GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

Another Healthcare Hack: How Micro-Segmentation Could Have Helped

Posted by: GreenPages Blog
Read More
All Posts

Another Healthcare Hack: How Micro-Segmentation Could Have Helped

Healthcare-related data breaches and hacks are on track to become more dangerous than ever this year. Ransomware and malware are simply becoming more advanced and difficult to fight. Just the other week, radiation science and services giant Landauer was the latest victim of a cyber attack. “Cyber attackers infiltrated a data server operated by IT supplier Landauer, stealing a mix of names, dates of birth, radiation doses, and National Insurance numbers of staff who work with X-Rays.” (Danny Palmer, ZDNet) The hackers had compromised the server of Landauer, gaining access to the Velindre NHS Trust internal server and were able to steal the information of thousands of NHS medical professionals. Attacks like this are practically occurring on a weekly basis.

Security is now the topmost priority for most companies, especially in the healthcare industry. Since January, there have been more than 35 hacking-related incidents within healthcare companies that have affected 500 or more individuals. In total, more than 400,000 people have had their data stolen since January 1st of 2017. Fortunately, advanced technology approaches such as micro-segmentation can dramatically reduce the attack surface. Hackers might compromise one machine or VM but micro-segmentation can stop them from reaching any others. Once a hacker makes it through your firewall, without micro-segmentation he has free reign to jump around wherever he wants inside your data center or virtual environment. He can peruse your machines freely, stealing usernames, passwords, patient information, or financial data.

Consider the infamous Target breach from a few years ago: all it took was one simple phishing email for the hacker to gain access to Target’s internal portal via a third-party vendor. In comparison, this situation would have had an incredibly different ending had the company utilized micro-segmentation. The hacker would have been stopped and isolated at one machine, keeping the breach contained. As a policy, virtual and physical desktops shouldn’t be allowed to communicate with each other. Just like badges or IDs in any healthcare organization, your should have stringent security policies to control the traffic in your IT environment to allow only authorized users to access certain areas based on pre-determined credentials.

With the help of advanced micro-segmentation technologies—VMware NSX for example—hospitals can create security tags assigned to every virtual machine and associated specifically with that VM. They can create policies and assign those policies to those tags, preventing a hacker from gaining access to other areas. Even hospitals that have aging operating systems such as Microsoft 2003 or XP can leverage micro-segmentation in their existing infrastructure. In short, micro-segmentation is an extremely smart approach to ensuring that healthcare organizations can successfully protect sensitive patient data and organizational IP against the increasingly dangerous risk posed by modern security threats.

Talk to your account manager or email us to set up an SDN workshop

By Jake Cryan, Digital Marketing Specialist


Related Posts

Tech News Recap for the Week of 04/05/21

If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 04/05/21!

Tech News Recap for the Week of 03/29/21

If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 03/29/21!

Is It Possible for Security to Coexist with Hybrid Work Post Pandemic?

By Randy Becker, VP & Principal Security Architect The pandemic has brought new and interesting challenges for all of us to deal with and certainly the balance of supporting users working remotely while ensuring security has not been easy. Initially we all had to scramble to figure out ways to allow employees to work from home. Some crazy things happened, including people bringing their desktop PCs home, connecting home PCs (with unsupported operating systems) to corporate VPNs, etc. Now we are seeing discussions about returning to work. What does that look like and what is it called?