|By Yoel Knoll||
|January 13, 2017 10:00 AM EST||
The healthcare industry is not immune from today's relentless wave of cyberattacks. Cyber theft of protected health information (PHI) is on the rise, and health organizations understand that 100 percent prevention of attacks is not realistic.
According to Ponemon Institute's Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data report, nearly 90 percent of all healthcare organizations have suffered at least one data breach in the last two years. According to another report, 88 percent of ransomware attacks in Q2 2016 were on healthcare entities.
Traditional prevention and detection techniques are falling short, and healthcare IT professionals are scrambling for new approaches that can more effectively detect attacks and mitigate the growing risks and damage.
Emerging on the scene, deception-based solutions offer a proven way to stop attackers in their tracks. Instead of sitting back and waiting to be the victim, detection technologies empower health organizations to be proactive and take the attack to the attacker. Below is a list of top five reasons why more health IT teams are turning to deception:
1. Malware Agnostic
Today's healthcare networks cyber defenses focus on prevention. But next-generation firewalls, DLPs and antivirus solutions all rely on signatures and reputation to attempt to prevent attacks. But if they don't recognize the threat they can't stop it, resulting in so many data breaches at health organizations that have invested heavily in security. Threats are always changing and health organizations are besieged by new attacks never seen before.
Deception is a defense paradigm that's completely attack-agnostic, with no need to define which "irregular" attack is underway. With the assumption that attackers have already breached the network, deception solutions set traps, lures and fake data to detect and stop human and machine attackers.
With intelligent deception technologies, the triggering of a trap begins the process of determining the malicious nature of a particular software or user. Once an intruder is detected, the deception solution sends an alert to the IT team while profiling the threat. Using this approach, health organizations can significantly shorten breach-to-resolution time and more successfully deal with accurate incidents.
2. Attack Interference
Intelligent deception not only lures attackers to decoys, it also slows down attacks and keeps the attackers engaged with decoy systems instead of roaming and causing harm to the real network. Decoys engage attackers and keep them occupied in a number of ways, including:
- Adjusting the decoy's TCP stream to cause a slower or faster interaction
- Allowing password-guessing to continue engaging the attacker. For instance, a decoy can be preset to decline the first six password attempts, and allow the seventh to come through, regardless of the string that was typed in.
- Feeding the attacker large files even when they are not requested by the attacker.
3. Enriched Threat Intelligence
The deception approach empowers IT teams to proactively collect threat intelligence that helps find the attacker's communication channels, understand how the connection was established, learn what protocols were used, and more. Some of the more advanced deception solutions employ traffic analysis engines to both place their traps most strategically and gather additional information about network threats.
By combining data from decoys, traps, traffic analysis and other active detection tools, deception platforms can feed and enrich SIEM/SOC systems to help health organizations build comprehensive threat maps using real data in real time. The threat intelligence and visibility generated by drawing the attacker in rather than simply repulsing the attack enables an understanding of the attacker's goals - preventing not only the current attack, but also future attacks. This is how health organizations can take the offensive - taking the attack to the attacker.
4. Minimizes False Positives
Two of the biggest challenges facing cyber defenders are alert fatigue and frustration from tedious analysis of false-positive. The former puts the health organization at risk when IT teams start ignoring alarms, and can't begin to address the wave of alerts. The latter creates frustration because to be classified as false positives, numerous events demand considerable analysis and collection of data from a wider pool of sources.
Deception solutions offer relief from this efficiency-draining paradigm. Decoys trigger a low number of false positives because legitimate traffic shouldn't go near them in the first place. False positives are further reduced by higher levels of interaction between the decoy and the attacker, and by correlating findings with other sensors in the network. Advanced intelligent deception platforms that have integrated traffic analysis capabilities can run internal correlation of data from both the deception and monitoring layers to ensure even higher alert accuracy. With far fewer false alarms, intelligent deception lets IT team avoid configuration and management distractions, and concentrate on real incidents.
5. Easy to Deploy and Manage
Current deception solutions are much more advanced than the old, clunky honeypots of 10 and 20 years ago. Deploying deception today is simple and fast. Intelligent deception is based on decoys and mini-traps - also known as breadcrumbs or lures. These are placed on endpoints and servers and point attackers back to the decoys. In advanced deception-based solutions, deception components are deployed using point-and-click configuration, which largely automates the rollout of phantom decoys and networks. Deception solutions that have integrated traffic analysis capabilities use them to strategically place traps and decoys where they can be most effective - and dynamically adjust the deception layer as the health network and threat environments evolve. Coupled with deception's accuracy and low false positives, ease of configuration and management allows health organizations to benefit from the technology without having to increase headcount.
The Bottom Line
The plague of cyber threats and the failure of traditional security approaches to address them have created an epidemic of cyberattacks in healthcare. Deception is one of the few solutions that can provide a cure in an effective and cost-effective way - shutting down attacks on healthcare IT systems before they cause damage, and letting network IT professionals go on the offensive against attackers.
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
Apr. 30, 2017 02:30 PM EDT Reads: 1,010
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory?
Apr. 30, 2017 02:30 PM EDT Reads: 615
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists will examine how DevOps helps to meet th...
Apr. 30, 2017 02:00 PM EDT Reads: 1,921
SYS-CON Events announced today that Hitachi Data Systems, a wholly owned subsidiary of Hitachi LTD., will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City. Hitachi Data Systems (HDS) will be featuring the Hitachi Content Platform (HCP) portfolio. This is the industry’s only offering that allows organizations to bring together object storage, file sync and share, cloud storage gateways, and sophisticated search an...
Apr. 30, 2017 02:00 PM EDT Reads: 872
SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa...
Apr. 30, 2017 01:15 PM EDT Reads: 2,708
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTred processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Apr. 30, 2017 01:15 PM EDT Reads: 3,164
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across supply chain networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost and time for product recall as well as advance trade. Are you curious about Blockchain and how it can provide you with new opportunities for innovation and growth? In her session at 20th Cloud Exp...
Apr. 30, 2017 01:15 PM EDT Reads: 2,221
Cloud promises the agility required by today’s digital businesses. As organizations adopt cloud based infrastructures and services, their IT resources become increasingly dynamic and hybrid in nature. Managing these require modern IT operations and tools. In his session at 20th Cloud Expo, Raj Sundaram, Senior Principal Product Manager at CA Technologies, will discuss how to modernize your IT operations in order to proactively manage your hybrid cloud and IT environments. He will be sharing be...
Apr. 30, 2017 01:00 PM EDT Reads: 1,067
While some vendors scramble to create and sell you a fancy solution for monitoring your spanking new Amazon Lambdas, hear how you can do it on the cheap using just built-in Java APIs yourself. By exploiting a little-known fact that Lambdas aren’t exactly single threaded, you can effectively identify hot spots in your serverless code. In his session at 20th Cloud Expo, David Martin, Principal Product Owner at CA Technologies, will give a live demonstration and code walkthrough, showing how to o...
Apr. 30, 2017 12:15 PM EDT Reads: 877
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Apr. 30, 2017 12:00 PM EDT Reads: 1,924
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Apr. 30, 2017 12:00 PM EDT Reads: 1,389
Apr. 30, 2017 12:00 PM EDT Reads: 1,636
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Apr. 30, 2017 11:30 AM EDT Reads: 2,448
Cloud Expo, Inc. has announced today that Aruna Ravichandran, vice president of DevOps Product and Solutions Marketing at CA Technologies, has been named co-conference chair of DevOps at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Apr. 30, 2017 11:30 AM EDT Reads: 2,918
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
Apr. 30, 2017 10:15 AM EDT Reads: 2,580