Outlook 2018: Use Training, Patching to Counter More Sophisticated Cyberthreats

Expect more phishing, more ransomware and more cyberattacks using the internet-of-things in 2018, as hackers use increasingly sophisticated tools and techniques to steal and sell valuable medical records or to deny health care entities access to their own systems for ransom money.

Humans remain the weakest link in the security chain, security experts tell RPP in a series of interviews, and organizations’ HIPAA security personnel should focus on training to ward off threats in 2018. They also need to focus on their business associates to make certain they are also complying. Neglected patches for known security vulnerabilities and poor security in internet-of-things devices also represent growing threats, experts say.

David Harlow, principal in the health care law and consulting firm The Harlow Group LLC, anticipates similar attacks to what was seen in 2017. “Most hackers rely on a combination of technical vulnerabilities that are exacerbated by human factors,” Harlow tells RPP. “For example, the largest breach of the past year, the Equifax hack, was made possible by the failure of staff to apply a patch released by a software vendor to address a known vulnerability.”

Phishing and ransomware attacks will continue to exploit humans, who are “the weakest link in our cybersecurity infrastructure,” Harlow says. “The coming year is likely to bring new and different versions of the same-old, same-old—the hackers are becoming more and more sophisticated, spoofing URLs, for example, in a manner that is entirely indistinguishable from the real thing by anyone but the most sophisticated users.”

Roger Shindell, president and CEO of Carosh Compliance Solutions, tells RPP that 2018 will see an increase in ransomware. The health care industry will continue to see more of a threat than other industries due to the value of medical information on the black market, he says.

This document is only available to subscribers. Please log in or purchase access.


Would you like to read this entire article?

If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

* required field