Tuesday, March 19, 2024
spot_img
spot_img

Healthcare Is Now the Industry Most Targeted by Hackers: Here’s How Organizations Can Defend Themselves

spot_img
spot_img
- Advertisement -

By Mr. Nikhil Korgaonkar Regional Director, Arcserve India & SAARC

Healthcare data breaches reached a record high in 2021. Indeed, healthcare now sees more cyberattacks than any other industry. Fully one-third of all cyberattacks are aimed at healthcare institutions. Why? Because healthcare is a valuable and vulnerable target

In January 2021, websites of multiple Indian government departments, including national health and welfare agencies, leaked the lab test results for thousands of COVID-19 patients online.

The leaked lab reports were indexed by search engines that exposed patient data and their COVID-19 test status. Also as per the latest Sophos “The State of Ransomware in Healthcare 2022,” report, there is a 94% increase in ransomware attacks in the healthcare sector. In 2021, 66% of healthcare organizations were hit; 34% were hit the previous year.

Hackers go after healthcare because patient data and hospital systems are lucrative prey. Hackers know they can demand a high ransom if they compromise patient data or healthcare systems. They also know healthcare organizations will likely pay the ransom — and fast because compromised data and systems can cost lives in a hospital setting. Hospitals, of course, rely on constant and immediate access to patient data to deliver care. If they don’t have that access, people may get sicker and die. Almost one-fourth of healthcare institutions hit by a ransomware attack in 2019 and 2020 reported increased patient death rates after the attack.

Unfortunately, attacks on healthcare will only increase in the years ahead. Indeed, some hacking groups focus solely on attacking healthcare organizations. In April, the Department of Health and Human Services warned the healthcare industry about “an exceptionally aggressive” ransomware gang called Hive dedicated to targeting healthcare and favors double extortion. It demands one payment to unlock data it has encrypted and another payment to prevent the data from being publicly released.

Ransomware works by traversing through all copies of your data, including primary, secondary, and backup data. Attackers then encrypt or exfiltrate the data. One of the most practical and effective ways to secure backup data against a ransomware attack is air gapping.

There are two types of air gapping. The first is traditional, physical air gapping, in which an organization disconnects the digital asset from all other devices and networks. This air gapping is the ultimate cybersecurity measure because it creates a physical separation between a secure network and any other computer or network. Using a physical air gap, organizations store backup data on media such as tape or disk, then disconnect these media entirely from their production IT environment.

The second type of air gapping is called logical air gapping. A logical air gap relies on network and user-access controls to isolate backup data from the production IT environment. It’s like a one-way street on which data is pushed to its intended destination, whether a storage device on-premises or a custom appliance. The key here is that the control and management of that data, such as how it is retained or who can modify it, is not available through that same system or path. Anyone who wants to manage or alter the data must go through entirely different authentication channels.

The beauty of air gapping is that it makes it nearly impossible for ransomware to compromise your data backups. It’s almost as if your data is wearing a cloak of invisibility, making it impervious to any malware that manages to enter your network.

Healthcare organizations can deploy a second measure against ransomware, 3-2-1-1 data protection. It means maintaining 3 backup copies of your data on 2 different media, such as tape and disk, with 1 of the copies placed offsite to enable quick recovery. Further, you should have 1 immutable object storage copy of your data and 1 air-gapped copy. Immutable object storage protects data continuously by taking a snapshot of it at 90-second intervals. So even if a ransomware attack occurs, you can recover your data right away.

If there is an attack—or downtime or natural disaster—your data snapshots enable you to return to a very current file state. Snapshots can’t be changed, deleted, or overwritten, so they secure data against ransomware attacks, human error, and hardware failure. Healthcare organizations that deploy immutable snapshots can maintain the seamless continuation of their operations even in a ransomware attack or other calamity.

For years, companies could rely on a cyber-strategy of safety in numbers, figuring that the bad guys would attack someone else. That strategy is now out the window. Healthcare organizations must assume that they will, sooner or later, be the target of a ransomware attack.

The impact of a data breach in healthcare can be catastrophic since all aspects of healthcare are now digital, from diagnosis to long-term care to every event in between. Healthcare generates vast volumes of data at all levels of care and engagement—and that data could not be more critical because human lives depend on it.

Given the quantity and value of healthcare data, implementing a multi-layered protection and recovery strategy is urgent. It is not whether such a strategy should be implemented or even when. It is a matter of, “How fast can we do it?” Healthcare institutions must quickly implement air gapping and other data protection initiatives to protect themselves. It is indeed a matter of life and death.

If you have an interesting Article / Report/case study to share, please get in touch with us at editors@roymediative.com/ roy@roymediative.com, 9811346846/9625243429.

- Advertisement -
spot_img
spot_img
spot_img
spot_img
spot_img
spot_img