives Guide to Ransomware Threats How Does Ransomware Typically Work? 4

  5. Healthcare Executives Guide to Ransomware Threats How does ransomware get into health systems and what are some key statistics from 2019 and 2020? 5

  6. Healthcare Executives Guide to Ransomware Threats Email Threats & Phishing 90% of attacks that leverage email Preys on social engineering Presume security installed and safe Not looking for minor irregularities in communications Attachments Pop-ups that ask for action Invoice attached Embedded Links Lead to malicious websites and downloads Often in the attachment Verizon 2019 DBIR 6

  7. Healthcare Executives Guide to Ransomware Threats Network Threats 30% of Ransomware attacks started with malicious content from a website Malicious Websites & Advertising Careless browsing Drive-by downloads Spoofed think we re safely downloading 2017 Ponemon institute Malicious Downloads Download additional things Scareware You re Infected! Open Door Free-WiFi and no VPN Open ports like RDP 7

  8. Healthcare Executives Guide to Ransomware Threats Endpoint Threats Minor entry point but possible External Devices USB drives External hard drives Other peripherals 8

  9. Healthcare Executives Guide to Ransomware Threats Business Impact of Breaches for Healthcare 41% of healthcare organizations suffered an operational outage that affected productivity 39% had an operational outage that put clinical safety at risk 32% experienced a breach that damaged brand awareness 31% suffered impacted revenue 25% lost business-critical data1 Repercussions Are Dramatic: 72% of healthcare data breaches leak medical data2 $6.45 million is the average cost of a healthcare data breach3 1 Slide findings based on a series of survey studies with different retail/hospitality/travel personas conducted by Fortinet. Research report forthcoming. 2 2019 Data Breach Investigation Report, Verizon, May 8, 2019. 3 2019 Cost of a Data Breach Report, IBM Security and Ponemon, July 23, 2019. 9

  10. Healthcare Executives Guide to Ransomware Threats Healthcare Providers Must Protect a Growing Attack Surface Attacks are Ongoing Attacks against healthcare increased by over 60% year over year4 41% of healthcare data breaches are caused by email5 18.7% of ransomware attacks target healthcare, making it the second most targeted industry6 An estimated 87% of healthcare providers use Internet of Things (IoT) devices1 79% of healthcare providers are making cloud adoption a strategic priority2 59% of healthcare data breaches are carried out by internal threats3 1. Adam Oldenburg, Why IoT Devices Are a Worthy Investment for Hospitals, HealthTech Magize, August 22, 2019. 2. HIMSS Technology Outlook Survey:The Outlook for Cloud, HIMSS Media and Perficient, June 2019. 3. 2019 Data Breach Investigation Report, Verizon, May 8, 2019. 4. Robert Lemos, Attacks on Healthcare Jump 60% in 2019 - So Far , November 14, 2019. 5. 2020 Horizon Report, The State of Cybersecurity in Healthcare, Fortified Health Security, December 2019. 6. "Ransomware Costs Double in Q4 as Ryuk, Sodinokibi Proliferate, Coveware, January 22, 2020. 10

  11. Healthcare Executives Guide to Ransomware Threats Healthcare Compliance Requirements Struggling with Compliance: 51% of healthcare providers fail to comply with Health Insurance Portability and Accountability (HIPAA) Right to Access1 83% of physicians recognize that HIPAA compliance is not enough to address cyber threats2 Healthcare organizations average 72% compliance with the HIPAA Security Rule3 Achieving security compliance requires understanding healthcare cybersecurity challenges. 1. Jessica Davis, Majority of Providers Fail to Fully Comply with HIPAA Right of Access, Health IT Security, August 16, 2019. 2. Patient Safety: The Importance of Cybersecurity in Healthcare, American Medical Association, October 2018. 3. Mike Miliard, Healthcare organizations lagging behind NIST Cybersecurity Framework, HIPAA guidance, Healthcare IT News, April 11, 2019. 11

  12. Healthcare Executives Guide to Ransomware Threats 2020 Ransomware during Global COVID-19 Pandemic 75% Increase in Reports of Ransomware Attacks on Healthcare.1 Large Midwest Academic Health System suffers 1 week of EMR downtime in September. Large National/Global Health System suffers 2 weeks of EMR and system downtime in October. 1. 75% Increase in Reports of Ransomware Attacks on Healthcare Entities, Security Magazine, June, 2020. 12

  13. Healthcare Executives Guide to Ransomware Threats What are key strategies to protect from Ransomware? Academic Medical Centers Home Health Long Term Care HIE Pharma Hospitals ACOs Government Telehealth Diagnostic Imaging Centers Secure Patient Data Industry Payers EHR Physician Offices Lab Facilities Medical Suppliers Ambulatory Private Insurance Pharmacies 13 Registries

  14. Healthcare Executives Guide to Ransomware Threats Healthcare Cyber Security Strategies Information Technology Governance Enterprise Risk Management (Security Charter) Information Security Policy, Compliance, Internal Audit Oversight Executive Leadership and Board Support Information Security Framework (NIST, SANS, HiTrust) Information Security Plan/Roadmap 14

  15. Healthcare Executives Guide to Ransomware Threats CIS Top 20 Critical Security Controls (Ransomware) Inventory and Control of Hardware Assets Security Configuration of Network Devices Inventory and Control of Software Assets Boundary Defense Continuous Vulnerability Management Data Protection Controlled Use of Administrator Privileges Controlled Access based on Need to Know Secure Configurations Devices, Servers Wireless Access Control Maintenance, Monitoring, and Analysis of Audit Account Monitoring and Control Logs Implement a Security Awareness and Training Email and Web Browser Protections Program Malware Defenses Application Software Security Limitation and Control of Network Ports, Protocols, Incident Response and Management and Services Penetration Tests and Red Team Exercises Data Recovery Capabilities 15

  16. Healthcare Executives Guide to Ransomware Threats Security Technology/Partner Strategy Enterprise Security Fabric/Platform Utilize high 90% of technology products and features Partners Understand complex Healthcare Cyber Threat Landscape Comprehensive Portfolio Security Products Incident Response and Ransom Negotiation Invest in Security Staff Training and Development Threat Intelligence Partnerships National and Regional Information Security Collaborations 16

  17. Healthcare Executives Guide to Ransomware Threats THANK YOU! Troy Ament Field CISO Healthcare tament@fortinet.com healthcare@fortinet.com

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#