VULNERABILITY IN HEALTHCARE
|
|
- Ronald Perkins
- 5 years ago
- Views:
Transcription
1 THE CLOUD SERVICES COMPANY TM VULNERABILITY IN HEALTHCARE Exposing the common vulnerabilities that drive ransomware and make off-site disaster recovery essential
2 Executive Summary While it should come as no surprise, security and growing regulatory burdens are the top concerns for healthcare CIO s. Ransomware, denial of service, and data theft attacks are in the headlines every day. The estimated annual cost of ransomware payments in 2016 was over one billion dollars. In fact, the number of ransomware attacks in 2016 was up by more than 4 times.¹ PHI security, data breaches and data theft remain critical issues. Cybercriminals have learned to follow the path of least resistance. Rather than trying to penetrate network security fortifications, they seek access to systems through the compromise of valid user accounts. Stealing credentials and using them to access a network is easier, less risky, and ultimately more productive than exploiting a perimeter vulnerability. The most common starting point is attacks, such a phishing. According to Verizon s 2016 Data Breach Investigations Report : 30% of phishing messages were opened by the target across all campaigns About 12% went on to click the malicious attachment or link and thus enabled the attack to succeed. Given these numbers, it s no surprise that s are the number one contributor to data breaches. In fact, 63% of breaches in the US are the result of a compromised credential. While no industry is safe, the threat to the healthcare industry is equally astonishing and growing. Based on findings in the Ponemon Institute s 2016 Study on Privacy and Security in Healthcare, 90% of healthcare organizations have had a data breach in the past two years. The study estimates that the resulting cost of these breaches to the U.S. Healthcare industry alone is $6.2 billion. You CAN see in the dark Historically, organizations have been unable to see the swirling pool of potential attacks and to detect specific vulnerabilities until it s too late. Only after a breach do they find malicious code on a laptop or identify the need for user training. But the battle for corporate information is taking place in plain sight every day for those that navigate the Dark Web. This is the playground where stolen credentials typically including user s corporate address and passwords are being openly shared and sold among the multitude of customers in the hacking community. This paper explains the pervasive nature of compromises and sheds light on the quantity, variety, sources, and consistent growth of these threats. The study results are eye opening. Overall, 68% of all analyzed covered entities and their business associates have employees with visibly compromised accounts 76% of which include actionable password information. The bottom line: Be prepared The survey findings illustrate the need for 100% reliable and responsive business continuity solutions and rapid-response disaster recovery. How your reactive protection is set up makes the difference between a minor glitch and a major catastrophe. What do the results mean? The potential for monetary loss is significant Healthcare firms are under attack new data published to the Dark Web every day provides a window into the volume of new and passwords that criminals have accessed. Controlling human behavior is the underlying challenge There is a constant need to monitor for vulnerabilities and train personnel regarding best practices. The need for data backups and disaster recovery is clear Ransomware is a billion dollar program and growing. Gaps in security have allowed phishing attacks to become more effective. As the volume and quality of data elevates, malicious efforts are experiencing increased success. Overall, 68% of all analyzed covered entities and their business associates have employees with visibly compromised accounts 76% of which include actionable password information. That s why Evolve IP and ID Agent collaborated on a healthcare industry-specific study of Dark Web vulnerabilities. We reviewed over 1,000 healthcare related organizations to determine how prevalent these exploits are and how these vulnerabilities evolve. 2
3 Survey Methodology The Deep Web is a portion of the Internet that is hidden from conventional search engines and the general public. Search engines like Google, BING and Yahoo only search the surface web, also known as the World Wide Web (www). It s estimated that the Deep Web is 400 to 550 times larger than the surface web and it is generally used by organizations such as universities to archive research and things of that nature. Within the Deep Web there is a portion called the Dark Web. These are enclaves, sites, and forums within the Deep Web where users can operate anonymously to avoid law detection. This is the part of the web that ID Agent analyzed for the benchmark survey. Using ID Agent s proprietary Dark Web ID analysis technology, ID Agent and Evolve IP analyzed 1,000 healthcare companies representing a variety of business types and sizes. The industry segments targeted included both HIPAA covered entities as well as many business associates who provide services to the covered entities. Segments Studied Vulnerability statistics On average, more than 68% of the firms reviewed have compromised credentials visible and available on the Dark Web. The numbers range from 55.6% to 80.4% depending on industry segment. The results show it is incredibly common for compromised and password combinations to be out on the Dark Web. Even organizations with one compromise still face huge risks and the risk is proportional to company size. One organization in the study had over 300 compromised credentials. Even if the password has been changed, password patterns and human tendencies make brute force attacks and social engineering significantly easier with this information. 90% 80% 70% 60% 50% Compromise % by Healthcare Industry Segment 61.9% 80.4% 76.5% 55.6% 72.0% 72.3% 76.0% Healthcare Providers - 53% IT/Software Providers - 15% Hospitals - 8% Healthcare Providers % TPAs % Health Centers - 72% IT/Software Providers - 76% Regional Health Plan % Medical Billing/Collections -55.6% Hospitals % How do criminals use stolen credentials? There is a fairly common exploit lifecycle: 1. Gain access to data from s that have been exploited via phishing, malware, data breach, social engineering, or some other form of attack 2. Use the data obtained to study the targeted corporations or individuals 3. Eventually gain system access 4. Establish a foothold 5. Gain more privileges TPAs - 7% Regional Health Plan - 7% Medical Billing/Collections - 7% Health Centers - 3% 6. Move laterally throughout the organization and through the supply chain to extract data or control system access Passwords are easy to steal What % Of Stolen Credentials Include Passwords? Passwords Available 76% Passwords Not Available 24% 76% of the stolen records we reviewed on the Dark Web had an associated password. Of this 76%, 23% had fully visible text passwords. In many cases, these passwords are outdated, but that does not limit their value. More than three quarters of people use the same or similar passwords across all of their online activities. 2 By understanding the types of changes people make to their passwords over time, hackers can create a user profile and determine a person s new password fairly accurately by using simple guessing or sophisticated automated algorithms. 3
4 The remaining 77% were cryptographically hashed passwords. Simply hashing the password does not meet today s needs for security. Hackers can easily use a variety of methods (many of which are available online) to crack hashes, including dictionary attacks, brute force attacks, lookup tables, reverse lookup tables and rainbow tables. This is why strong, unique passwords are paramount for each account and why passwords should change over time. What type of compromise exposed the user credentials? The study aimed to dig deeper than just how many names were compromised per organization. ID Agent s analysis evaluated where the data originated and from where it was stolen. There are numerous points of attack, each raising a unique degree of concern. The majority of the data (55%) is the result of known data breaches where user credentials were stolen in bulk (often in widely publicized events) and then published by the perpetrators. However, the most concerning finding is the relatively small segment of credentials (6%) directly related to phishing or keylogging attacks. While the percentage is in single digits, keep in mind that this represents over 450 individual incidents where companies in our study had exposures, any one of which could lead to ransomware, denial of service attacks, or PHI breaches How are Credentials Being Stolen? Keylogged & Validated 1% Known Data Breach 55% Undetermined 38% Keylogging/Phishing 6% Evolve IP s comprehensive security approach vulnerability is a significant contributor to the tremendous range of threat vectors that are confronting healthcare organizations. The rest of this paper will look at security best practices that help organizations avoid costly -related breaches and also help establish a systematic and structured security posture that is consistent with world-class enterprises. The goals can be boiled down into three basic categories that every organization should embrace. 1. Proactive Threat Intelligence 2. Continuous Security Management 3. Rapid Incident Response and Recovery 1. Proactive Threat Intelligence The objective is to identify and control not just to observe the technical threats and vulnerabilities by understanding and limiting the volume of viable environmental threats. The ability to see vulnerabilities is critical for identifying hidden Dark Web threats before criminals exploit them. ID Agent provides this visibility on a regular basis and allows real-time response to urgent keylogging and phishing related compromises. With ID Agent s information, you can understand when malware removal, forced password changes, or training of employees may be required. This data also allows firms to understand user activity and behavior over time which helps compliance teams see whether their efforts are making an impact. Are you seeing fewer credentials on the Dark Web? Is there rapid growth in activity? Proactive vulnerability reports highlight the answers. This type of monitoring enables preemptive threat resolution and cuts off threats at the pass by: Enabling immediate response to keylogging or phishing compromises that may be actively bypassing your security barriers Providing alerts and ongoing monitoring of corporate s and IP addresses that are being traded by hackers Identifying individual instances of policy violations as well as general user training issues 2. Continuous Security Management The challenge of infrastructure security is driven by the rapid pace in which the definition at security changes. The nature of attacks and the creativity of attackers evolves on a daily basis. The ability to identify and block these threats becomes critical and overwhelming. That s why day-to-day, real-time security analysis and infrastructure management is the second type of protection that organizations must master. Evolve IP s approach is designed to quickly incorporate: New security standards and regulations Changes to existing authoritative sources Information about recent data breaches Industry feedback, best practices, and lessons learned 4
5 These characteristics and capabilities are consistent with a solid security foundation. However, while establishing such an environment empowers healthcare organizations to stay ahead of many emerging threat vectors, there is no known way to eliminate the potential of an attack. 3. Rapid Incident Response and Recovery In healthcare, both money and lives are on the line. Losing system or file availability (for instance in the event of a ransomware attack), or getting shut down by a DDoS attack can have serious, immediate, and negative implications. The best practice for ensuring ransomware protection and business continuity is to proactively create multiple, secure, and physically separate copies of all servers, applications, and data. This approach allows rapid restoration of your business operations in the event that your systems are compromised by an attack. The FBI agrees, as illustrated by this excerpt from a recent blog post on their website: Organizations in particular should focus on prevention efforts both awareness training and robust technical prevention controls and solid business continuity planning. As part of that plan, you should: 1. Back up data regularly and verify the integrity of those backups regularly. 2. Secure your backups. Make sure they aren t connected to the computers and networks they are backing up. By following this advice, and arming your organization with the right backups, you can prevent the attackers from taking away access to your systems. Why choose Evolve IP? The key to maintaining control is to fortify your critical infrastructure and data with regular, isolated, and recoverable backups. Many organizations are unaware that with Evolve IP s technology, preparation and expertise, almost any production environment can be restored and operational within four hours (see figure below). With a range of business restoration options, Evolve IP puts you in control not the attacker. Offsite Tape Backups Recovery Time by Backup Strategy On-site Tape or Virual Backups On-site Virual Backups/ Internal Team 4-6 days* 3 days* 24 hours* 4 hours The proper preparation to create this capability includes: Creating a reliable backup process. Create rapid, frequent system backups in a secure, offsite location. Ensuring data recoverability. Backups can also be infected by the malware virus if not detected immediately after infection. Confirming data availability. Ask yourself how quickly can we access and use the backup that we created? Evolve IP makes rapid, frequent backups of your systems, and then moves them securely offsite to an isolated location. Depending on your existing infrastructure, simple backups can be established in a matter of hours, with your data securely maintained in an isolated, private, HIPAA-compliant environment. With Managed Disaster Recovery as a Service (DRaaS), Evolve IP s team stands ready to recover any compromised customer data with a 4-hour or less guaranteed service level. 5
6 Conclusion The benchmark study revealed the alarming depth and breadth of an underlying and growing security threat to healthcare organizations. However, most organizations do not have the time or the resources to stay properly protected. Another solution is needed, and there is a fairly simple one. Increasingly, healthcare providers are recognizing the value of cloud-based technologies and managed services. This kind of cloud, that is strengthened by in-depth security policies and procedures and designed to meet the rigorous HITRUST CSF certification standard, goes beyond subjective standards such as SOC II and provides firms with an absolute definition of what it means to have great security. This robust hosting backbone is then combined with actively managed security services that can rapidly respond to daily monitoring requirements, security updates, emerging threats, and compliance changes. This unique combination of technology and service liberates organizations to allocate their IT energies towards key growth and business development strategies. About ID Agent/Dark Web ID ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions to private and public sector organizations and to millions of individuals impacted by cyber incidents. From monitoring your organization s domain for compromised credentials to deploying identity and credit management programs in order to protect your employees and the customers you serve we have you covered. The largest private and public sector organizations globally rely on Dark Web ID to provide actionable stolen credential data to make informed decisions. Dark Web ID combines human intelligence with sophisticated Dark Web intelligence and search capabilities to identify, analyze and proactively monitor for your organization s compromised or stolen employee and customer data. Visit for more information. Sources 1. ransomware-took-in-1-billion-in-2016-improved-defenses-maynot-be-enough-to-stem-the-tide.html b32716x2f9pva824b1rcdt1n About Evolve IP Evolve IP is The Cloud Services Company. Designed from the beginning to provide organizations with a unified option for cloud services, Evolve IP enables decision-makers to migrate all or select IT technologies to its award-winning cloud platform. Evolve IP s combination of security, stability, scalability and lower total cost of ownership is fundamentally superior to outdated legacy systems and other cloud offerings. Today, over 130,000 users across the globe depend daily on Evolve IP for cloud services like virtual servers, desktop services, disaster recovery, unified communications, contact centers and more. Visit for more information. 6
THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION
BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive
More informationKeys to a more secure data environment
Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationHave breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?
The financial sector struggles with data leakage in part because many such organizations rely on dinosaurs - security solutions that struggle to protect data outside the corporate network. These orgs also
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationCyberArk Privileged Threat Analytics
CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationProtect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com
Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationCROWDSTRIKE FALCON FOR THE PUBLIC SECTOR
C R O W D S T R I K E P U B L I C S E C T O R S O L U T I O N S CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR SECURE YOUR ENTERPRISE WITH A THAT PROVIDES UNRIVALED PROTECTION, SECURITY EXPERTISE, AND OPTIMAL
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationABB Ability Cyber Security Services Protection against cyber threats takes ability
ABB Ability Cyber Security Services Protection against cyber threats takes ability In today s business environment, cyber security is critical for ensuring reliability of automation and control systems.
More informationRSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE
WHITEPAPER RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE CONTENTS Executive Summary........................................ 3 Transforming How We Think About Security.......................... 4 Assessing
More informationmhealth SECURITY: STATS AND SOLUTIONS
mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationSTAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response
STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone
More informationCOUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017
COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationTHE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015
THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT 2 EXECUTIVE SUMMARY The growth of enterprise-developed applications has made it easier for businesses to use technology to work more efficiently and productively.
More informationEntertaining & Effective Security Awareness Training
Entertaining & Effective Security Awareness Training www.digitaldefense.com Technology Isn t Enough Improve Security with a Fun Training Program that Works! Social engineering, system issues and employee
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationCloud Communications for Healthcare
Cloud Communications for Healthcare Today, many powerful business communication challenges face everyone in the healthcare chain including clinics, hospitals, insurance providers and any other organization
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationEFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave
EFFECTIVELY TARGETING ADVANCED THREATS Terry Sangha Sales Engineer at Trustwave THE CHALLENGE PROTECTING YOUR ENVIRONMENT IS NOT GETTING EASIER ENDPOINT POINT OF SALE MOBILE VULNERABILITY MANAGEMENT CYBER
More informationService Provider View of Cyber Security. July 2017
Service Provider View of Cyber Security July 2017 Quick Stats Caribbean and LatAm: 3 rd largest population of Internet Users You Are Here Visualization from the Opte Project of the various routes through
More informationFlorida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government
Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology
More informationCompleting your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT
Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Introduction Amazon Web Services (AWS) provides Infrastructure as a Service (IaaS) cloud offerings for organizations. Using AWS,
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationMITIGATE CYBER ATTACK RISK
SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationRSA Solution Brief. The RSA Solution for Cloud Security and Compliance
The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationCloudSOC and Security.cloud for Microsoft Office 365
Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed
More informationHEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
More informationOffice 365 Buyers Guide: Best Practices for Securing Office 365
Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.
More informationGovernance Ideas Exchange
www.pwc.com.au Anatomy of a Hack Governance Ideas Exchange Robert Di Pietro October 2018 Cyber Security Anatomy of a Hack Cyber Security Introduction Who are the bad guys? Profiling the victim Insights
More informationKnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.
KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. About Us The world s most popular integrated Security Awareness Training and Simulated
More informationTransforming Security from Defense in Depth to Comprehensive Security Assurance
Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new
More informationIncident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles
Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of
More informationSecuring Office 365 with SecureCloud
Securing Office 365 with SecureCloud 1 Introduction Microsoft Office 365 has become incredibly popular because of the mobility and collaboration it enables. With Office 365, companies always have the latest
More informationWhat is Penetration Testing?
What is Penetration Testing? March 2016 Table of Contents What is Penetration Testing?... 3 Why Perform Penetration Testing?... 4 How Often Should You Perform Penetration Testing?... 4 How Can You Benefit
More informationCybersecurity for Service Providers
Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:
More information74% 2014 SIEM Efficiency Report. Hunting out IT changes with SIEM
2014 SIEM Efficiency Report Hunting out IT changes with SIEM 74% OF USERS ADMITTED THAT DEPLOYING A SIEM SOLUTION DIDN T PREVENT SECURITY BREACHES FROM HAPPENING Contents Introduction 4 Survey Highlights
More informationDeMystifying Data Breaches and Information Security Compliance
May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts
More informationBusiness continuity management and cyber resiliency
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,
More informationCyber Security Trends A quick guide
Cyber Security Trends A quick guide This year, in an effort to drive awareness of cyber risks, we ve created this short guide to explain the latest findings in cyber security. Continue reading to learn
More informationExpress Monitoring 2019
Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities
More informationIncident Response Services to Help You Prepare for and Quickly Respond to Security Incidents
Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationTHE EVOLUTION OF SIEM
THE EVOLUTION OF SIEM Why it is critical to move beyond logs BUSINESS-DRIVEN SECURITY SOLUTIONS THE EVOLUTION OF SIEM Why it is critical to move beyond logs Despite increasing investments in security,
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More informationKEYCLOUD BACKUP AND RECOVERY AS-A-SERVICE (BRAAS): A fully-managed backup and recovery solution for your mission critical data
KEYCLOUD BACKUP AND RECOVERY AS-A-SERVICE (BRAAS): A fully-managed backup and recovery solution for your mission critical data 1 BACKUPS ARE GENERALLY A THANKLESS JOB Every IT organization needs to run
More informationManaged Endpoint Defense
DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationSecurity Audit What Why
What A systematic, measurable technical assessment of how the organization's security policy is employed at a specific site Physical configuration, environment, software, information handling processes,
More information2018 Mobile Security Report
2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationSOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM
RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More information2017 Varonis Data Risk Report. 47% of organizations have at least 1,000 sensitive files open to every employee.
2017 Varonis Data Risk Report 47% of organizations have at least 1,000 sensitive files open to every employee. An Analysis of the 2016 Data Risk Assessments Conducted by Varonis Assessing the Most Vulnerable
More informationCyber Defense Operations Center
Cyber Defense Operations Center Providing world-class security protection, detection, and response Marek Jedrzejewicz Principal Security Engineering Manager Microsoft Corporation 1 Cybersecurity. In the
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationPower of the Threat Detection Trinity
White Paper Security Power of the Threat Detection Trinity How to Best Combine Real-time Correlation, Insider Threat Analysis and Hunting to protect against cyber threats. Combine real-time correlation,
More informationCybersecurity for Health Care Providers
Cybersecurity for Health Care Providers Montgomery County Medical Society Provider Meeting February 28, 2017 T h e MARYLAND HEALTH CARE COMMISSION Overview Cybersecurity defined Cyber-Threats Today Impact
More informationSTEVE GOODING JUNE 15, 2018
ARMOR: THE STATE OF THE INDUSTRY STEVE GOODING JUNE 15, 2018 Agenda 1. Welcome 2. Introduction to Armor 3. Honeypot Report 4. Black Market Report 2 ARMOR IN THE CYBERSECURITY SPACE 3 About Armor DATA CENTERS:
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationThe Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It
The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:
More informationWHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS
July 2018 WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS JUST WHAT THE DOCTOR ORDERED... PROTECT PATIENT DATA, CLINICAL RESEARCH AND CRITICAL INFRASTRUCTURE HEALTHCARE S KEY TO DEFEATING IOT CYBERATTACKS
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationGetting over Ransomware - Plan your Strategy for more Advanced Threats
Getting over Ransomware - Plan your Strategy for more Advanced Threats Kaspersky Lab Hong Kong Eric Kwok General Manager Lapcom Ltd. BEYOND ANTI-VIRUS: TRUE CYBERSECURITY FROM KASPERSKY LAB 20 years ago
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE
ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE TABLE OF CONTENTS Overview...3 A Multi-Layer Approach to Endpoint Security...4 Known Attack Detection...5 Machine Learning...6 Behavioral Analysis...7 Exploit
More informationSPAM Malware s Super Highway. How To Protect Yourself Against Malicious s 1
SPAM Malware s Super Highway How To Protect Yourself Against Malicious Emails 1 What The Good Guys Are Up Against According to Kaspersky Lab: The decline in SPAM emails over the past few years has reversed
More informationThe 2017 State of Endpoint Security Risk
The 2017 State of Endpoint Security Risk Attacks are evolving. As a result, today s organizations are struggling to secure their endpoints, and paying a steep cost for each successful attack. To discover
More informationLayer Security White Paper
Layer Security White Paper Content PEOPLE SECURITY PRODUCT SECURITY CLOUD & NETWORK INFRASTRUCTURE SECURITY RISK MANAGEMENT PHYSICAL SECURITY BUSINESS CONTINUITY & DISASTER RECOVERY VENDOR SECURITY SECURITY
More informationTHE STATE OF CLOUD & DATA PROTECTION 2018
THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationCybersecurity and Nonprofit
Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationTechnology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited
Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationEasy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.
Security Solutions Our security suite protects against email spam, viruses, web-based threats and spyware while delivering disaster recovery, giving you peace of mind so you can focus on what matters most:
More information6 Vulnerabilities of the Retail Payment Ecosystem
6 Vulnerabilities of the Retail Payment Ecosystem FINANCIAL INSTITUTION PAYMENT GATEWAY DATABASES POINT OF SALE POINT OF INTERACTION SOFTWARE VENDOR Table of Contents 4 7 8 11 12 14 16 18 Intercepting
More informationEliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat
WHITE PAPER Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat Executive Summary Unfortunately, it s a foregone conclusion that no organisation is 100 percent safe
More informationPrivileged Account Security: A Balanced Approach to Securing Unix Environments
Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged
More informationSELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats
SELLING YOUR ORGANIZATION ON APPLICATION SECURITY Navigating a new era of cyberthreats Selling Your Organization on Application Security 01 It's no secret that cyberattacks place organizations large and
More information