The attackers have become more business-oriented in
that the focus has moved from street credibility to financial gain. This is
very evident when there is a breach involved and the attackers sell patient
data, encrypts the enterprise with ransomware, or otherwise extort money from
the victim. One area hit especially significantly has been the medical field.
With the medical patient information and personal identifiable information,
this was a likely target.
To
avoid issues in your enterprise, medical or otherwise, there are several action
to take. One action to take would be to review the network for where
confidential data is located. This is not only employee information, but also
proprietary data on business assets and patients, along with their credit card
numbers. These areas should be examined periodically along with the logs. These
areas should be accessed only by the appropriate parties, applying the
principle of least privilege.
With
any business, there would be vendor contracts. When the renewal periods would
come along, if not already included, the contracts should include the vendor
shall comply with your data security and incident response policy, or provide
you with their policy for your review and acceptance. Your enterprise is only
as strong and robust as the weakest link. If this is an external partner and you
have no idea of their security or their stance on reporting breaches, there may
be an issue for you in the future.
Miel, LLC
Infosec Managed Services & Consulting
810-701-5511
charlesparkerii@gmail.com
It is not about winning or losing, but
reorienting yourself to the real problem-managing the risk across the
enterprise.