Skip to Main Content Subscribe

Agencies Combat Ransomware in Digital Health

Share

Federal and industry leaders are bolstering security foundations to protect against evolving ransomware threats.

7m read
Written by:
Lock - abstract glitch background
Photo Credit: traffic_analyzer/ iStock

As the cybersecurity threat landscape expands in the digital era, protecting medical data is becoming an increasing priority across the federal government.

โ€œBecause digital transformation is more penetrated across the sectorโ€ฆ there are more threats on that infrastructure,โ€ said Centers for Medicare and Medicaid Services CISO Rob Wood during GovernmentCIO Media & Researchโ€™s CyberScape: Health Care virtual event. โ€œThe interesting thing about the health care sector is that there are different parts that are going digital โ€ฆ and all of them have different maturity curves and unique security challenges and threats.โ€

With the expansion of the โ€œcyber physical landscape,โ€ there is a greater attack surface for bad actors, noted Jim Jones, director of the Department of Homeland Security Center of Excellence for Criminal Investigations and Network Analysis at George Mason University.

โ€œCriminal hackers are opportunists. They see this opportunity that has been created, so they pivot very quickly,โ€ Jones said. โ€œCriminals are not wed to a particular line of business theyโ€™re in, theyโ€™re wed to making money. When they see an opportunity, they take advantage of it.โ€

Jones contributed the rise of ransomware to requiring a minimal skill level and to being able to easily monetize. Because using ransomware creates a โ€œone-to-oneโ€ transaction, there is greater value for the attacker.

Additionally, bad actors and adversaries are able to quickly learn environments, then pivot and tailor attacks, said Troy Ament, CISO for health care at Fortinet. Within the health care sector, adversaries have adapted to the electronic health records environment, and they are able to quickly identify vulnerabilities.

โ€œThey know that infecting the underlying infrastructure can cause a greater operational downtime, which lends itself to organizations following the money. Thatโ€™s what the adversaries are about. Theyโ€™re more likely to pay the ransomes when their operations have been impacted,โ€ Ament said.

Jones noted that this model of โ€œransomware as a serviceโ€ has two primary implications: attackers have the ability to specialize expertise and theyโ€™re incredibly resilient. With the potential of increased cyber strikes, itโ€™s important that organizations โ€œget the basics right,โ€ Wood said.

This includes having a strong security foundation before integrating new technologies, like being able to recover in the event of backups, ensure that thereโ€™s monitoring and isolate attacks.

โ€œBasics are good, but at the same time, you have to move toward design principles like zero trust, which is interesting for threats like ransomware,โ€ Wood said. โ€œWith microsegmentation and time-based, limited access to things, you could potentially slow the propagation of malware strains if something gets into your environment.โ€

Wood recommended that organizations take a threat model-based approach to better understand its most critical systems or operations, whether it be functionality, data or users, then work concentrically around these priority areas to gain the greatest impact and value.

โ€œItโ€™s smaller, isolated work that you can get done quickly, show return on investment and also protect what really matters,โ€ Wood said.

Vulnerability and patch management and multi-factor authentication should be cornerstones of security strategies, Ament said. In order to ensure these components are in place, organizations should measure preparedness through tabletop exercises, adversarial analyses and maturity models, Wood added.

โ€œThe point is getting away from squishy measurements and getting toward something thatโ€™s more objective and repeatable to figure out where you are now, where you want to go and what you need to get there,โ€ Wood said.

Woman typing at computer

Stay in the know

Subscribe now to receive our curated newsletters

Subscribe
Related Content
Woman typing at computer

Stay in the Know

Subscribe now to receive our newsletters.

Subscribe