More so than in any other industry, the recent WannaCry attack caused health care organizations to rethink processes for keeping systems current and secure. Although Microsoft patched the very vulnerabilities WannaCry exploited over three months ago, many organizations are still struggling to find and patch relevant computers and systems.

The Hidden Complexities of Endpoint Hygiene

According to the Ponemon Institute’s “Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data,” 79 percent of health care organizations suffered from two or more data breaches in the past two years. This number is even more alarming when you consider that cyberattacks against health care organizations could literally put lives at risk. When a hospital’s systems are compromised, patients suffer along with the organization experiencing the breach.

In today’s data-reliant environment, if recovery times to these breaches are being measured in days or even hours, the damage can be catastrophic. The idea of employing basic endpoint hygiene, then, seems logical. So why has WannaCry been so damaging? The answer may lie in the hidden complexities of effective patch management.

Simplifying Patch Management

Most endpoint tools are insufficient to address these kinds of ransomware attacks because they lack visibility and exhibit sporadic endpoint hygiene. Fortunately, there are ways to tackle these complications.

IBM BigFix simplifies patch management with a comprehensive solution built for highly distributed, heterogeneous environments, including low-speed networks and internet-facing computers. BigFix can help organizations see, change, enforce and report on patch compliance status in real time, on a global scale and through a single console.

More from Endpoint

Self-Checkout This Discord C2

This post was made possible through the contributions of James Kainth, Joseph Lozowski, and Philip Pedersen. In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in Europe, IBM Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel built upon Discord channel messages. Discord is a chat, voice, and video service enabling users to join and create communities associated with their interests. While Discord and its related software…

3 Reasons to Make EDR Part of Your Incident Response Plan

As threat actors grow in number, the frequency of attacks witnessed globally will continue to rise exponentially. The numerous cases headlining the news today demonstrate that no organization is immune from the risks of a breach. What is an Incident Response Plan? Incident response (IR) refers to an organization’s approach, processes and technologies to detect and respond to cyber breaches. An IR plan specifies how cyberattacks should be identified, contained and remediated. It enables organizations to act quickly and effectively…

Deploying Security Automation to Your Endpoints

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more pressing issue. This enormous influx of data will invariably affect security teams. Faced with an enormous amount of data to sift through, analysts are feeling the crunch. Subsequently, alert fatigue is already a problem for analysts overwhelmed with security tasks. With the continued shortage of qualified staff, organizations are looking for automation to…

Threat Management and Unified Endpoint Management

The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years of disruption. Air travel is a mess. And all businesses have seen a spike in cyberattacks. Cyber threats increased by 81% while COVID-19 was at its peak, with 79% of all organizations experiencing a loss of business operations during that time. The risk of cyberattacks increased so much that the…