Select Page

Why are healthcare organisations targets for cyber attacks?

CYBSAFE-SebDB Webinar-preblog-221011MS-36

13 July 2021

Healthcare services are under pressure. The Covid-19 pandemic has stretched them to their limit. As if the strains of a pandemic weren’t enough, healthcare organisations have also been subject to cyber attacks. 

We’d like to think our healthcare services are immune to such attacks. But, they remain consistent targets.

Why do cyber criminals target healthcare organisations? And what can we do to make the healthcare industry more cyber resilient?

 

A growing threat

In 2020, the number of cyber attacks soared as cyber criminals took advantage of remote working and the disruption caused by Covid-19. Healthcare organisations weren’t spared during the onslaught. Nearly 140,000 malicious emails targeted NHS staff in 2020. In June, 113 NHSmail accounts were compromised in a phishing attack.

The pattern continued into 2021. In May, the Irish Health Service Executive (HSE) was forced to shut down its IT systems during a cyber attack. Hackers shared patients’ details online and demanded a ransom. The attack caused widespread disruption, leading to cancellations of outpatient appointments and clinics. 

Healthcare systems have long been at risk. The WannaCry ransomware attack in 2017 disrupted more than a third of NHS trusts in England. That attack was relatively unsophisticated. Since then, the attack surface has grown.

More IoT devices and greater use of cloud services have opened up entry points for criminals. Remote working has made cyber security practices more difficult to enforce. These changes mean healthcare services remain at risk of another attack as disruptive, if not more so, than WannaCry.

 

Why target healthcare?

Confidential patient information is an obvious lure for cyber criminals. But several other factors make healthcare organisations prime targets.

The need for data to be shared across healthcare services and between patients and doctors opens up vulnerabilities. If one device is compromised, shared networks leave a whole organisation exposed. 

Medical devices provide criminals with plenty of entry points. These devices aren’t designed with security in mind. As a result, lifesaving equipment can be compromised, acting as a criminal’s gateway into a healthcare network.

Legacy technology also poses a risk. A failure to patch systems or stop using older software opens up further avenues for attack.

With healthcare workers stretched thin, limited time and resources are devoted to reducing cyber risk. Thus, people in the industry remain ill-equipped to recognise and act on threats.

 

Increasing resilience

With a better-supported workforce, healthcare organisations can strengthen their defences against cyber attacks. With 90% of data breaches caused by human error, improving people’s security behaviour is critical.

“Supported” is not the same as “trained”. An effective strategy is one that empowers employees to recognise cyber threats and act appropriately to reduce risk. Not one-off training or tick-box exercises aimed at meeting compliance standards, employees need ongoing support.

Support. Assist. Empower.

Behave Hub newsletter CybSafe

Do one more thing right today. Subscribe to the Behave newsletter:

You may also like

An open letter to CISOs & Security Leaders

An open letter to CISOs & Security Leaders

The human side of cybersecurity is evolving. Fast.But there’s a good chance you might be stuck in the past. You probably have well-established views on security awareness, culture, and human risk.You genuinely believe they matter. But if we’re being honest - you mostly pay lip service to them. And...

Why security awareness still isn’t taken seriously (and how to fix it)

Why security awareness still isn’t taken seriously (and how to fix it)

Let’s start with a painful truth:Security awareness, culture, and human risk professionals are often undervalued. Despite the rising threat of human-enabled cyber attacks, many organizations still treat addressing the human aspect as a checkbox. A communications initiative. A nice-to-have....

Security metrics reboot: Less input, better output, real outcomes

Security metrics reboot: Less input, better output, real outcomes

Unfortunately, most security awareness professionals don’t really understand the difference between: ✅ Inputs✅ Outputs✅ Outcomes But they don’t want to admit it. And honestly? We get it. It’s like pretending to know the plot of Inception when deep down, you’re just as confused as everyone else. No...

The dogma of security awareness: Exposing cybersecurity’s biggest blind spot

The dogma of security awareness: Exposing cybersecurity’s biggest blind spot

“Humans are the weakest link.”“Security Awareness training = better behaviour”"If we can nail engagement, we’ll nail risk reduction.""Security Awareness is *actually* about so much more than awareness.”“Security culture is the golden ticket to risk reduction.”“Good communication, messaging,...

Can BS make SA&T stick? Hot takes from the experts…

Can BS make SA&T stick? Hot takes from the experts…

Using insights from “Oh, Behave!” to strengthen security training and drive lasting behavioral change Security training. It’s as commonplace in an organization as writing “see attached” and forgetting to attach anything. It can help to tackle cybersecurity risks—but only when done well. Simply...