{"id":7597,"date":"2017-05-11T06:00:12","date_gmt":"2017-05-11T14:00:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/05\/11\/news-1382\/"},"modified":"2017-05-11T06:00:12","modified_gmt":"2017-05-11T14:00:12","slug":"news-1382","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/05\/11\/news-1382\/","title":{"rendered":"Teaming Up with HITRUST to Raise Cybersecurity Standards in Healthcare"},"content":{"rendered":"<p><strong>Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 11 May 2017 13:08:36 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"238\" height=\"300\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-238x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-238x300.jpg 238w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-768x968.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-813x1024.jpg 813w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-640x806.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-900x1134.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-440x554.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-380x479.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3.jpg 1288w\" sizes=\"auto, (max-width: 238px) 100vw, 238px\" \/><\/p>\n<p>From cash-hungry hackers to state-sponsored spies and careless insiders, there\u2019s no shortage of cyber threats facing healthcare organizations (HCOs) today. At Trend Micro, we\u2019ve been protecting organizations operating in the industry for years, but the challenges facing these customers show no signs of abating. In fact, <a href=\"http:\/\/www.hipaajournal.com\/largest-healthcare-data-breaches-of-2016-8631\/\">figures from the US Department of Health and Human Services<\/a> (HHS) put the number of recorded breaches in 2016 at more than 320; linked to the theft of more than 16 million records.<\/p>\n<p>That\u2019s why we\u2019ve been showing our support at the <a href=\"https:\/\/hitrustalliance.net\/\">HITRUST<\/a> 2017 annual conference this week. HITRUST is doing fantastic work to help improve the cybersecurity posture of smaller HCOs which typically have fewer resources to throw at the problem \u2013 by providing low-cost tools and improving threat intelligence gathering and information sharing.<\/p>\n<p><strong>Digital threats<\/strong><\/p>\n<p>Healthcare organizations are keen to leverage the benefits of digital transformation to improve patient care and make themselves more cost effective. But new cloud, mobile and <a href=\"https:\/\/www.trendmicro.com\/us\/iot-security\/\">IoT<\/a> technologies also open up cybersecurity gaps which cyber threat actors are ready and waiting to exploit. As Trend Micro explained in a February report, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/electronic-healthcare-data-in-the-underground\"><em>Cybercrime and Other Threats Faced by the Healthcare Industry<\/em><\/a><em>, <\/em>Electronic Health Records (EHRs) are increasingly popular in cybercriminal undergrounds. They typically contain protected health information (PHI), which have a long shelf life and can be used in a wide range of follow-on fraud scams, making them particularly lucrative fare. That\u2019s why a complete EHR database can sell for as much as $500,000.<\/p>\n<p>That\u2019s not to mention the risks facing HCOs from ransomware, as cybercriminals look to target organizations with the most to lose from an IT outage. The Hollywood Presbyterian Medical Center was the first <a href=\"http:\/\/www.latimes.com\/business\/technology\/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html\">to publicly admit<\/a> paying up in such a case \u2013 to the tune of $17,000. Unfortunately, that case was the first of far too many.<\/p>\n<p><strong>Fighting back with HITRUST<\/strong><\/p>\n<p>These challenges make the work of HITRUST and organizations like it all the more important. HITRUST runs <a href=\"https:\/\/www.youtube.com\/watch?v=6FahJEUU-w0&amp;feature=youtu.be\">CyberAid<\/a>, a first-of-its-kind initiative designed to put high quality security tools and support in the hands of physician practices with fewer than 75 employees. Thanks to a partnership with Trend Micro this is already proving a great success: For example, between October and November 2016, each CyberAid participant was protected on average from 364 threats.<\/p>\n<p>However, that\u2019s not all. At the HITRUST 2017 event, attendees heard about the Cyber Threat XChange (CTX); an initiative designed to accelerate the detection of and response to cyber threats targeting HCOs. How does it do this? By automating the collection and analysis of cyber threats while digitally distributing actionable indicators which HCOs can use to improve their cyber defenses.<\/p>\n<p>A two-week pilot in April returned some impressive results: more than 2,300 IoCs including email-borne ransomware, C&amp;C callbacks and much more.<\/p>\n<p>At the same event, I spoke of the importance of blended threat prevention in helping HCOs improve their cybersecurity, from the first line of defense provided by messaging and web security gateways; to network-based breach detection systems and IPS; physical, virtual and cloud security; and integrated endpoint security.<\/p>\n<p>But I also highlighted the importance of industry partnerships, like the ones we have with HITRUST, in helping to raise security standards and share information for the good of all stakeholders. We\u2019re thrilled that Trend Micro\u2019s hybrid Unified Threat Management (UTM) appliance, Cloud Edge and endpoint security SaaS, Worry Free Services were the first products to be approved for the CyberAid program, and our Deep Discovery Inspector is the backbone in threat intelligence collection and analysis for the Enhanced HITRUST CTX.<\/p>\n<p>Cyber threat actors will never let up, so neither should we. Here\u2019s to many more successful partnerships and initiatives going forward.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/teaming-hitrust-raise-cybersecurity-standards-healthcare\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 11 May 2017 13:08:36 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"238\" height=\"300\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-238x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-238x300.jpg 238w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-768x968.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-813x1024.jpg 813w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-640x806.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-900x1134.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-440x554.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3-380x479.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-3.jpg 1288w\" sizes=\"auto, (max-width: 238px) 100vw, 238px\" \/>From cash-hungry hackers to state-sponsored spies and careless insiders, there\u2019s no shortage of cyber threats facing healthcare organizations (HCOs) today. At Trend Micro, we\u2019ve been protecting organizations operating in the industry for years, but the challenges facing these customers show no signs of abating. In fact, figures from the US Department of Health and Human&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[5976,714],"class_list":["post-7597","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-healthcare","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7597"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7597\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}