Who’s Responsible for Securing IoT Medical Devices?
“Long-term industry efforts are essential in closing the gaps in the device ecosystem,” says Chris Morales, head of security analytics at Vectra.
Flexa Launches Crypto-Based Payment App
Cryptocurrencies are the root of the payment platform rather than actual currency, explained Chris Morales, head of security analytics at Vectra. They are not stable and are traded like assets as the price has wild fluctuations in value every day.
How Medical Device Companies Can Safeguard Vital IP
The economic damage of IP theft to U.S. companies is estimated at over $300 billion per year, according to an IP Commission Report, issued by the Commission on the Theft of American Intellectual Property.
The Security of Connected Medical Devices
"Lots of IoT devices, coupled with the free flow of patient data in the network, create massive internal blind spots about what's happening," said Chris Morales, head of security analytics at Vectra.
Ransomware affects all industries. Vectra collected data from multiple companies in nine sectors between January 2018 and February 2019.
DHS Releases Analysis of ELECTRICFISH Malware
“This type of connection, using a custom protocol instead of existing protocols like HTTP, is what we refer to as hidden tunnels and is used for command and control of remote systems, as well as for data exfiltration,” said Chris Morales, head of security analytics at Vectra.
How to Meet the Growing Demand for Cybersecurity Professionals
According to Mike Banic, Vice President of Marketing at Vectra, “One of the things we find in Ireland is there are a lot of engineers that have great cloud skill sets,” he says. “They have cyber experience and the platform-level experience we need for cloud. Having those skills allows us to have the team take ownership of a complete product.”
Can Data Inventory Reduce Medical Device Risk to Patient Safety?
Medical devices and legacy systems are some of the healthcare sector’s most vulnerable areas when it comes to keeping patient data and networks secure, according to a recent report from Vectra that analyzed recent cyber incidents across the industry.
Ransomware hit from top spot as cyber security danger
The findings come from the Vectra 2019 Spotlight Report on Healthcare, which highlighted the vulnerability of the IoT devices. Connected gadgets have now become a target for malicious online operators seeking to disrupt organisations or get their hands on private personal information.
Ransomware no longer biggest cyber security threat, report finds
The Vectra 2019 Spotlight Report on Healthcare identified Internet of Things (IoT) devices; unpartitioned networks; and reliance on out-dated systems, as weakness most likely to be exploited by cybercriminals looking to steal personal information and disrupt organizations.
Tech firms race to get a camera in every home: Here’s how to protect your privacy
Matt Walmsley, EMEA Director at cybersecurity business Vectra, said: “Don’t just click through and accept the T&Cs without reading them. Look for options to manage the recording including limiting usage, sharing, and deletion, particularly if stored externally out in the cloud.”
Lack of AI Security Puts IoT Medical Devices in Danger of Cyberattacks
“Healthcare organizations struggle with managing legacy systems and medical devices that traditionally have weak security controls, yet both provide critical access to patient health information,” said Chris Morales, head of security analytics at Vectra.
Healthcare Industry at Risk Due to IoT Devices and Human Error
"Healthcare IT security teams are often kept in the dark and behind the curve when it comes to changes in infrastructure,” says Chris Morales, Head of Security Analytics, Vectra.
Cybersecurity Experts Share Tips and Insights for World Password Day
“Many websites offer easy to remember questions with information such as mother’s maiden name or favorite pets names to reset a password. This is the kind of data that could be easily attained using social media,” says Chris Morales, head of security analytics at Vectra.
Everything Is Best When It Comes to Cybersecurity Best Practices
Cybersecurity best practices are often driven by the vendor community within information security, but they are nothing more than a set of methodologies and processes based on the theory of what will allow a company to stop or contain a breach, according to Chris Morales, head of security analytics at Vectra.
Do Not Use: Top 15 'Worst Passwords'
"I understand the intent of providing a black list of passwords users should not use. However, I think the larger problem is that passwords are a poor choice of authentication and we are stuck with it," says Chris Morales, head of security analytics at Vectra.
Report Says IoT Proliferation and Insufficient Access Controls Exposing Healthcare Systems to Data Theft
“Healthcare organizations struggle with managing legacy systems and medical devices that traditionally have weak security controls, yet both provide critical access to patient health information,” says Chris Morales, head of security analytics at Vectra.
Human Error, Not Ransomware, Health Care’s Biggest Security Threat
According to the Vectra report, the most common method attackers use to hide exfiltration behaviors in healthcare networks is hidden DNS tunnels.
Legacy Systems, Devices Emerge as Security ‘Weak Links’
Vectra’s 2019 Spotlight Report on Healthcare is based on observations and data from the 2019 RSA Conference Edition of the Attacker Behavior Industry Report, which reveals behaviors and trends in networks from a sample of 354 opt-in enterprise organizations in healthcare and eight other industries.
Legacy Systems, Employee Error Leave Hospitals, Devices Vulnerable to Cyberattacks
Security risks associated with the healthcare internet of things (IoT) are exacerbated by unpartitioned networks, inadequate access controls and reliance on legacy systems, according to the Vectra 2019 Spotlight Report on Healthcare.
Cyber-security: how the health sector is attacked
In its "Spotlight" report on IT threats targeting the health sector,"' Vectra confirms the exposure of the medical ecosystem to cyber attacks.
A report from cybersecurity company Vectra suggests that human error poses a bigger cyber risk than hacking in health care, including when people accidentally send health information to the wrong recipient.
Legacy Systems, Employee Error Leave Hospitals, Devices Vulnerable to Cyberattacks
Errors such as improper handling and storage of patient files, often due to poor organizational policies and procedures, leave IT systems and connected medical devices vulnerable to outside attack and manipulation, new research from Vectra warns.
Hospitals Can Leverage AI to Combat Cyberattacks, Report Finds
The Vectra healthcare report explored the behaviors and trends from 354 opt-in enterprise organizations in healthcare and eight other industries. From July to December 2018, Vectra monitored network traffic and collected metadata from more than 3 million workloads and devices.
Cyber-security: how the health sector is attacked
According to Vectra, the number of vulnerabilities has increased significantly in the health sector. At issue: the presence of many connected objects (IoT) and weak access controls.
Vectra: How do cyber criminals hack health organizations?
Vectra, a leading player in the detection of cyber attacks and the neutralization of artificial intelligence threats, releases its "Spotlight" report on IT threats targeting the health sector.
IoT News of the Week for April 26, 2019
This report from security firm Vectra takes a look at the expanding attack surface in hospitals, but it also pulls in a lot of charts and data about attacks and the types of threats facing other industries as the embed more technology into their operations, and as more of them become targets for ransomware or hacks.
The hunter's sleep gives birth to monsters
"In general, the way in which one evaluates one's own security concepts is much closer to the actual behavior of the attackers," reports Tobias Schubert, Senior Security Engineer at Vectra.
Report: AI, Machine Learning Key to Securing Healthcare’s Vulnerable Attack Surfaces
Healthcare organizations’ vulnerable attack surfaces can be better secured by utilizing machine learning and artificial intelligence (AI) to detect hidden threat behaviors, according to a new report from IT security company Vectra.
Connected Devices, Legacy Systems Leave Hospitals Wide Open to Cyber Attack
The study, based on network traffic data monitored by Vectra over a six-month period, found the most prevalent method attackers use to hide command-and-control communications in healthcare networks was hidden HTTPS tunnels.
Regulations, Insider Threat Handicap Healthcare IT Security
"Healthcare is the one industry that doesn't have to worry about the attacker on the outside as much as the attacker on the inside," says Chris Morales, head of security analytics at Vectra.
Healthcare facilities are vulnerable to cyberattacks
"The growth of the medical internet of things is beneficial for the patients. Protecting healthcare systems, however, poses a challenge as security controls on these devices are limited, "notes Brett Walmsley, Chief Technology Officer of the Bolton NHS Foundation Trust.
A vulnerable attack surface exists in healthcare enterprise IT networks
From July through December 2018, the Cognito threat-detection and response platform from Vectra monitored network traffic and collected metadata from more than three million workloads and devices from customer cloud, data center and enterprise environments.
Legacy infrastructures and unmanaged devices top security risks in the healthcare industry
Published in the Vectra 2019 Spotlight Report on Healthcare, these findings underscore the importance of utilizing machine learning and artificial intelligence to detect hidden threat behaviors in enterprise IT networks before cybercriminals have a chance to spy, spread and steal.
Vectra presents research on cybersecurity in healthcare industry
The Cognito platform accelerates network threat detection and response using sophisticated Artificial Intelligence to collect, enrich and store network metadata with the right context to detect, hunt and investigate hidden threats in real time.
How do cybercriminals hack into health organizations
The Spotlight Report on Healthcare is based on observations and data from a broader Vectra report from 354 companies in 8 different industries, including health. This report highlights the behaviors and trends observed in these companies' networks.
IT networks of healthcare facilities have weak points
"Machine learning and AI can help healthcare organizations better secure networks, workloads, and devices. Cross-system vulnerability analysis provides holistic data security, "said Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group.
IoT devices put healthcare networks at risk
"Healthcare organizations struggle with managing legacy systems and medical devices that traditionally have weak security controls, yet both provide critical access to patient health information," says Chris Morales, head of security analytics at Vectra.
Vectra: Healthcare IoT Devices and Unsecured Networks Make Industry a Target for Cyber Attacks
“When you factor in how long it takes to discover a digital breach and a lean security staff in many healthcare providers, it becomes apparent that healthcare needs the awareness of what happens inside their network to quickly know the difference between what is an attack or business as usual,” Chris Morales, head of security analytics at Vectra.
Healthcare Internet of Things Can Expose Networks, Data to Attacks
To conduct the study, Vectra monitored network traffic and collected metadata from its Cognito platform customers. The analysis of the metadata provided a better understanding about attacker behaviors and trends as well as business risks.
Vectra Report Finds Vulnerable Attack Surfaces Exist in Healthcare Enterprise IT Networks
Vectra announced that the proliferation of healthcare internet-of-things (IoT) devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable attack surface that can be exploited by cybercriminals determined to steal personally identifiable information (PII) and protected health information (PHI), in addition to disrupting healthcare delivery processes.
Insider Threats a Top Risk to Healthcare
“Improving visibility into network behavior enables healthcare organizations to manage risk of legacy systems and new technology they embrace,” says Chris Morales, head of security analytics at Vectra.
Vulnerable IT in healthcare
Vectra beobachtete einen Anstieg der internen Auskundschaftung im Gesundheitswesen, zurückzuführen auf interne Darknet-Scans und Scans von Microsoft Server Message Block (SMB)-Accounts.
UK's NCSC Suggests Automatic Blocking of Common Passwords
"Easy to remember phrases are stronger than 12-digit passwords using numbers and characters,” says Chris Morales, head of security analytics at Vectra.
Is Privacy Really iPhone? Researchers Weigh in on Apple’s Targeted Ad Tracking
“IDFA does not identify the device or user, and was a replacement for the much less secure UDID,” explained Chris Morales, head of security analytics at Vectra.
Malware Attack Rains on Weather Channel’s Parade, Disrupts Live Broadcast
“The quick recovery to a malware attack at The Weather Channel is attributed to restoring programming from back-up systems. This highlights the importance of disaster recovery and backup as part of an organization’s risk management strategy,” said Mike Banic, vice president of marketing at Vectra.
Jusqu’où l’intelligence artificielle peut-elle réduire le déficit d’experts en cybersécurité?
Grégory Cardiet, directeur Security Engineering chez Vectra pour la zone EMEA, défend son point de vue : l’IA peut combler une insuffisance technique en augmentant les capacités humaines au-delà des quantités ou des vitesses atteignables par des approches manuelles traditionnelles.
AI at the US Department of Homeland Security – Current Projects
The use of the Cognito platform will allow state and local government bodies as well as 66 federal agencies to monitor for cybersecurity risks to its networks and IT systems continuously.
How Organizations Use Threat Intelligence To Boost Security
What is cyber threat intelligence, and how can organizations leverage it to identify threats and potential malicious activity in advance? Discover the best ways organizations can arm themselves with actionable threat intelligence to block cyber attacks or mitigate their impact.
Mailgun Web Issues from WordPress Plugin Hack
“The best advice I can give at this time is that users need to pay careful attention to the sites they do visit at any given time and be careful what information they are providing,” said Chris Morales, head of security analytics at Vectra.