No CISO wants to receive the urgent call from the SOC
informing them of an issue. This may take the form of a request to make a
missed vendor payment by month end or there’s a user that keeps on clicking on
the internal phishing campaign emails. The conversation you don’t really want
revolves around the defenses being breached. That is clear and immediate
project.
Capital Health (NJ) had such an occurrence. LockBit 3.0
claims to have compromised the defenses and liberated over 10M files or over
7TB of confidential medical data. The estimated value of this was $250k. The
group did have a bit of their conscious during the attack. They didn’t encrypt
the data which quickly would have interfered with the patient care. It’s
notable though LockBit 3.0 did not post evidence to document this. While this
is the case, there were network outages near the end of December due to a
cybersecurity incident. This is not a new event, as too many medical facilities
have experienced this on some level.
There have been minimal details as to this which is the
standard model. This does highlight the need for this industry to be hyper
vigilant and maintain your info cybersecurity toolsets. Periodically when your
contract is nearing renewal for the tools, scan the other vendors for their
offerings and pricing. Running a PoC and going through the vendor vetting can
take time, but it may be well worth it.
Services
Enterprise and Embedded System Cybersecurity Engineering & Architecture
Red Team Product Pentesting | HW & SW BoMs | CBoM |
Vulnerability Management | Tabletop Exercises (TTX) |
Embedded Systems Architecture | Threat Intelligence |
TARA (Threat Assessment and Remediation Analysis) |
Supply Chain Cybersecurity Review
Reverse Engineering
charles.parker@mielcybersecurity.net 810-701-5511
No comments:
Post a Comment