Five Steps to Fend Off Ransomware Attacks in 2022
Monday, 13 December 2021
SECTOR UPDATE - ThycoticCentrify No-one needs reminding which New Zealand healthcare providers have been disrupted by ransomware attacks this year in order to take the threat seriously.
With a new phase of the global pandemic, the opening of international borders in 2022, and dangerous new trends like ransomware-as-a-service, now is the time to review your cybersecurity.
So, what are some practical steps providers can take?
Create a Culture of Education and Awareness The average healthcare worker is not suitably trained in cyber hygiene and best practices, making them easy prey for phishing attacks or social engineering. Training to identify malware-laced emails and other attempts at credential theft can reduce the success rate of attacks, or at least, raise the alarm. By normalising training within the workplace, organisations can help maintain their vigilance.
Patch Regularly and Upgrade Legacy Systems Many healthcare organisations use outdated operating systems or firmware on systems and medical devices, leaving the door wide open for bad actors. Healthcare facilities can minimise risk by regularly patching all connected devices when updates are available and implementing the latest version of all operating systems.
Incorporate a Robust Privileged Access Solution With a comprehensive system for monitoring and controlling privileged access credentials, organisations can significantly lower the success rate and risks of ransomware attacks. If attackers gain initial access to a network, they begin searching for paths to escalate privileges to spread the attack. Privileged access management tools can slow that spread and keep ransomware contained at its inception point.
Stronger Passwords and Multi-Factor Authentication Simple passwords are an incredibly low-tech solution to risk mitigation, and present the easiest method of compromising networks. Organisations must ensure their networks are protected with solutions that help move passwords into the background, such as privileged access security or password manager solutions. Subsequently, if a password is cracked, brute-forced, or sprayed, multi-factor authentication can still block unauthorised access.
Preparing an Effective Incident Response Plan To avoid having to go into emergency recovery mode during an attack, healthcare organisations should methodically plan and prepare for cyber incidents to minimise damage, speed recovery and reduce incident costs. It’s critical to not only have an incident response plan, but also to be “incident-response ready”, which means that the plan is periodically tested like a fire drill.
For a free Cyber Security Incident Response Plan Template, please visit: https://thycotic.com/solutions/free-it-tools/free-privileged-account-incident-response-policy-template/.
Author: Joseph Carson, Chief Security Scientist & Advisory CISO, ThycoticCentrify

Source: ThycoticCentrify media release
Sector updates are provided by organisations to eHealthNews.nz and have not necessarily been edited or checked for accuracy. Any queries should be directed to the organisation issuing the release.
Do you have an item to add to sector updates?
Email your information to us at updates@hinz.org.nz Return to eHealthNews.nz home page
|