Preventing complexity with superior analytics
Nearly each week we see headlines about cyber incidents that disrupt affected person care, jeopardize affected person privateness, or each. The rising interconnectedness of the healthcare ecosystem, mixed with heavy dependence on third-party suppliers, will increase the impression of those incidents. This interconnectedness not solely will increase the assault floor, but in addition will increase vulnerabilities throughout the trade, as evidenced by latest high-profile assaults on UnitedHealth Group's Change Healthcare and Ascension. The growing complexity of those networks additionally underlines the lack to implement a strong zero-trust technique, additional exposing the sector to cyber threats.
One key theme emerges repeatedly as to why risk actors have so commonly inflicted harm on healthcare organizations: complexity. Listed below are the important thing components driving healthcare safety complexity and the position of community site visitors analytics and consumer and entity conduct evaluation in decreasing complexity and threat.
Complexity: the basis of healthcare's cybersecurity problem
To successfully tackle the cybersecurity challenges dealing with healthcare, it’s essential to grasp the important thing components driving this complexity:
Various and dynamic IT environments
Healthcare IT infrastructure features a mixture of specialised gadgets, on-premises networks and purposes, and cloud companies, every with their very own threat profiles and approaches to safety logging. This range creates a fancy set of identities that may grow to be factors of assault and makes it difficult to keep up a complete view of the group's safety posture.
Medical tools specifically presents distinctive safety challenges. Many of those gadgets run older working techniques which might be troublesome or inconceivable to patch, creating long-term vulnerabilities. Moreover, the essential nature of those gadgets usually means they can’t be taken offline for updates or safety upkeep with out impacting affected person care.
Demanding rules and requirements
Healthcare organizations should adjust to strict rules designed to guard protected well being data (PHI), usually with specific necessities for immediate reporting of breaches and incidents. Whereas these rules are needed to guard affected person privateness, they add an extra layer of complexity to safety operations.
The necessity to stability safety measures with regulatory compliance can generally result in a 'checkbox mentality', the place organizations concentrate on assembly particular necessities quite than taking a holistic strategy to safety.
Evolving instruments and ways
One other issue making healthcare safety extra advanced is the varied vary of risk actor profiles and ways. Threats towards healthcare organizations can come from quite a lot of sources, together with cybercriminals motivated by private or monetary achieve, hacktivists looking for to destabilize the healthcare system, and cyberterrorists or nationwide risk actors looking for to hurt perceived adversaries.
These risk actors have an ever-increasing variety of instruments and ways at their disposal, making assaults simpler than ever to execute – and more and more troublesome to defend towards. The rise of ransomware-as-a-service and different cybercrime-for-hire fashions has lowered the barrier to entry for potential attackers, growing the quantity and class of the threats healthcare organizations face.
Chopping via complexity: the position of superior analytics
By no means has an trade cried out for higher safety. Most healthcare firms have created a tough shell round their community and completely different ranges of entry, however as soon as inside, a nasty actor can have free rein. To deal with these complexities and successfully mitigate threat, healthcare organizations want instruments that may present complete visibility and actionable insights.
A multi-layered strategy is crucial, beginning with the mixing of zero belief into the community and gadget monitoring. Applied sciences equivalent to community site visitors evaluation and consumer and entity conduct evaluation can play an important position by detecting anomalies as a tool adjustments, figuring out potential threats early.
Community site visitors evaluation
Community site visitors analytics can reveal cases of unapproved utility use, unintended PHI publicity, and indicators of malicious exercise. By analyzing community site visitors patterns in actual time, healthcare organizations can:
- Detect compromised consumer accounts by figuring out uncommon login patterns or entry makes an attempt
- Establish anomalies that might point out a safety breach or coverage violation
- Detect knowledge exfiltration makes an attempt, even via encrypted channels
- Guarantee compliance with knowledge safety rules by monitoring PHI flows
Superior community site visitors evaluation instruments use machine studying algorithms to find out primary patterns of regular conduct, making it simpler to identify anomalies that might point out a safety threat. This strategy is particularly invaluable in healthcare environments the place the variety of gadgets and purposes makes it troublesome to outline static safety monitoring guidelines.
Person and Entity Conduct Evaluation (UEBA)
UEBA analyzes patterns of human conduct to establish potential account abuse, insider threats, and non-compliant system and utility utilization. In healthcare settings, UEBA can:
- Monitor the conduct of IoT and medical gadgets for indicators of compromise
- Spotlight potential insider threats by analyzing consumer exercise and knowledge entry patterns
- Establish non-compliant conduct, equivalent to inappropriate entry to affected person data
- Streamline entry administration by offering visibility into consumer roles and permissions
By establishing baseline conduct for customers and entities throughout the community, UEBA can establish adjustments in conduct or patterns which might be clear indicators of a safety threat. That is significantly invaluable in healthcare environments the place employees might have various ranges of entry to delicate affected person knowledge and the place detecting inappropriate entry is essential to sustaining affected person privateness.
Combine for achievement
Whereas community site visitors evaluation and UEBA are highly effective instruments in their very own proper, their true potential is realized when built-in right into a complete safety technique. By combining these applied sciences with different safety options equivalent to SIEM (Safety Data and Occasion Administration) techniques, healthcare organizations can create a extra holistic view of their safety posture.
The objective of most safety applications is to guard the group by constructing a basis of instruments and ways that block an attacker or rapidly notify the safety staff. Methods like zero belief can function a blocking mechanism, but when that doesn't work successfully, the mixing of community site visitors analytics, UEBA and SIEM turns into essential. This built-in strategy permits safety groups to attach knowledge from a number of sources, offering context that may assist distinguish actual threats from false positives. It additionally allows extra environment friendly incident response by automating the gathering and evaluation of related knowledge when a possible risk is detected.
These instruments ought to be managed via a single, unified dashboard that brings all data collectively in a single place. This setup simplifies monitoring and ensures that the suitable individuals are rapidly notified of any issues, permitting for quicker and simpler responses.
The trail to resilience in healthcare cybersecurity
Making certain the safety of delicate affected person knowledge and the continuity of essential healthcare companies are high priorities for all healthcare suppliers. By incorporating superior analytics right into a holistic safety technique, healthcare suppliers can’t solely cut back complexity and mitigate threat, but in addition enhance their general safety posture.
About Kevin Kirkwood
Kevin Kirkwood is the Chief Data Safety Officer (CISO) at Exabeam. As CISO, he’s chargeable for defending Exabeam's workers, clients and knowledge belongings from digital threats.