Multiple factors have led to the surge in hacking attempts and cybersecurity threats to healthcare data in the past year. Medical, scientific, and pharma organizations were targeted by ransomware and fraud schemes for their valuable data and PHI. They were considered more vulnerable to malicious attacks while they rushed to address the health emergency during the pandemic and as more employees worked remotely.

“Healthcare data breaches hit all-time high in 2021, impacting 45M people,” according to Fierce Healthcare

The FBI and other agencies raised the red flag about the increase of cybercrime during the COVID-19 pandemic. And now cybersecurity experts are anticipating a resurgence of attacks targeting healthcare in the coming months.

Vigilance was recommended during the crisis, but we also expect security to be a big concern post-COVID. The pandemic has changed the threat landscape, so how should our security landscape change in response?

Top 4 Cybersecurity Threats Post-Pandemic

Consider the following trends expected to impact the security environment for healthcare organizations when developing your risk management strategy for 2022.

1. Attacks Targeting Vulnerabilities Introduced by Telehealth

When the coronavirus caused a national emergency, the OCR relaxed the enforcement of penalties for HIPAA violations. This allowed doctors and healthcare professionals to use telehealth technology more broadly to communicate remotely with patients and others in the medical field. Telehealth platforms, include those not previously allowed by the HIPAA Security Rule. The unprecedented use of remote devices in the field was further driven by:

  • More healthcare professionals working from home,
  • Patients trying to avoid in-person medical visits and undue exposure to the virus, and
  • The need for mobile clinics and testing facilities to be set up quickly.

This introduced great risk for cybersecurity vulnerabilities. For example, platforms without encryption may have been used to transmit PHI. Staff working remotely may not have used a VPN when accessing sensitive data. As healthcare organizations moved quickly to mitigate the spread of the virus, devices may have been added to the network bypassing some of the regular security protocol.

What can we expect to happen after the pandemic? The boom in telemedicine will likely lead to long-term adoption of this technology. And this larger digital footprint also means there is a larger attack surface. Cyberattacks will continue to target patient data through vulnerabilities created by the use of remote connections, unsecure devices, and videoconferencing platforms. Organizations can no longer be slow in responding to threats; they must assess security at every level of the telehealth environment.

2. Phishing, Ransomware, & Social Engineering Attacks

Healthcare experienced a big wave of phishing and ransomware attacks at the outset of the pandemic. When cases surge or there are developments in treatments, other waves of attempted data breaches are to be expected, such as trying to get healthcare employees to click on malicious links or attachments.

Cybersecurity Ventures has crunched historical cybercrime numbers and predicts that a business will fall victim to a ransomware attack every 11 seconds in 2021. That’s down from every 14 seconds in 2019. The total cost of ransomware will exceed $20 billion globally.”

Social engineering schemes will be another likely method used to trick patients or healthcare staff to divulge sensitive information that can be used to commit billing fraud.

Compliance questions? Get answers!

Book a free 30-minute consultation with a specialist to find your path to compliance. Secure your spot today.

SPEAK TO AN EXPERT

3. Expanding Threat of Cloud Breaches

During the pandemic, companies were quickly moving to the cloud or rushing to expand cloud-based systems. High security is one of the advantages of cloud computing, and that is only expected to improve in the future. Yet, as clients of CSPs, organizations are still a title=”cloud security” href=”/blog/webinar-cloud-basics/”>responsible for configuring and monitoring security controls. In the post-pandemic phase, we believe that there will be more hackers trying to penetrate cloud infrastructures and take advantage of misconfigurations.

4. Breaches Via IoT Devices

As the use of IoT devices expands in the healthcare field, we imagine that they will also become targets of cybersecurity attacks. Remotely controlled devices and home-deployed medical devices aren’t always engineered with the same robust security features as other hardware. Because hackers are opportunists, it’s easy to see why they would set their sights on IoT weaknesses to penetrate networks.

5. DDoS Attacks 

The pandemic cybersecurity concerns currently facing healthcare institutions are dominated by distributed denial of service assaults. DDoS attacks that use volumetric DDoS overload network capacity with large amounts of malicious traffic. These attacks can inflict real damage and cause an infrastructure to collapse by using the bandwidth of the targeted network or the bandwidth between the targeted network and the outside internet. 

Volumetric DDoS attacks are frequently combined with application-layer attacks and shifting tactics by professional hackers. They do this to get around static mitigation technologies and divert attention away from the main purpose, which is Trojan Horse network penetration. Malicious actors can then install malware and steal sensitive patient data or attempt to extort money. 

DDoS attacks often target financial organizations and cloud service providers, but this time saw more healthcare facilities and life science laboratories than ever before. Malicious hackers have aggressively attempted to exploit vulnerabilities in healthcare businesses as they shifted to remote labor during the epidemic. They were more concerned with the emergency scenario than with cybersecurity. 

Successful DDoS attacks have knocked out remote workers for a number of hospitals, hampered internet services used to treat patients, and stifled research. Of course, the healthcare organizations who had to restore service and manage the damage were also hit hard by these accidents. These cases highlight the significance of taking proper security precautions to avoid PHI leaks. 

Protecting Health Information in 2022

As we look forward to a post-pandemic cybersecurity environment, teamwork will be necessary for success. Security professionals throughout the health care industry will need to communicate about threats and create a unified push for greater vigilance.

The medical system continues to be stressed by demand, limited by resources, facilitating remote work and telehealth, and introducing connected devices to the network, so vulnerabilities will arise. We know from experience that malicious attacks strike more often and damage their target with greater success in moments of disorganization. Working together will be crucial to protecting sensitive data.

Every company’s corporate culture should include security and disaster recovery preparation. A cyberattack response strategy, as well as other “war-gaming” exercises, should be included in this planning. In addition to developing a fast reaction plan, intensive personnel training is recommended as a first layer of defense against hacks. Every organization’s cybersecurity posture must be reinforced throughout all functions. Leadership should lead by example, exhibiting a dedication to cybersecurity that sets the tone for the company. 

The chief information security officer (CISO) is rapidly taking on a more significant role in some organizations, to the point that the CISO’s role is now on par with that of the Chief Information Officer (CIO). In certain firms, the post of digital process officer or cloud technology officer may be merged with the CIO, BCP, and other functions into a unified role of digital process officer or cloud technology officer entrusted with more accountability across the business. 

Related article: Virtual CISOs Are in Hot Demand: Here’s Why. 

Cybersecurity Assurance for Today and Tomorrow

At I.S. Partners, we work hard to stay up to date on the latest security threats and risk management strategies. We can help your healthcare organization to improve its security posture for today, and for the future. Contact our office to find out how to get started.

About The Author

Get started

Get a quote today!

Fill out the form to schedule a free, 30-minute consultation with a senior-level compliance expert today!

Analysis of your compliance needs
Timeline, cost, and pricing breakdown
A strategy to keep pace with evolving regulations

Great companies think alike.

Join hundreds of other companies that trust I.S. Partners for their compliance, attestation and security needs.

AGM logonolan logodentaquest-4paymedia-logo-1richmond-day-logoxeal logo

Scroll to Top