OPINION: The cybersecurity crisis in healthcare and our failing defenses

7 hours ago 1

Article content

Why current defenses fail: the detect-and-respond problem 

Article content

To understand why cybersecurity in healthcare continues to fail, we need to examine the underlying philosophy that guides our defenses. Most healthcare organizations follow the NIST Cybersecurity Framework—identify, protect, detect, respond and recover. It’s a solid framework, but the industry has disproportionately focused its innovation on the “detect” phase.  

Article content

Let me walk you through a typical attack chain to demonstrate: 

Article content

  • First, attackers gain initial access, perhaps through a compromised credential or a phishing email.
  • Next, they move laterally through your network, evading defenses.
  • Then comes the critical part: egress. They establish command and control, pivot to other systems and exfiltrate data—all before you’ve detected their presence.

Article content

By the time your threat detection technology alerts you, sensitive patient data is already gone. You can respond and recover all you want, but that data isn’t coming back. The compliance violations and reputational damage are permanent, and the effects on patients whose private information has been exposed cannot be reversed. Some argue that artificial intelligence will solve this problem, but while we’re applying AI to detection, adversaries are using it for malware creation and detection evasion. We’ve inadvertently created a generative adversarial network between the security industry and attackers, each side constantly improving against the other. The security industry gets better at detection, so malware gets better at evasion. 

Article content

Article content

The result? We’re still playing the same losing game, just with more expensive technology. The adversary still makes the first move, and by the time they do, the damage is already done. We need to stop doing the same thing over and over again and expecting different results. We need a new philosophy. 

Article content

A new philosophy: Zero Trust connectivity 

Article content

Instead of constantly racing to catch up with attackers, what if we could change the rules entirely? This is where Zero Trust connectivity comes in—an approach that moves us from detection-centered security to protection-first security. The core principle is simple but powerful: deny all connections by default and only allow those that are explicitly verified as safe. Rather than assuming systems are secure until proven compromised, we assume they’re already compromised and only permit connections that pass rigorous verification. 

Article content

When a device needs to connect to another system or website, the Zero Trust system first verifies both the requesting asset and the destination are legitimate and authorized. Once the exchange completes, the system returns to its default state, denying all connections.  

Article content

Article content

This approach offers several critical advantages for healthcare: 

Article content

  • Protection against unknown threats: By verifying what’s good rather than identifying what’s bad, we sidestep the impossible task of keeping up with constantly evolving threats. For every legitimate connection, there are approximately 7,000 potential malicious ones.
  • Edge-based protection: This approach works at the network edge without requiring endpoint agents, crucial for protecting medical IoT devices like MRIs and surgical equipment that can’t accommodate security software.
  • Neutralized phishing attacks: Even if a clinician clicks a malicious link in a perfectly crafted phishing email, nothing happens because the connection to the attacker’s server is automatically denied.

Article content

By moving from “detect and respond” to “protect and neutralize,” we create a fundamentally different security posture that gives healthcare organizations a fighting chance against sophisticated threats. 

Article content

A call for philosophical change 

Article content

Throwing more technology, more AI and more computing power at the problem won’t solve it if we don’t first address the fundamental flaw in our security philosophy. Zero Trust connectivity offers us a different path forward, one that aligns with healthcare’s unique challenges and requirements. By denying all connections by default and only allowing verified ones, we can dramatically reduce our attack surface, protect patient data and safeguard critical medical systems. All that’s needed now is the courage to embrace a fundamentally different way of thinking about cybersecurity, one that puts protection first. 

Article content

Francois Driessen is the CO|MO and Co-Founder of ADAMnetworks. https://adamnet.works/ 

Article content

Article content

RDX-Leaderboard

Article content

This section is powered by Revenue Dynamix. Revenue Dynamix provides innovative marketing solutions designed to help IT professionals and businesses thrive in the Canadian market, offering insights and strategies that drive growth and success across the enterprise IT spectrum. 

Article content

Read Entire Article