Healthcare organizations (HCOs) around the world are under attack. The data they store and process has become a valuable commodity on the cybercriminal underground and has even been linked to nation state attacks. In 2015, more than 113 million records were stolen in the U.S. alone, according to the Department of Health and Human Services. Many more cases undoubtedly go unreported, both at home and abroad. But why are Electronic Health Records (EHRs) so highly sought after? And where are organizations most exposed? Continue reading
In our previous installments of the Leaking Beeps research series, we have discussed that both healthcare and industrial control systems have been sending clear text messages via the pager communications protocols POCSAG and FLEX. We were surprised to see pages containing sensitive patient information when we looked into the use of pagers in the healthcare sector. We were just as alarmed to see the number of automation systems in industrial environments that were utilizing POCSAG and FLEX as wireless communications paths. This gave a lot of information away to a potential attacker who could use them in a future attack.
5 attack scenarios and 3 tips how to avoid them
Article written by specialists at the Trend Micro Foward-Looking Threat Research Lab
Over sixty years ago, healthcare professionals were among the first to adopt a new communication tool: the pager. This little instrument combined technology from walkie-talkies and automobile radios, resulting in a handy little tool that allowed the transmission of messages (or ‘pages’) to other pagers up to 25 miles away. And although smartphones have taken over communication in the outside world, the healthcare industry has never really said goodbye to pagers. They offer a few crucial advantages to healthcare professionals: they don’t suffer from the often weak cellular coverage in hospitals nor do they interfere with medical equipment. Continue reading
There is no industry that hackers won’t target as long as they have something to gain from it. All and any personally identifiable information has some value to someone on the Dark Web, whether it will be used for identity theft purposes, for an advanced targeted attack or for something else. Cyber criminals work tirelessly to breach systems in a variety of verticals, and it shows: In 2015, the Identity Theft Resource Center in the US tallied over 780 data breaches, amounting to the exposure of more than 169 million records. Continue reading
Trend Micro researchers noted that the future of mobile tech in health care is bright. Wearable devices and technologies driven by the Internet of Things are beginning to contribute to a better health landscape. For instance, these wearables can track fitness levels and even blood sugar for those with diabetes, and they will soon be (or in some cases already are) able to track blood pressure, heart rate and respiratory rate, among other important metrics. Continue reading