• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

  • Opinion
  • Health IT
    • Behavioral Health
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Patient Engagement
    • Population Health Management
    • Revenue Cycle Management
    • Social Determinants of Health
  • Digital Health
    • AI
    • Blockchain
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • M&A
  • Value-based Care
    • Accountable Care (ACOs)
    • Medicare Advantage
  • Life Sciences
  • Research

Why It’s Time for Hospitals to Become Immune to Ransomware

by Our Thought Leaders 06/19/2017 Leave a Comment

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Security Data Breaches

Editor’s Note: Greg Maudsley is a cyber security expert at Menlo Security, a Silicon Valley-based  cyber security company that protects organizations from cyber attack by eliminating the threat of malware.

Hospitals and other healthcare organizations (HCOs) are increasingly singled out by cyber criminals for ransomware and other attacks. Not only are patients’ sensitive records being targeted, but also – as the FBI warns – their intellectual property or credit card information. The primary reasons for the HCO vulnerabilities are outdated security architectures, and overall lack of IT security experts. Isolation technology provides an appealing alternative to traditional security methods, and prevents, rather than treats, malware and phishing attacks.

Why are HCOs Susceptible?

The majority of today’s healthcare-targeted attacks, such as ransomware, are motivated by financial gain rather than simple notoriety. Cybercriminals will always target those organizations with the weakest defenses and the most valuable data. Few industries are as dependent on data and information than healthcare; without patient records, a hospital cannot operate. 

Hospitals pose a relatively easy target due to the high number of network ingress and egress points, which translate into attack vectors. Workers routinely access critical information from multiple, often unsecured, devices or networks, which renders a perimeter-based security architecture irrelevant.

Compounding the issue, staff at medical institutions often lack essential IT security knowledge because tight budgets make it difficult for hospitals to afford IT professionals with strong security backgrounds. As a result, many hospitals fail to conduct the regular security audits required to keep them safe from attacks. In essence, they are playing a perpetual game of catch-up. 

Related: 5 Lessons Learned From The WannaCry Ransomware Attacks for Hospitals

The Doctor Has Become Patient-Zero

In medical terms, Patient Zero is loosely defined as the first human infected by a new or recently discovered viral or bacterial outbreak. The term has found its way into the IT security lexicon where it’s corollary is the first individual to be infected by a new malware strain, or the first victim in a phishing campaign. This brings to mind a scenario where a single individual is initially infected and rendered contagious. This “patient zero” who then comes in contact with others who also become contagious, and in turn, infect multiple others.

The illness spreads logarithmically until medical experts are able to cure the disease or limit its propagation. This can take months or years, because even with the luxury of modern medical science, infectious diseases are difficult to treat or cure. Before it is contained, a new virus or bacteria can sicken untold numbers of individuals.

When we refer to patient zero in IT terms, many entertain the notion that if an individual is infected by a new malware strain, or clicks on a new malicious web link, today’s state-of-the-art security solutions immediately respond and effectively eliminate the threat. The reality, however, is more analogous to infectious disease.

Today’s security solutions rely on detecting good versus bad. Although we have a solid understanding of what is good and bad today, we have no way of knowing what will be good or bad tomorrow. And just as it take time for medical experts to develop a cure or treatment for a never-encountered disease, so does it take time for security products to develop defenses against new exploits. Even with technologies such as machine learning and AI, there can be a day, week, or months-long gap between initial “patient zero” infection and effective mitigation. During that time, many others can fall victim to the attack. We need to understand that the IT patient zero actually represent tens, hundreds or even thousands of infected devices.

Polio and smallpox impacted a significant portion of the world’s population before they were finally contained. That containment came in the form of a preventative vaccine. What better way to stop a disease than to prevent it from ever happening in the first place?  The same holds true for IT security. Because we will never be able to detect every new malicious web link, malware exploit, or email, as with medicine, prevention holds the key.

Related: Why Ransomware Attacks in Healthcare Will Continue to Rise in 2017

A Preventative Approach

A new preventative approach to eliminating malware, such as ransomware, and the patient-zero problem is isolation, which implements a secure and trustworthy execution environment (or isolation platform) between the user and potential sources of attack. By executing sessions away from the endpoint and delivering only safely rendered information to devices, users are protected from malware and phishing attacks. In the isolation model, malware has no path to reach an endpoint and legitimate content needn’t be blocked in the interest of security. With a native user experience, administrators can open up more of the Internet to their users while simultaneously eliminating the risk of attacks.

Healing Qualities

With the right isolation technology, HCOs can heal their IT security weaknesses, and recognize a number of benefits over legacy security products:

First, isolation is 100 percent effective in preventing malware from web and email links. User sessions are executed in virtual containers within the isolation platform. All content—including any malware—is disposed of along with its container by the platform each time a user completes a session. There’s no chance for malware to escape and infect the user’s endpoint. As a result, there are no false positives that block legitimate content and generate alerts, or false negatives that allow malware to reach its target.

Secondly, it delivers a user experience that is indistinguishable from browsing the web directly, with no noticeable latency or impact to browser functionality such as cut and paste or printing. There is no pixilation, choppy scrolling or other visual artifacts common with ‘screen-scraping’ technologies like VDI. Isolation uses the optimal encoding mechanism for each type of content, and delivers it securely to the user’s device using industry-standard rendering elements that are compatible with any device, browser or operating system.

Thirdly, a cloud-based isolation solution deploys quickly and easily (without appliances or endpoint software) and reduces security complexity and costs by eliminating endpoint software and outdated appliances. It can be turned on in minutes and simplifies operations by eliminating alert fatigue with zero false positives and negatives. And, it can scale to meet the demands of small to global HCOs.

Finally, isolation can be used in conjunction with existing security infrastructure. Next generation firewalls, for example, which protect against the latest cyberattacks, become even more versatile and effective when integrated with threat isolation.

Related: 5 Basic Steps for Hospitals to Improve Their Data Security

It’s Time for HCOs to Become Immune to Malware and Phishing 

Cybercriminals will always target those organizations with the weakest defenses and the most valuable data. Hospitals will always possess valuable data, but by bolstering their cyber immunity posture with new technology such as isolation, they can make themselves a much less appealing target for ransomware and other cyber threats.

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Tagged With: Cybercriminals, Cybersecurity, Healthcare Ransomware, Malware, Phishing, Ransomware Attacks

Tap Native

Get in-depth healthcare technology analysis and commentary delivered straight to your email weekly

Reader Interactions

Primary Sidebar

Subscribe to HIT Consultant

Latest insightful articles delivered straight to your inbox weekly.

Submit a Tip or Pitch

Featured Insights

2025 EMR Software Pricing Guide

2025 EMR Software Pricing Guide

Featured Interview

Kinetik CEO Sufian Chowdhury on Fighting NEMT Fraud & Waste

Most-Read

2019 MedTech Breakthrough Award Category Winners Announced

MedTech Breakthrough Announces 2025 MedTech Breakthrough Award Winners

WeightWatchers Files for Bankruptcy to Eliminate $1.15B in Debt

WeightWatchers Files for Bankruptcy to Eliminate $1.15B in Debt

KLAS: Epic Dominates 2024 EHR Market Share Amid Focus on Vendor Partnership; Oracle Health Sees Losses Despite Tech Advances

KLAS: Epic Dominates 2024 EHR Market Share Amid Focus on Vendor Partnership; Oracle Health Sees Losses Despite Tech Advances

'Cranky Index' Reveals EHR Alert Frustration Peaks Midweek, Highest Among Admin Staff

‘Cranky Index’ Reveals EHR Alert Frustration Peaks Midweek, Highest Among Admin Staff

Madison Dearborn Partners to Acquire Significant Stake in NextGen Healthcare

Madison Dearborn Partners to Acquire Significant Stake in NextGen Healthcare

Wandercraft Begins Clinical Trials for Physical AI-Powered Personal Exoskeleton

Wandercraft Begins Clinical Trials for Physical AI-Powered Personal Exoskeleton

Chipiron Secures $17M to Transform MRI Access with Portable Scanner

Chipiron Secures $17M to Transform MRI Access with Portable Scanner

Abbott to Integrate FreeStyle Libre Glucose Data with Epic EHR

Abbott to Integrate FreeStyle Libre Glucose Data with Epic EHR

5 Ways New Trump Administration Tariffs Are Impacting U.S. Healthcare Now

5 Ways Trump Administration Tariffs Are Impacting U.S. Healthcare Now

iCAD, GE HealthCare Integrate to Advance Breast Cancer Detection with AI

RadNet to Acquire iCAD for $103M in All-Stock Transaction

Secondary Sidebar

Footer

Company

  • About Us
  • Advertise with Us
  • Reprints and Permissions
  • Submit An Op-Ed
  • Contact
  • Subscribe

Editorial Coverage

  • Opinion
  • Health IT
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Population Health Management
    • Revenue Cycle Management
  • Digital Health
    • Artificial Intelligence
    • Blockchain Tech
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • Value-Based Care
    • Accountable Care
    • Medicare Advantage

Connect

Subscribe to HIT Consultant Media

Latest insightful articles delivered straight to your inbox weekly

Copyright © 2025. HIT Consultant Media. All Rights Reserved. Privacy Policy |