There’s no sugarcoating it: healthcare has a serious ransomware problem. And it’s not a new problem for this sector. In fact, the first-ever such attack targeted the industry in 1989 when 20,000 floppy disks infected with ransomware were given to those who attended the World Health Organization’s AIDS Conference.
So, the problem isn’t new, but it is getting worse. Ransomware has exploded in the past several years across almost every sector, but healthcare has definitely been one of the industries bearing the brunt of the assault. It’s always been a rich target for bad actors.
These attacks have serious consequences, for obvious reasons: they potentially impact patients and their ability to access the care they need. They can take down entire systems, cut off computer access for essential services, or even lead to lawsuits for healthcare companies.
Looking at the landscape
There’s no shortage of reports about ransomware attacks against healthcare. One thing they all point to is that this is a serious problem that is growing. And not only that, but the price of ransomware payments is also increasing, even as the federal government tries to the crackdown.
Back in October 2020, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) released a joint advisory focused on the rise of ransomware in healthcare. And just in May, the FBI warned about a new strain of ransomware targeting healthcare organizations and first responders.
When it comes to ransomware, no type of healthcare organization seems to go unscathed. Whether it’s hospitals, health insurance companies, vaccine trials, the pharmaceutical industry, and so on – seemingly no aspect hasn’t been targeted.
The pandemic only made the situation worse; it’s been a case of bad actors kicking the industry while it was already down. Healthcare organizations already burdened by the pandemic were made even more susceptible to cyber-attack for the simple fact that they were dealing with a global health crisis.
Bringing in the big guns with zero trust
Zero trust is a significant factor in mitigating ransomware’s effects, along with multifactor authentication. Zero trust is so useful because it requires healthcare organizations to be able to identify new types of users. Typically, there are at least 15 devices connected to any hospital bed in the United States today. There is thus a variety of both people and devices collecting, generating, and curating data across organizations to help with data-driven decision-making. These connected people and things create challenges about how organizations catalog and identify all people, devices, and applications in their networks.
Zero Trust Access (ZTA) is so useful here because it is fundamentally about identity and access management. In many ways, Zero trust arose from network segmentation’s limitations. Although it is intuitively elegant, over-segmentation impedes business operations, while under-segmentation lacks the security needed to prevent compromises and the lateral movement of threat actors. The key to segmentation across hybrid and distributed ecosystems is understanding all role-based access controls and segmenting accordingly.
Coordination and education
Technology is only part of the solution; defeating ransomware also requires coordination and education. As a recent example, a report by the Government Accountability Office examined how the Department of Health and Human Services is managing cybersecurity. The report found that, while the department is making many positive strides, there’s a lot of room for improvement in terms of collaboration and coordination. This applies across sectors. Cybersecurity needs to be a part of every division, every function, every department – and there need to be coordinated efforts within each organization.
Coordination is vital; so is cyber hygiene. That’s because human error is involved in 85% of data breaches, the 2021 Verizon Data Breach Incident Report found. This activity can be malicious, but most of the time it’s inadvertent, accidental, and/or careless behavior – in other words, human error.
Securing healthcare must involve training employees in cyber hygiene and reinforcing that training with technology that empowers users. This includes ensuring that all employees within healthcare organizations receive the training required to be able to act swiftly in the face of a cyberattack.
The onboarding process is the time to start such training. But remember that cyber hygiene is a continuous learning process. Employees must learn how to spot and report suspicious cyber activity and maintain cyber hygiene. And now more than ever, they must also learn how to secure their home networks and personal devices. CISOs need to make sure users – particularly remote workers – know how to maintain cyber distance by remaining vigilant about suspicious requests and implementing basic security tools and protocols.
An ongoing effort
2020 was called the year of ransomware by many in the industry, but unfortunately, it looks like 2021 will take that title. Ransomware has proliferated significantly in the past year, and it’s now a topic of national security conversations. Healthcare remains a major target for cybercriminals, as the light of several high-profile attacks in the past several months illustrates. Since it isn’t going away, healthcare organizations must do all they can to ensure consistent care and data privacy for their patients. The use of zero trust, along with coordination of security efforts and cyber hygiene training, will go far in achieving those goals.
About Troy Ament
Troy Ament is Fortinet’s field CISO for healthcare. He brings more than 20 years of experience to Fortinet, transforming information technology and security programs, with 14 years in the healthcare sector as an executive overseeing clinical technology implementations, and serving as the chief information security officer (CISO) at two of the largest integrated health delivery systems in the U.S.