"The low Social Engineering scores among a multitude of healthcare organizations show that security awareness and employee training are likely not sufficient," said Alex Heid, Chief Research Officer at SecurityScorecard. "Security is only as strong as the weakest link, and employees are often the lowest-hanging fruit when it comes to phishing, spear phishing, and other Social Engineering attacks. For a hacker, it only takes one piece of information such as learning the email structure of an organization to exploit an employee into divulging sensitive information or providing an access point into that organization's network."
Another risk is the array of devices with wireless capabilities such as Internet of Things (IoT) devices, wireless medical devices and tablets, which have paved the way for medical advances benefiting hospitals and patients. However, their speedy delivery and implementation has resulted in subpar security setups.
"As long as these IoT devices are manufactured with poor security standards, the vulnerability doesn't only lie within the devices themselves, but they also pose a risk to any hospital, treatment center, or individual using the device. If a connected device is hacked into, the device can be forced to malfunction or it can be used as a pathway to reach an organization's primary network," continued Mr. Heid.
Among the report's key findings are:
- Over 75% of the entire healthcare industry has been infected with malware over the last year
- 96% of all ransomware targeted medical treatment centers
- Healthcare manufacturing nearly reaches a 90% malware infection rate
- 63% of the 27 Biggest US Hospitals have a C or lower in Patching Cadence, which measures an organization's ability to implement security software patches in a timely fashion
- Healthcare has the 5th highest count of ransomware among all industries
- Over 50% of the healthcare industry has a Network Security score of a C or lower
- Past-breached healthcare companies still have 242% as many low scores in Social Engineering compared to non-breached companies
Ransomware and breaches are affecting the healthcare industry at an increasingly alarming rate with 22 major public breaches occurring since August 2015. Earlier this year, Hollywood Presbyterian Medical Center paid $17,000 as a result of ransomware after losing access to patient records for 10 days. In March 2016, 21st Century Oncology struggling with DNS Health, Network Security and Patching Cadence suffered a data breach that led to a loss of 2.2M patient records and a $57M class-action lawsuit. Overall, breached healthcare companies still struggle with security post-breach, according to the report.
The 2016 Healthcare Industry Cybersecurity Report identifies other major healthcare data breaches between August 2015 and August 2016. The conclusions and rankings featured in the report are based on data derived from SecurityScorecard's patented security rating platform. For more information about these findings, download the full report.
SecurityScorecard provides the most accurate rating of security risk for any organization worldwide. The proprietary SaaS platform helps enterprises gain operational command of the security posture for themselves and across all of their partners, and vendors. It provides continuous, non-intrusive monitoring for any organization including third and fourth parties. The platform offers a breadth and depth of critical data points not available from any other service provider including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering and Leaked Information. To receive a free SecurityScorecard assessment and consultation for your business, visit instant.securityscorecard.com.
To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/report-reveals-healthcare-industry-lacking-in-basic-security-awareness-among-staff-putting-entire-medical-infrastructure-at-risk-300352485.html