Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jan 21, 2019

Here's why this industry is now a top attack target.

Healthcare_Data_Breaches.jpg

In general, cybercriminals will target the most vulnerable of organizations that can provide the biggest payoff. In the early days of internet-based computing, this meant primarily the finance industry was most vulnerable to attacks.

However, it turns out a different industry has been far more lucrative in recent years. The irony of this fact is that this industry is most vulnerable to cyberattacks but in itself helps people who are at their most vulnerable when they are hurt or sick. This is, of course, the healthcare industry.

Healthcare is a Target-Rich Environment for Cybercriminals

It turns out that the healthcare industry has ranked highest in associated costs from data breaches for almost the last decade. The numbers speak for themselves.

The Ponemon Institute reported in their 2018 Cost of a Data Breach Study that, “for the 8th year in a row, Healthcare organizations had the highest costs associated with data breaches – costing them $408 per lost or stolen record – nearly three times higher than the cross-industry average ($148).”

2018 Healthcare Breaches

Healthcare IT News has reported that healthcare continues to be a lucrative target for hackers with “weaponized ransomware, misconfigured cloud storage buckets and phishing emails dominating the year. In 2018, these threats will continue, and cybercriminals will likely get more creative despite better awareness among healthcare organizations at the executive level for the funding needed to protect themselves.” 

The website also reports on the major breaches impacting the healthcare market specifically:

An Ounce of Cybersecurity Prevention is Worth a Pound of Cure (Read: Remediation)

When you are truly ready for a cyber threat “prevention” system instead of remediating damages after the fact (if and when you find it), then a solution that delivers a deep inspection and analysis methodology which can interpret and detect malicious code in real time and immediately block threats from penetrating your organization is the only way to go.

This solution should also be evasion proof and even prevent even zero-day attacks.

Learn more here.

Want more great articles like this?Subscribe to our blog.

Get all the latest news, tips and articles delivered right to your inbox

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jan 21, 2019

You may also like:

Most Healthcare Data Breaches Now Caused by Email

Email security at healthcare companies i…

Email security at healthcare companies is trending in the wr… Read More >

David Hood

by David Hood

Director, Technology Marketing, Mimecast

Posted Sep 25, 2018

Augment your Cyber Resilience Strategy with NextGen SIEM

Improve Response and Proactively Detect …

Improve Response and Proactively Detect Email Threats with t… Read More >

Michael Euperio

by Michael Euperio

Director of Technology Alliances at LogRhythm

Posted May 08, 2018

New Phishing Attack Targets Online Payroll Systems

Using advanced cybersecurity technology …

Using advanced cybersecurity technology and user education c… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Product Marketing

Posted Sep 20, 2018