Healthcare organizations are popular targets for today’s opportunistic cybercriminals, and medical security professionals are constantly updating security tactics to stay ahead. To protect life-saving systems and infrastructure, as well as sensitive patient data, it’s essential to understand the kinds of threats that are out there, as well as the offensive and defensive measures that can prevent them.
Section 1: The Evolving Healthcare Compliance and Threat Landscape
Healthcare has always been a highly guarded industry, and it’s got the compliance landscape to prove it. Throughout the world, there has been an increasing focus on data privacy and patient protection over the past decade and a half, with updates to major healthcare frameworks like HIPAA being made as recently as this year.
With mounting scrutiny from regulatory bodies like the US Department of Health and Human Services (HHS) and its Office for Civil Rights (OCR), it is more imperative than ever that healthcare providers and medical facilities ensure their processes are above board where compliance is concerned. When you look at the threats to the healthcare landscape, you’ll see why.
A recent House Energy and Commerce Committee Subcommittee on Oversight hearing was held to address the issue of threats to the healthcare industry. When asked why healthcare has become a particular target for attackers, as opposed to lucrative industries like finance, Mr. Garcia, one of the interviewed cybersecurity expert panelists, stated:
In the face of these large, external currents, rising threats to electronic health records (EHRs) and connected medical devices make compliance even trickier – and crucial. This means that internal policies that were once suitable for securing protected health information (PHI) may fall short in the face of these new dangers, leaving organizations not only vulnerable, but noncompliant. Healthcare groups are being forced to reassess their security strategies and compliance commitments as a result.
Pro Tip: Know the Consequences of Paying the Ransom
You hear it all the time: never pay the ransom. This may go without saying in some industries, but it can be especially difficult in the healthcare sector when human lives are on the line. Whether or not your organization decides to pay up is a personal choice, but every medical facility should understand the consequences either way.
Paying the ransom in a ransomware attack sends the signal that you are willing to do anything to retrieve stolen data, and that a similar tactic would work again. While being willing to sacrifice to protect patient privacy is admirable, noble, and even beneficial PR in front of customers, it can also backfire. A 2024 report notes that over 75% of healthcare organizations admitted to paying out over $500,000 in ransom demands as the result of cyberattacks.
Unfortunately, 80% of companies that paid the ransom were hit again with another ransomware attack, and even after paying, over one in three were not given working decryption keys to recover their data.
Section 2: Key Healthcare Compliance Frameworks and Standards
Currently, some of the major US healthcare compliance requirements on the books include:
The HIPAA Security Rule
The Omnibus Law
The HITECH Act
21st Century Cures Act
NIST Cybersecurity Framework (CSF)
See How Hospitals Stay Secure
Section 3: Common Pitfalls That Jeopardize Compliance in Healthcare
With so many varied requirements, it is easy to see how organizations can inadvertently make compliance errors. However, fines and penalties are levied regardless of intent, and reputational damage almost always follows. Here are some common ways in which healthcare organizations can fail to meet compliance standards:
Vulnerable medical devices and misconfigured IoT endpoints
Healthcare IT News reports that among healthcare organizations, “Endpoint misconfigurations emerged as a significant risk, with 35% of systems unable to quarantine malicious files, increasing susceptibility to ransomware encryption.” In addition, recent research reveals that 63% of vulnerabilities found in CISA’s Known Exploited Vulnerabilities (KEV) Catalogue “can be found on healthcare networks” and that nearly a quarter (23%) of medical devices are operating with at least one known exploited vulnerability.
Lack of centralized log management across EHR systems
Collecting log data and storing it in a central location gives security teams visibility over security incidents, compliance violations, and other impactful events that occur within an organization’s network. Neglecting to put a centralized log management system in place for EHR records could leave many important electronic health files in the lurch, out of the line of sight of SOCs, and vulnerable to outside attack.
Inadequate access control and user provisioning
In 2024, OCR research revealed that 25% of healthcare breaches were “due to individuals without proper authorization accessing sensitive healthcare information or these data being disclosed to individuals without proper protocols.” Speaking of the EMEA region specifically, the 2024 Verizon Data Breach Investigations Report noted that “virtually half of the breaches (49%) in EMEA are initiated internally, suggesting high incidences of privilege misuse...”.
Unfortunately, many healthcare compliance breaches are caused by friendly fire, and often by employees accessing data that they don’t know they shouldn’t be accessing. Without the proper security protocols in place, there is nothing to stop them.
Failure to detect or respond to insider threats
Research reveals that eight healthcare industry data breaches, impacting a total of 98,936 patients, were due to possible insider threats. Detecting these subtle, malicious behavioral patterns can be like finding a needle in a digital haystack.
Pro Tip: Any Industry Could be Handling Healthcare Data
More and more often, even non-healthcare-related entities find themselves handling electronic health data, from fitness apps that track your heart rate to pop-psychology sites that ask you questions about your mental health. While not a healthcare organization, the Olympic Games and related affiliates are trusted with athlete health information, and now even the workers themselves are not exempt. As privacy and security culture make their way into the mainstream, the need for non-healthcare-related entities to still comply with PHI privacy laws will only increase – as will the opportunity for error.
Section 4: Five Key Security Controls to Maintain Compliance
Section 5: How Fortra Can Help
Fortra’s cybersecurity solutions for healthcare support healthcare compliance and cybersecurity with multiple layers of protection, including offensive and defensive security tactics.
Offensive Security Tools
Fortra offers offensive security tools to empower your penetration testers and red teamers to do thorough analysis and attack simulation. Core Impact penetration testing software, for example, provides a host of certified exploits, a centralized toolset, and an automated walk-through that even inexperienced practitioners can follow to test for ransomware inroads and exploitable vulnerabilities. Red team tools Cobalt Strike and OST give red teamers the ability to conduct advanced adversary simulation using the latest in evasive tactics.
These simulations will highlight areas of weakness in the organization’s software, hardware or physical infrastructure so that blue teams can shore up weaknesses before attackers can exploit them. Core Impact, Cobalt Strike, and OST are interoperable tools, allowing session passing and tunneling capabilities, among others, to create more advanced, streamlined engagements.
Core Impact
Cobalt Strike
OST
Monitoring, VM and other Defensive solutions
Fortra helps healthcare organizations detect unauthorized changes and enforce security configurations that align with HIPAA, HITECH, and other compliance frameworks. Healthcare providers must introduce new IT changes into their networks to serve patients best. The right change management software can help keep security risks to a minimum while organizations make necessary adjustments to the technicalities of patient care.
Tools like Fortra’s Tripwire Enterprise and Fortra’s Digital Guardian support visibility into sensitive data usage and potential misuse, helping maintain audit trails and prevent data leakage. With Tripwire Enterprise, check the configuration and integrity of not only your files, but your servers, endpoints, operating systems, medical IoT devices, and more. Know who changed what (and when) as you keep a clean audit trail of all changes made to in-network systems.
Leveraging Digital Guardian, you can locate sensitive information across your healthcare system’s disparate assets and get full visibility into all hardware, software, data movement, data storage, and data creation within your environment. Fortra Vulnerability Management assesses your healthcare organization’s security posture, providing analysis and prioritization of your highest risk weaknesses, so you can address them swiftly.
On demand scanning and reports show the impact of remediation instantly and help your security find and fix vulnerabilities in your infrastructure before attackers do. Where email is concerned, Fortra’s email security and anti-phishing tools go above and beyond searching for signature-based malware threats alone; its Integrated Cloud Email Security (ICES) solution spots hard-to-catch ploys like social engineering scams and Business Email Compromise (BEC) attacks.
Fortra VM
Fortra solutions offer reporting features that make it easier to demonstrate continuous compliance during audits. Show hospital executives and auditors alike the “big picture” as technical security metrics are displayed in terms of business objectives. Plus, get all stakeholders on the same page – security teams, medical managers and staff, and top healthcare leaders – with reports and dashboards accessible from any device, at anytime, anywhere.
Conclusion
Fortra’s wide-ranging security portfolio helps overwhelmed healthcare security professionals protect their PHI and ePHI and stay ahead of today’s aggressive industry-targeted threats. By allowing Fortra to do what it does best: provide the right suite of solutions to make compliance as streamlined as possible, healthcare providers can be free to do what they do best: innovate the technology systems that save human lives.