2016 hasn’t been kind to the healthcare industry in terms of data breaches. Just look at the attacks on Banner Health, MedStar and countless other healthcare organizations. Health IT Security recently highlighted a concerning new Tripwire study by Dimensional Research, which showed that even though health IT professionals admit to lacking the necessary tools, many are overconfident in their organizations’ ability to identify attacks.
According to the article, the study examined seven key security controls needed to quickly detect cyber-attacks. It claims that 90 percent of participants felt they could detect changes to endpoint devices connected to their own network within hours, while 51 percent weren’t sure how long the detection process would actually take. The results also indicated that various organizations may not have the appropriate tools to quickly detect a breach, or have automated tools capable of gathering the kind of critical information needed to identify and detect unauthorized devices.
To make matters worse, an Advisen survey from earlier this year discovered that an alarming number of survey respondents didn’t test their breach response plan, or even know how to test their plan in the first place. All of this paints a worrisome picture for the healthcare industry as it continues to be a big target for hackers in 2017.
See the full article at Health IT Security for more information and links to the reports.
Leave a Reply