Two-thirds of UK healthcare organisations breached last year
Nearly three years after WannaCry laid waste to IT systems across the NHS, an apparent institutional failure to address lax cyber security measures has been highlighted by a new report from Clearswift, which has claimed that 67% of UK healthcare organisations experienced some kind of cyber security incident during 2019.
Clearswift – which is owned by US automation and security specialists HelpSystems – enlisted Vanson Bourne to survey IT leaders and decision makers in healthcare organisations, and found that 48% of all incidents were virus or malware infections that occurred through the use of uncleared and unsecured third party devices, such as internet of things (IoT) enabled equipment, or USB thumb drives.
Other factors in attacks on the health sector included the sharing of information with unauthorised recipients (39%), users failing to follow protocol or data protection policies (37%), and users clicking on malicious links in emails or on social media (28%), suggesting that user education in the industry is not being taken seriously either.
“The healthcare sector holds important patient data, so it’s alarming to see such high numbers of security incidents occurring in the industry,” said Alyn Hockey, Clearswift’s vice-president of product management.
“The healthcare sector needs to securely share data across departments and organisations to facilitate excellent patient care.
“With the proliferation of third-party devices in this process, it’s more important than ever that the industry bolsters its cyber security efforts to reduce the risk of everything from unwanted data loss to malicious attacks and focusses on keeping patient data safe and secure.”
Clearswift said the number of incidents also reflected serious constraints on IT spending capabilities in the healthcare sector, with under a quarter of respondents saying that they had “adequate” levels of budget allocated to security.
There was also a disparity between where decision makers were spending what little cash they had, and where it might be more usefully deployed. For example, 46% of respondents said they were investing in database security, but just 26% said they were paying into frontline endpoint security.
“Understanding what is threatening the safety of the critical data you hold is the first step in mitigating the risk,” said Hockey. “Therefore, cyber security strategies across healthcare organisations need to rapidly evolve to account for new threats against the sector.”
“While many aspects of staying secure come from keeping employees trained to recognise threats, technology should play a key role in helping reduce the risks that come with innovation. It’s not a case of ‘if’, but ‘when’ an incident occurs so investment is required to ensure healthcare organisations are prepared for any type of threat.”
However, said Clearswift, there were also encouraging signs that the healthcare industry might be starting to turn things around – and while too many organisations were still finding themselves attacked – boards were sitting up and taking notice, at least in part thanks to WannaCry, which 33% said had had a big impact on board-level involvement and spend in security. Others cited the American Medical Collection Agency (Amca) data breach of June 2019, which saw the details of millions of Americans leaked.
Previous research conducted by Clearswift has produced similar statistics relating to cyber attack volumes – whether successful or not – in other verticals.
Last year it revealed that 70% of UK companies in the financial sector had suffered some kind of security incident, and nearly half of these were caused by employee failure to follow their organisation’s security protocols or data protection policies.
Industry: Cyber Security
- Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL
- United Kingdom
Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL Outside IR35 Client facing (Remote UK) with occasional site visit. Must have current Cyber incident response / management experience. Both proactive planning, escalation, coordination and coordinating response. Stakeholder engagement both technical and non technical teams. Prior experience with Technical incident / digital forensics / crisis management. Immediate role.
- Tenable Vulnerability Analyst - CONTRACT outside IR35. SC cleared.
- United Kingdom
6 month rolling contract Outside IR35- immediate start. Threat and Vulnerability Analyst. Tenable.sc experience needed. The ability to deploy agent, configure environments, run active and passive scans, produce reports and prioritise remediation activities based on output Current and ACTIVE SC clearance is required
- ForgeRock Consultant
- £600 per day
ForgeRock Consultant required for 6 Month Contract (with potential to extend) Outside IR35, Must be willing to work Europe hours (GMT+1) This is a remote position, Looking for a lead ForgeRock Technical Consultant with strong experience of ForgeRock to lead the next phase of deployment. Good understanding of ForgeRock Directory Services. · Responsible for the design and implementation of ForgeRock stack · Install and configure ForgeRock stack to meet customer authentication and authorization requirements, · Design and implement OAuth2 protocol using ForgeRock OpenAM, · Design and develop OpenAM custom authentication modules, · Configure ForgeRock stack to protect RESTful API, · Troubleshoot and support ForgeRock IAM stack. · Designed and developed Restful APIs, This is a great project with an expanding ForgeRock Partner, where you will get to work on some high level deployment projects We are looking for someone with the above experience, who is comfortable hitting the ground running and taking on the reins mid project
- Network Security Engineer
- €550 a day
German- based contract opportunity This is an onsite based position, we would need the Network Security engineer to be able to work on the client site 5 days a week Seeking an experienced Network Security Engineer for a leading technology company. Strong expertise in firewall/IPS solutions, proxy solutions, and certificate management is required. Good hands-on experience in networking and web-related technologies necessary. Strong problem-solving skills and the ability to work under pressure are essential. we are looking for a Network Security Engineer with the following experience: · Expertise in Administration, Management & Troubleshooting of Firewall / IPS solutions / Proxy solutions/Certificate Management Solutions · Good Hands-on Experience on security devices (PaloAlto/ /McAfee Proxy/CISCO ISE/Certificate Management) · Good Hands-on Experience in Networking with skills of switching, routing & wireless Technologies · Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocol · Configuration of NAT / PAT, firewall policies, profiling, objects, AD-Integration, backup – restore · Knowledge of Subnetting TCP/IP Communication, VLSM Configuration of VLAN VTP · Configuration of Routing Protocols e.g. RIPv1 & v2, OSPF, EIGRP, BGP Knowledge of standard and extended ACL 12 month contract