How Advanced Analytics Can Shore Up Defenses Against Data Theft

How Advanced Analytics Can Shore Up Defenses Against Data Theft

Since cyberattacks on hospital EHR systems have become a topic of nightly newscasts, no longer is anyone shocked by their scope and veracity. What is shocking is the financial damage the attacks are predicted to cause.

During this past June, more than 11 million patient EHRs were breached, making it the year's worst incident according to a study by DataBreaches.net and Prontenus. For comparison, May had less than 700,000 records breached, and records breached in March topped out at slightly more than 2.5 million.

While traditional security filters like firewalls and reputation lists are good practice, they are no longer enough. Hackers increasingly bypasses perimeter security, enabling cyber thieves to pose as authorized users with access to hospital networks for unlimited periods of time. The problem is not only high-tech, but also low-tech, requiring that providers across the continuum simply become smarter about data protection and privacy issues. Medical facilities are finding they must teach doctors and nurses not to click on suspicious links.

However, organizational threats manifest themselves through changing and complex signals that are difficult to detect with traditional signature-based and rule-based monitoring solutions. These threats include external attacks that evade perimeter defenses and internal attacks by malicious insiders or negligent employees.

Along with insufficient threat detection, traditional tools can contribute to “alert fatigue” by excessively warning about activities that may not be indicative of a real security incident. This requires skilled security analysts to identify and investigate these alerts when there is already a shortage of these skilled professionals. Hospital CISOs and CIOs already operate under tight budgets without needing to hire additional cybersecurity guards.

Healthcare security pros need to pick up where those traditional security tools end and realize that it’s the data that is ultimately at risk. The safeguarding of the EHR data is as important, if not more imperative, than just protecting the network or the perimeter.

Some cybersecurity sleuths deploy a variety of traps, including identifying an offensive file with a threat intelligence platform using signature-based detection and blacklists that scan a computer for known offenders. This identifies whether those types of files exist in the system.

However, millions of patient and other medical data files need to be uploaded to cloud-based threat-intelligent platforms; scanning a computer for all of them would slow the machine down to a crawl or make it inoperable. But the threats develop so fast that those techniques don’t keep up with the bad guys; and finally, why wait until you are hacked before trying to identify these threats?

As a result, some healthcare CSOs and CISOs are moving from post-incident to pre-incident threat intelligence. They are looking at artificial intelligence innovations that use machine learning algorithms to drive superior forensics results.

In the past, humans had to look at large sets of data to try to distinguish the good characteristics from the bad ones. With machine learning, the computer is trained to find those differences, but does so much faster with multidimensional signatures that detect problems and examine patterns to identify anomalies that trigger a mitigation response.

Machine learning generally works in two ways: supervised and unsupervised.

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

Five Maturity Levels in Data-Driven Organizations

18 Apr, 2017

Data is a critical competitive factor and is becoming more and more crucial for achieving success. In theory, hardly anyone …

Read more

Revolutionizing Data Collaboration with Federated Machine Learning

16 Jun, 2020

We now live in a world that’s becoming more data-driven every day. Organizations across a wide range of industries are …

Read more

4 Steps to be Successful with the Digital Transformation of Your Business

20 Feb, 2022

According to McKinsey, data-driven organisations are 23x more likely to acquire customers, 6x more likely to retain customers and 19x …

Read more

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.