April 22, 2016 By Cindy Compert 3 min read

Stolen medical records are worth 10 times more than credit card data. That’s because they contain a wealth of information needed to commit fraud, including the filing of false tax returns, obtaining credit, acquiring illegal prescription drugs, making false Medicare/Medicaid claims and committing medical identity fraud.

In fact, 91 percent of health care organizations have suffered a breach that lost patient data in the last 24 months, and 40 percent experienced more than five breaches. These firms are also increasingly targeted for ransomware attacks that can have a devastating impact on operations.

Health Care Needs a Security Immune System

Why does this matter now? The health care industry has become increasingly competitive. Customer acquisition and retention are now critical for success, and patients now have more choices in selecting a provider and health care plan.

The Ponemon Institute’s “2015 Cost of Data Breach Study” revealed that health care has the highest increase in customer loss rates after a breach at 6.1 percent, or three times the rate of retail. Patients are voting with their feet when breaches occur.

Health care as an industry has also traditionally underinvested in security at an average of 3 to 4 percent of IT budget versus a range of 3 to 14 percent in all industries. With new delivery channels including cloud and mobile, new regulations, new sources of information via medical and wearable devices and the use of cognitive computing, information has become much more pervasive, porous and shared. That makes it more difficult to secure.

According to IDC, 65 percent of consumer transactions with health care organizations will be mobile by 2018, requiring health care organizations to develop omnichannel strategies. Additionally, 80 percent of companies in the health care industry will look to leverage the cloud in some way by 2020.

Watch the on-demand webinar: Improving Health Care’s Immunity to Security Threats

Creating a Multilayered Approach

What does this all mean for a health care organization? It means taking a new approach to cybersecurity by creating a security immune system.

Security controls and practices must be designed according to an integrated, multilayered approach. Effective cybersecurity needs to be set up like the body’s immune system: a system of capabilities that work together to protect the entire organism regardless of where the threat is coming from.

The human immune system relies on layers of protection to create a barrier to disease, detect invaders when they get through and then ultimately respond to eliminate the threat. The same can be said for an effective security system, which brings together capabilities to prevent, detect and respond to threats in a continuous, coordinated fashion. It requires:

  • Integrated intelligence: Correlate and analyze siloed information from hundreds of sources to automatically detect and respond to threats.
  • Integrated protection: Enhance security with solutions that interact across domains to provide cohesive, easy-to-manage protection.
  • Integrated research: Incorporate the latest information on vulnerabilities, exploits and malware into intelligent security solutions across domains.
  • Integrated infrastructure: Security is not complete unless you take advantage of a secure infrastructure.
  • Integrated incident response (IR): Firms must not only anticipate incidents, but they must also plan for them. As incident responders know all too well, solid IR begins long before an event and continues long after an incident is resolved. It’s a continuous cycle of preparation, assessment, management and mitigation.

Applying the Right Capabilities

There is a logic to all these capabilities, which fall into major security domains: data, applications, network, endpoint, mobile, advanced fraud and identity and access. Security intelligence is the brain, the central nervous system that aggregates and integrates the data and infuses analytics, cognitive learning and machine learning into domains to make them stronger. It also taps into the expertise of the team.

Think of these as domains of capabilities. Each domain has a maturity, and with the use of analytics, each can start to become truly secure. It is critically important that capabilities work together. This doesn’t mean they all have to come from one vendor, but the cybercriminals will find the spaces between the domains. The gaps are how attackers get through.

At IBM, we think seeing is believing. Watch our on-demand webinar “Improving Health Care’s Immunity to Security Threats” to learn more about our approach to security and see how a security immune system can help protect your organization.

More from Healthcare

Cost of a data breach 2023: Healthcare industry impacts

3 min read - Data breaches are becoming more costly across all industries, with healthcare in the lead. The 2023 Cost of a Data Breach Report analyzes data collected from March 2022 to March 2023. Healthcare remains a top target for online criminal groups. These data breach costs are the highest of any industry and have increased for the 13th consecutive year. Healthcare is a highly regulated industry that the U.S. government considers critical infrastructure. As such, recent federal privacy standards, security standards and…

Cyberattackers target the Latin American health care sector

3 min read - Cyberattacks on the healthcare sector are a growing threat in Latin America, and the large amount of confidential data these organizations handle makes these attacks a top concern. The value of healthcare data in the illegal market, such as the personal, medical and financial information of patients and healthcare companies, creates an appealing target for threat actors. This can have serious consequences for the privacy and information security of these organizations. Cyberattacks could lead to reputational risks, interruption of operations,…

Increasingly sophisticated cyberattacks target healthcare

4 min read - It’s rare to see 100% agreement on a survey. But Porter Research found consensus from business leaders across the provider, payer and pharmaceutical/life sciences industries. Every single person agreed that “growing hacker sophistication” is the primary driver behind the increase in ransomware attacks. In response to the findings, the American Hospital Association told Porter Research, “Not only are cyber criminals more organized than they were in the past, but they are often more skilled and sophisticated.” Although not unanimous, the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today