Armand Kruger, Head of Cyber Security, NEC XON In the wake of recent large-scale ransomware attacks targeting the healthcare sector, the vulnerabilities within the industry are starkly evident. Malicious actors have exploited compromised credentials–a clear and present danger when Healthcare providers' reliance on remote access software creates avenues for adversaries to disguise themselves as legitimate users and gain unauthorised access to critical environments. A prime example is the breach at UnitedHealth, where compromised credentials were abused to infiltrate internet-facing remote access services. South African healthcare organisations aren’t immune and, similarly, need proactive measures to enhance cybersecurity posture and mitigate the risk of ransomware attacks.
Collaborate for Greater Safety These escalating cyber threats necessitate urgent collaborative efforts between government agencies, private organisations, cybersecurity experts, policymakers, and industry leaders. These players must prioritise investments and initiatives aimed at safeguarding patient, provider and insurer data and infrastructure. Implementing a ruthless privileged access model and engaging competent Managed Security Providers (MSPs) with razor-like precision in removing adversaries' access are critical steps in mitigating these risks. Sharing knowledge and lessons learned from past breaches is also vital for proactive threat anticipation and containment. Proactive Measures for Enhancement: There are some critical steps healthcare players can take today to fortify cybersecurity defences. NEC XON employs Continuous Threat Exposure Management (CTEM) to monitor customer environments from the adversary's perspective, promptly resetting compromised credentials and removing internet-facing systems to limit exposure. Our Managed Detection and Response (MDR) team monitors internal anomalies and traces them back to their source, enhancing our ability to counter evolving threats. Here’s a specific list of the tactics NEC XON teams employ in protecting customer systems:
Leave a Reply. |
Archives
September 2024
Tags
All
|
Navigation |
Additional |
© Copyright 2024. All rights reserved.
|
8/5/2024
0 Comments