{"id":11677,"date":"2018-03-07T08:00:17","date_gmt":"2018-03-07T16:00:17","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/03\/07\/news-5447\/"},"modified":"2018-03-07T08:00:17","modified_gmt":"2018-03-07T16:00:17","slug":"news-5447","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/07\/news-5447\/","title":{"rendered":"Trend Micro at HiMSS: Protecting Healthcare Organizations with Optimized, Connected Security"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 07 Mar 2018 15:00:16 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"258\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/05\/anthem-breach1-300x300-300x258-300x258.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" \/><\/p>\n<p><em>Submitted by\u00a0Elie Nasrallah<\/em><em>\u2028,\u00a0Director \u2013 Cyber Security Strategy<\/em><em>\u2028<\/em><\/p>\n<p>The healthcare industry remains one of the most frequently targeted sectors in the United States. It accounted for nearly a quarter (23%) of all breaches <a href=\"https:\/\/www.healthcare-informatics.com\/news-item\/cybersecurity\/2017-breach-report-477-breaches-56m-patient-records-affected\">reported in 2017<\/a>, second only to the business category, in another record year for data theft. That\u2019s why Trend Micro has been a long-time supporter of initiatives like HITRUST CyberAid, designed to improve baseline securitdy among smaller healthcare organizations (HCOs).<\/p>\n<p>&nbsp;<\/p>\n<p>It\u2019s also why we\u2019ll be at the upcoming HiMSS 2018 show in Las Vegas this week, sharing our expertise and even challenging attendees to a new cyber-attack simulation game: <em>Hospital Under Siege!<\/em><\/p>\n<p><strong>HCOs under attack<\/strong><\/p>\n<p>HCOs are an increasingly attractive target for cybercriminals. Why? A combination of complex, heterogeneous systems; historical under-investment in cybersecurity; a fluid, dispersed mobile workforce; and potentially <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/electronic-healthcare-data-in-the-underground\">lucrative patient data<\/a> have created a perfect storm exposing the sector to ever-growing risk. Hackers are also aware that if they get ransomware on mission critical systems then hospitals may be forced to pay up or risk impacting patient care \u2014 a factor which <a href=\"https:\/\/www.helpnetsecurity.com\/2018\/01\/08\/healthcare-breaches-involving-ransomware\/\">some estimates claim<\/a> has led to an 89% year-on-year increase in ransomware targeting the sector.<\/p>\n<p>Trend Micro\u2019s response has been to team up with HITRUST on a CyberAid program designed to get <a href=\"https:\/\/blog.trendmicro.com\/just-doctor-ordered-trend-micro-takes-hassle-security-new-cyberaid-program\/\">our security tools in the hands<\/a> of more small physician practices across the country. We followed this up with a further collaboration on <a href=\"https:\/\/blog.trendmicro.com\/taking-healthcare-threat-protection-next-level-hitrust\/\">Cyber Threat XChange (CTX) Deceptive<\/a>: an industry first, shared cyber deception platform designed to lure attackers and better detect advanced threats.<\/p>\n<p><strong>At the show<\/strong><\/p>\n<p>Events like HiMSS offer great opportunities for IT professionals to network with their peers, share best practices and learn from industry experts. That\u2019s why we\u2019ll be at the event in Las Vegas this week to join the discussion and explain why layered, cross-generational security is the only option for HCOs under increasing pressure from cyber-threats.<\/p>\n<p>The truth is that there\u2019s no silver bullet solution for HCOs battling to keep data and systems safe and secure \u2014 however much some vendors may try to convince you otherwise. The best approach for success is to layer up connected security at the endpoint, network and cloud with a blend of techniques optimized for leading platforms and apps like Office 365, Azure and AWS.<\/p>\n<p>These techniques could include everything from app control to exploit prevention, and behavioral analysis to machine learning: the key is to have all bases covered and apply the right technology at the right time for maximum protection. By sharing the same underlying intelligence you also get more effective and connected threat defense, all managed from a centralized portal. That\u2019s the beauty of our XGen approach.<\/p>\n<p>If you want to find out more, come down to HiMSS and drop by to our stand (#8) in the Cybersecurity Command Center<strong>\u00a0<\/strong>at the Challenge Area, located in the Titan Ballroom, or our kiosk (#6) in the Cybersecurity Pavilion, located in the Veronese Ballroom.<\/p>\n<p>We\u2019ll also be hosting a must-see presentation with Craig Gorm\u00e9 and Jason Noll from UF Health. <em>A Holistic Approach to Information Security <\/em>will take place March 7, 10-10.20am at the Cybersecuity Command Center (Titan Ballroom).<\/p>\n<p>Finally, if you fancy testing your cybersecurity expertise, then try our cyber-attack simulation game <em>Hospital Under Siege<\/em> in the Challenge Area. There\u2019ll be Apple Watches, Amazon Echos, and Bose headphones on offer as prizes.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trend-micro-himss-protecting-healthcare-organizations-optimized-connected-security\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 07 Mar 2018 15:00:16 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"258\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/05\/anthem-breach1-300x300-300x258-300x258.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" \/>Submitted by\u00a0Elie Nasrallah\u2028,\u00a0Director \u2013 Cyber Security Strategy\u2028 The healthcare industry remains one of the most frequently targeted sectors in the United States. It accounted for nearly a quarter (23%) of all breaches reported in 2017, second only to the business category, in another record year for data theft. That\u2019s why Trend Micro has been a&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[5976,714],"class_list":["post-11677","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-healthcare","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11677"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11677\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}