{"id":276,"date":"2020-07-22T13:45:12","date_gmt":"2020-07-22T13:45:12","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=276"},"modified":"2021-09-10T06:39:27","modified_gmt":"2021-09-10T06:39:27","slug":"healthcare-cybersecurity-during-the-pandemic","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/","title":{"rendered":"Healthcare Cybersecurity During the Pandemic"},"content":{"rendered":"<p style=\"text-align: center;\"><strong>Healthcare Cybersecurity During the Pandemic<\/strong><\/p>\n<p>A commanding 94% majority of respondents to a new Black Hat survey says the pandemic has increased cybersecurity threats to enterprise systems and data. The healthcare field has been no exception. <a href=\"https:\/\/www.healthcareitnews.com\/news\/europe\/cyber-attacks-healthcare-facilities-growing-threat-during-coronavirus-pandemic\">According to a statement issued by global technology company Acronis<\/a>, cybercriminals \u201cwill target the government agencies, healthcare facilities and medical professionals treating patients during the COVID-19 crisis,\u201d after it found a surge in ransomware detections.<\/p>\n<p><strong>General Threats<\/strong><\/p>\n<p>Phishing attacks, emails disguised as from a genuine source with the aim of tricking recipients into providing personal details or clicking on a link allowing attackers to steal credentials, have all increased since the pandemic began.<\/p>\n<p>Despite certain hacker groups stating their intent to refrain from targeting healthcare organizations for the duration of the COVID-19 crisis, publicly reported cyber-attacks in March 2020 included a ransomware attack on the Champaign-Urbana Public Health District in the United States, and the downing of critical systems at Brno University Hospital in the Czech Republic. In addition, attacks against the World Health Organization have more than doubled while the U.S. Department of Health and Human Services was purportedly hit by an attempted DDoS attack.<\/p>\n<p>While some activity can be attributed to cybercriminals motivated by profit who seek to exploit organizations with a weak security infrastructure, the targeting of healthcare agencies is also being carried out by Advanced Persistent Threat groups involved in cyber espionage. Media reporting indicates that proprietary information related to tests or vaccines would be considered highly valuable intellectual property to governments and businesses competing to find a cure.<\/p>\n<p><strong>Telehealth Services<\/strong><\/p>\n<p>The rapid rollout of telehealth services has prompted security experts to call the coronavirus crisis &#8220;blood in the water&#8221; for bad actors. &#8220;Any time you make a change to an IT environment, you have the potential to increase risk,&#8221; Andy Riley, executive director of security strategy at the managed-security-services vendor Nuspire, told Healthcare IT News. &#8220;When you introduce rapid change, that potential goes up rapidly.&#8221;<\/p>\n<p>The health systems have rapidly rolled out technologies to provide broader access to care, sometimes neglecting security in the process. As an example, iPads and other mobile devices need to be able to run a remote-triage tent and administrators may not have considered tightening the controls.<\/p>\n<p>According to Riley, medical devices &#8220;have long been problematic&#8221; in part because of their light operational footprint, which doesn&#8217;t allow for much security processing-power. This can be especially troubling because of such devices&#8217; proximity to patients and links to the cloud.<\/p>\n<p>He also pointed to the relaxation of firewall rules to accommodate additional remote-work capabilities as a possible danger.<\/p>\n<p>&#8220;Securing data and devices is a challenge at the best of times,&#8221; said Raja Bhadury, head of the care-delivery portfolio for healthcare at HP, &#8220;And now during this pandemic \u2026 when you have clinicians working in these novel ICUs that have been created in parking lots and convention halls, cybersecurity is a huge thing to watch out for.&#8221;<\/p>\n<p><strong>Contact Tracing Apps<\/strong><\/p>\n<p>The development of contact-tracing apps, too, has sparked debates around the best ways to protect patient privacy while promoting public health. Many people say they won&#8217;t use them despite efforts from lawmakers to try to ensure their safety.<\/p>\n<p>The well-known Johns Hopkins University COVID-19 tracking map was replicated by attackers on another domain to spread information-stealing malware. The distribution of malware (\u2018malicious software\u2019) can be installed to steal, encrypt or delete data, or monitor and control the device. This makes such attacks a major threat to health and social care institutions.<\/p>\n<p>In response to these attacks, the Cybersecurity and Infrastructure Security Agency (CISA) at the United States Department of Homeland Security (DHS) and the National Cyber Security Centre (NCSC) in the United Kingdom have jointly released advice. The NCSC report that they created has found 555 malware distribution sites and 200 phishing sites associated with COVID-19.<\/p>\n<p><strong>Mitigating Cyber Threats<\/strong><\/p>\n<p>To reduce their risk of being attacked or hacked, healthcare facilities are advised to establish an anti-phishing strategy, which includes training employees to recognise malicious emails and sites, or use email systems with integrated anti-phishing solutions.<\/p>\n<p>Additional advice includes using two-factor authentication where possible, unique passwords for different services and automatic system updates, as well as deploying ransomware protection and antivirus systems.<\/p>\n<p>\u201cAnother effective way is to make public-facing websites static,\u201d the global technology company Acronis advised. \u201cSince some companies do not need complex content management systems on their websites, pre-rendered static pages are more secure.\u201d<\/p>\n<p>User monitoring applications are also becoming standard in many companies, particularly those handling sensitive software such as in the healthcare sector. This software monitors what users are doing while logged in remotely and helps to provide clear evidence and root causes during investigations of security breaches.<\/p>\n<p>This software is often necessary for compliance and auditing purposes as in the case of HIPAA medical regulations regarding the handling of patient records.<\/p>\n<p>Learn about how RecordTS\u2019s Remote Desktop Session Recording software can help here &#8211; <a href=\"https:\/\/www.tsfactory.com\/\">www.tsfactory.com<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Healthcare Cybersecurity During the Pandemic A commanding 94% majority of respondents to a new Black Hat survey says the pandemic has increased cybersecurity threats to enterprise systems and data. The healthcare field has been no exception. According to a statement issued by global technology company Acronis, cybercriminals \u201cwill target the government agencies, healthcare facilities and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[23,14,22],"class_list":["post-276","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-covid19","tag-cybersecurity","tag-healthcare"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Healthcare Cybersecurity During the Pandemic - Blogs<\/title>\n<meta name=\"description\" content=\"Healthcare Cybersecurity During the Pandemic: Healthcare organizations are now also facing heightened cyber-security threats in the midst of the pandemic.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare Cybersecurity During the Pandemic - Blogs\" \/>\n<meta property=\"og:description\" content=\"Healthcare Cybersecurity During the Pandemic: Healthcare organizations are now also facing heightened cyber-security threats in the midst of the pandemic.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-22T13:45:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-10T06:39:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/07\/adult-doctors-gloves-health-263337-e1631255959588.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"1052\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/\",\"name\":\"Healthcare Cybersecurity During the Pandemic - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/07\/adult-doctors-gloves-health-263337-e1631255959588.jpg\",\"datePublished\":\"2020-07-22T13:45:12+00:00\",\"dateModified\":\"2021-09-10T06:39:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"Healthcare Cybersecurity During the Pandemic: Healthcare organizations are now also facing heightened cyber-security threats in the midst of the pandemic.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/07\/adult-doctors-gloves-health-263337-e1631255959588.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/07\/adult-doctors-gloves-health-263337-e1631255959588.jpg\",\"width\":700,\"height\":1052,\"caption\":\"healthcare pandemic cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Healthcare Cybersecurity During the Pandemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Healthcare Cybersecurity During the Pandemic - Blogs","description":"Healthcare Cybersecurity During the Pandemic: Healthcare organizations are now also facing heightened cyber-security threats in the midst of the pandemic.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/","og_locale":"en_US","og_type":"article","og_title":"Healthcare Cybersecurity During the Pandemic - Blogs","og_description":"Healthcare Cybersecurity During the Pandemic: Healthcare organizations are now also facing heightened cyber-security threats in the midst of the pandemic.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-07-22T13:45:12+00:00","article_modified_time":"2021-09-10T06:39:27+00:00","og_image":[{"width":700,"height":1052,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/07\/adult-doctors-gloves-health-263337-e1631255959588.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/","name":"Healthcare Cybersecurity During the Pandemic - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/07\/adult-doctors-gloves-health-263337-e1631255959588.jpg","datePublished":"2020-07-22T13:45:12+00:00","dateModified":"2021-09-10T06:39:27+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"Healthcare Cybersecurity During the Pandemic: Healthcare organizations are now also facing heightened cyber-security threats in the midst of the pandemic.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/07\/adult-doctors-gloves-health-263337-e1631255959588.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/07\/adult-doctors-gloves-health-263337-e1631255959588.jpg","width":700,"height":1052,"caption":"healthcare pandemic cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/healthcare-cybersecurity-during-the-pandemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Healthcare Cybersecurity During the Pandemic"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=276"}],"version-history":[{"count":6,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/276\/revisions"}],"predecessor-version":[{"id":492,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/276\/revisions\/492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/282"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}