The healthcare environment has become a prime target for cybercrime over the past number of years. Attacks on healthcare grew with the Covid-19 pandemic as cybercriminals targeted hospitals, vaccine research companies, and other frontline healthcare provider organizations. With the treasure trove of highly valuable Personally Identifiable Information (PII) and more specific Protected Health Information (PHI) held by healthcare providers and facilities, these environments' targeting will likely continue to grow and become more sophisticated.
XDR is an alternative to the reactive endpoint solutions that provide only single-layered visibility over specific points. Though these layer-specific solutions are quite effective, they deliver a large volume of alerts that require a considerable amount of time in their investigation, response, and management.
The remote workforce that the world is encountering has brought benefits and risks for companies and their employees. Some of the benefits are lower business expenses, employees' ability to work remotely, a more flexible schedule, and many others. Unfortunately, working remotely also comes with risks.
It is likely that after working remotely for over a year, companies around the world will soon expect their employees to return to the office.
After struggling for almost a year, things are finally getting back to normal. Not in the way they were before, but after being under lockdown for so long, people are adapting to this new normal.
What to make of this world driven by technology- is it a benefit or a problem for society? The truth is - both.
Honeywell released a report that over 40% of USB portable storage devices contain at least one risky file and over 25% of those threats could lead to operational issues. In 2018, IBM’s chief information security officer, Shamla Naidoo, released a statement focused on digital hygiene and IBM’s steps towards banning portable storage devices, including USBs. Similarly, the French National Assembly has worked to raise cybersecurity awareness with a similar aim to ban USB sticks during their meetings. With companies, and even countries, working to ban the use of USBs, it can be difficult for enterprises to know what decision they should make when it comes to USB policy. One way or another, enterprises need to address the issue and strictly enforce these policies to avoid catastrophic breaches. Recent security breaches and mishaps with USBs should serve as a warning to enterprises still using them freely and without restrictions.
It’s a common misconception that the only threats to an enterprise’s security come from external actors. Whether intentional or not, 47% of organizational data breaches are the result of internal human error, such as a misplaced device or document. Moreover, some employees present an even larger risk than others. According to recent reports, younger employees are more likely to bypass security protocols that are viewed as an impediment to their productivity. When it comes to onboarding new employees, young or old, enterprises must have proper security awareness & anti-phishing training, in addition to a strong privileged access management solution, to guard against the different types of human error that could create security vulnerabilities.
Mobile applications are becoming an increasingly vulnerable gateway for hackers to steal information from users and businesses alike. From accessing microphones and cameras to finding the location of a user’s device, mobile applications offer hackers access to the personal information of unsuspecting users. Recent reports have shown that over 25 million Android phones are vulnerable to attack via installed applications. As hackers become savvier, the number of mobile application attacks will continue to increase drastically. By implementing proper mobile application security and mobile application vulnerability testing procedures, enterprises can remain safe even as attacks rise.