Skip to main content

Daunting realities in the healthcare industry, when it comes to Cyber Security



From Lack of understanding and awareness, to the challenges related to budget, the healthcare industry is sick when it comes to protecting infrastructure and information.
 
 Medical records are being increasingly targeted by cybercriminals, and healthcare institutions were twice more likely to be targeted than other organizations.

The biggest threat, says
KPMG ,comes from external attackers at 65% ,while malware tops the list of information security concerns.
Daunting realities include:
  • Valuable data. Data collected and stored by hospitals and other organisations, such as medical aid schemes, is up to ten times more valuable to cybercriminals than credit card information. Given the value of this data on the black market, cyber-attacks are becoming ever more sophisticated in their attempts to hack healthcare institutions.
  • Ageing infrastructure. Hospitals are melting pots of outdated infrastructure, old operating systems and state-of-the-art medical technology, all communicating over the same networks.
  • Complex networks. The fact that so many different people, devices and departments need to access a medical institution’s records forces them to adopt open networks. It becomes difficult to secure and even more vulnerable to attack.
  • No budget. Security spending in the healthcare industry is lagging behind other industries spend.
  • Easy targets. Ransomware is one of the biggest methods used by cybercriminals to gain access to medical data. This involves ‘kidnapping’ the data and only releasing it once the hospital pays a ransom. Because medical organisations are generally dealing with crises, they need urgent access to their data and are more willing to pay the ransom to get back up and running as quickly as possible. Cybercriminals know this and are exploiting it.
Lack of understanding and awareness. There’s a lack of understanding of what’s going on when it comes to cyber security. There needs to be an increased understanding of how to defend against attacks like ransomware, coupled with a bigger focus on educating staff and users on how to spot phishing attacks.

Popular posts from this blog

IBM Cloud, Bluemix + Apple Swift for mobile app front-end and back-end development

It is exciting to see progressively that, the compelling open source architecture brings peace in minds and boosts deep innovation within leading tech companies.Introduced in 2014, Swift which is henceforth open sourced is becoming one of the fastest growing and most widely used programming languages.
The momentum is profound at IBM with the release of its Swift Sandbox for early exploration of server-side programming in Swift.
By to bring Swift to the Cloud IBM is sharing its deep understanding of the advantages of Swift and the knowledge; the company is committed to maturing the use of Swift as a server-side language for enterprise development with the goal to break down barriers between front-end and back-end development, which can provide enterprises a single language to build rich experiences and back-end business logic.

Integrated Email in our mobile-driven world.

Email remains our faithful companion, when it comes to interact with others anywhere and anytime. With the increasing adoption of social platforms, the flexibility and the productivity brought by the emerging technologies, the traditional inbox becomes an intelligent and intuitive tool that makes you more effective from anywhere.
It can automatically surface your important email; help you, work across all your accounts; help you focus on what matters; schedule what you want at any time you want; share available times, schedule meetings; View and attach files from your Dropbox, Google Drive, Microsoft OneDrive and email accounts with just a few taps. Integrated email also helps you find your important emails, people and files; Discover the people with whom you communicate most; Access all related emails, meetings and files to manage relationships better than ever.
Acompli, paves its way within this vertical. 
It supports Microsoft Exchange, Office 365, Google Apps, Gmail, iCloud, Yahoo, Ou…

4D Geographic Information System (GIS) data

It is interesting to observe that, vendors are focusing on the development of 4D GIS software. 4D GIS data includes 2D data, 3Ddata, and data regarding time change. An integrated database with real-time monitoring is required to generate 4D data. 
4DMapper is an Australia-based company that puts multi-source and multi-format geospatial data, including 3D and 4D GIS, on the cloud and streams it to browsers after rasterization and vectoring.