Netwrix, a cybersecurity vendor, has announced additional findings for the healthcare sector from its global 2022 Cloud Security Report.
Nearly two-thirds (61%) of respondents in the healthcare industry suffered a cyberattack on their cloud infrastructure within the last 12 months, compared to 53% for other verticals. Phishing was the most common type of attack reported.
“The healthcare sector is a lucrative target for attackers because the chances of success are higher,” said Dirk Schrader, VP of Security Research at Netwrix. “The first two years of the pandemic exhausted the industry. With patient health being the main priority for these organisations, IT security resources are often too stretched and are focused on maintaining only the most necessary functions. Plus, the high value of data gives cybercriminals better opportunities at financial gain: they can either sell stolen sensitive medical information on the dark web or extort a ransom for ‘unfreezing’ the medical systems used to keep patients alive.”
An attack in the healthcare sector is more likely to result in financial consequences. Almost a third (32%) of respondents from other industries report that an attack had no impact on their business, while only 14% of healthcare organisations say the same. Unplanned expenses to cover security gaps and compliance fines are the most common types of damage that the healthcare sector faces due to a cyberattack.
“Healthcare organisations plan to increase the share of their workload in the cloud from 38% to 54% by the end of 2023,” said Schrader. “Fast cloud adoption should be accompanied by relevant security measures and special attention to Internet-of-things (IoT) devices and systems; for example, compromise of respirators or IV infusion devices can lead to physical harm to patients. Network segmentation will help prevent one compromised device from impacting the entire system. IT teams must also strictly limit who – humans and machines – can access what data and systems according to the least-privilege principle and regularly review and right-size those access rights.”Click below to share this article