{"id":17712,"date":"2017-08-22T09:00:58","date_gmt":"2017-08-22T07:00:58","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=17712"},"modified":"2020-04-09T21:32:54","modified_gmt":"2020-04-09T19:32:54","slug":"caring-for-healthcare","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/caring-for-healthcare\/17712\/","title":{"rendered":"Caring for healthcare"},"content":{"rendered":"<p>Since the first Geneva Convention was signed, medical workers have been granted special status and hospitals have been recognized as neutral territory. In the future, we will probably need some kind of online counterpart; healthcare companies suffer from cyberattacks no less than other targets do. The big difference is that in the case of public health companies, what\u2019s at stake is not only business, but also human health.<\/p>\n<p>However, even if such a convention comes into force, it will not rid medical companies of the necessity of providing full-fledged protection against cyberthreats. Quite often, malefactors launch \u201cmass destruction\u201d attacks, and as much as they would like to affect the way the victims are chosen, altering the selection isn\u2019t possible.<\/p>\n<p>For example, take <a href=\"https:\/\/securelist.com\/a-kings-ransom-it-is-not\/79057\/\" target=\"_blank\" rel=\"noopener\">a couple of recent epidemics<\/a>, WannaCry and ExPetr. At first glance, both seemed to be encrypting attacks, and both affected a vast number of healthcare enterprises.<\/p>\n<p>The first, the notorious WannaCry, launched on May 12, 2017. During the Trojan\u2019s first days, more than 200,000 computers fell victim. Those damaged the most by the attack included organizations participating in the British National Health Service (NHS). Clinics <a href=\"http:\/\/www.bbc.com\/news\/health-39904851\" target=\"_blank\" rel=\"noopener nofollow\">across both England and Scotland<\/a> were affected. Some of them turned off their e-mail services to prevent infection from penetrating local networks. Many clinics even had to ask their clients to turn to other clinics\u2019 services if they didn\u2019t require urgent medical treatment.<\/p>\n<p>The second epidemic, ExPetr, spread through the servers of Ukrainian tax reporting software. Therefore, companies filing their tax documents, including healthcare companies, were at risk. It was not only Ukrainian companies that suffered; a large Russian private medical company, INVITRO, which specializes in laboratory analyses, was among the attack victims as well. The company\u2019s computers were out of order for about five days.<\/p>\n<p>Both epidemics encrypted computer data, and in both cases, decrypting the data was not possible even if companies paid the ransom. But the most important point here is that WannaCry and ExPetr would not be such dreadful threats if the affected companies had a considered cybersecurity strategy in place.<\/p>\n<p>Still, malware epidemics are not the only threat. According to data published by the Identity Theft Resource Center, a noncommercial organization, almost <a href=\"http:\/\/www.idtheftcenter.org\/images\/breach\/2017Breaches\/ITRCBreachStatsReportSummary_2017.pdf\" target=\"_blank\" rel=\"noopener nofollow\">one-fourth of the incidents (24.8%)<\/a> that resulted in personal data theft in the first half of 2017 took place in organizations associated with medicine or healthcare. And of course, this is a field in which personal data often contain highly classified or confidential information.<\/p>\n<p>Kaspersky Lab pays particular attention to healthcare security. We have been collaborating with large medical companies for years already. We know what to protect and, more important, how exactly to protect it. <\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity<\/p>\n","protected":false},"author":2051,"featured_media":17715,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[491,314,2612,2188,420],"class_list":{"0":"post-17712","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cyberthreats","10":"tag-data-breach","11":"tag-health-care","12":"tag-healthcare","13":"tag-ransomware"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/caring-for-healthcare\/17712\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/caring-for-healthcare\/11130\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/caring-for-healthcare\/9217\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/caring-for-healthcare\/4964\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/caring-for-healthcare\/12482\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/caring-for-healthcare\/11666\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/caring-for-healthcare\/11173\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/caring-for-healthcare\/14128\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/caring-for-healthcare\/14134\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/caring-for-healthcare\/18524\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/caring-for-healthcare\/18036\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/caring-for-healthcare\/7268\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/caring-for-healthcare\/8347\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/caring-for-healthcare\/17739\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/health-care\/","name":"health care"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2051"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=17712"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17712\/revisions"}],"predecessor-version":[{"id":27082,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17712\/revisions\/27082"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/17715"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=17712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=17712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=17712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}