• Home
  • About Us
  • Privacy Policy
  • Contact Us
  • Disclaimer
  • Terms & Conditions
Journal Official
Advertisement
  • Home
  • Tech
    • All
    • Apps
    • Gadgets
    Google’s CFO just got promoted

    Google’s CFO just got promoted

    How Google’s latest AI model is generating music from your brain activity

    How Google’s latest AI model is generating music from your brain activity

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Some top AMD chips have a huge security flaw

    Some top AMD chips have a huge security flaw

    What is a Linux Bash Script and How Do You Build One?

    What is a Linux Bash Script and How Do You Build One?

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
  • Sports
  • CryptoCurrency
  • Business
  • Health and Lifestyle
    • All
    • Food
    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems?  experts tell

    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems? experts tell

    What is ‘duck walk’ in old age?  Expert shares tips on maintaining normal mobility

    What is ‘duck walk’ in old age? Expert shares tips on maintaining normal mobility

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink.  Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink. Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    Infertility Treatment: How Ayurveda Can Help Increase Fertility?  experts tell

    Infertility Treatment: How Ayurveda Can Help Increase Fertility? experts tell

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Trending Tags

    • Golden Globes
    • Game of Thrones
    • MotoGP 2017
    • eSports
    • Fashion Week
No Result
View All Result
  • Home
  • Tech
    • All
    • Apps
    • Gadgets
    Google’s CFO just got promoted

    Google’s CFO just got promoted

    How Google’s latest AI model is generating music from your brain activity

    How Google’s latest AI model is generating music from your brain activity

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Some top AMD chips have a huge security flaw

    Some top AMD chips have a huge security flaw

    What is a Linux Bash Script and How Do You Build One?

    What is a Linux Bash Script and How Do You Build One?

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
  • Sports
  • CryptoCurrency
  • Business
  • Health and Lifestyle
    • All
    • Food
    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems?  experts tell

    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems? experts tell

    What is ‘duck walk’ in old age?  Expert shares tips on maintaining normal mobility

    What is ‘duck walk’ in old age? Expert shares tips on maintaining normal mobility

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink.  Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink. Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    Infertility Treatment: How Ayurveda Can Help Increase Fertility?  experts tell

    Infertility Treatment: How Ayurveda Can Help Increase Fertility? experts tell

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Trending Tags

    • Golden Globes
    • Game of Thrones
    • MotoGP 2017
    • eSports
    • Fashion Week
No Result
View All Result
Journal Official
No Result
View All Result
Home Tech

Q&A: CISA’s Nitin Natarajan on Strengthening Cyber ​​Security in Healthcare

admin by admin
July 13, 2023
in Tech
0
Q&A: CISA’s Nitin Natarajan on Strengthening Cyber ​​Security in Healthcare
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter


Health Technology: How has the cyber security landscape for health care evolved in recent years?

Natarajan: We see cyber security developing in two ways. We are seeing a change in adversaries, who were traditionally large nation-state actors or large cybercriminal organizations, and we are seeing a lot more actors across the landscape. There are now cybercriminal and cyberterrorist organizations of all sizes.

We are also seeing an evolution in threats such as ransomware as a service, which allows anyone to become a potential adversary. You had to recruit a team and get expertise. Now all you need is money and someone you don’t like, and you can create your own cyberattacks against a new victim group.

Where we’re seeing the second part of growth is in the afflicted area. It used to be a belief that cyber criminals only target large corporations and large governments. If I’m a small rural hospital or a small rural school district, I don’t have to worry about anti-nation-states coming after me. But we are seeing that this is no longer true. We are seeing victims across the country, big and small, public and private, rural and urban. Anyone can be a potential victim of this new threat from adversaries.

This combination of an increase in the frequency, volume and sophistication of attacks by a growing adversary base, along with a growing base of potential victims, is truly changing the landscape of healthcare and beyond.

There was also a perception for a long time that healthcare was exempt. Even if you go back to traditional warfare and conflict, you never bomb a hospital. But we are seeing that hospitals are no longer exempt. We are seeing cyber terrorists, cyber criminals and nation-state actors going after and impacting healthcare facilities.

It is not just about revenue and financial gain. At the end of the day, a cyber attack against a hospital becomes an issue of patient safety, and its impact is felt and echoed in the communities it serves. Even in urban areas where there are too many healthcare providers or too many hospitals, the effects of the loss of any one institution for any period of time are still felt. Those forces – the growth of an adversary and victim base over the past several years – will continue to grow in the years to come. This is what worries me the most.

to explore: Three tips for health care organizations to prevent vishing and smishing.

Health Technology: Are there certain factors that make health care particularly vulnerable to these types of attacks?

Natarajan: I’m really excited about the progress in healthcare. We’re looking at where healthcare is going to go over the next three, five, seven years and it’s amazing. But with that also comes an expanded attack surface. The convenience of being able to connect to the Internet brings an additional vulnerability. When we look at healthcare, there was an increase in technology adoption at the start of the pandemic. The growth in telemedicine and telehealth capabilities appeared almost overnight. It’s not going away and, arguably, it will continue to grow and evolve over time.

This is going to make it more complicated for the healthcare sector, not only based on the volume, scope and growth of challenges that we have seen over the past few years from COVID-19, but also based on what we expect to see in the coming years. What will you see in the coming years. The fact that those effects can be felt so close to the bed is really worrying.

implementing the five pillars of #zero trust Security architecture can help #Health care Organizations mitigate cyber threats. @CISAgov Deputy Director Nitin Natarajan shares cyber security best practices #HIMSS23, pic.twitter.com/0OCrY3ieM1

— HealthTech Magazine (@HealthTechMag) 18 April 2023

Health Technology: What types of strategies or technologies can healthcare organizations deploy to improve their cyber security posture and reduce risk from these cyber attacks?

Natarajan: There are a few things. We still ask people to return to the basics: strong passwords and multifactor authentication. Those capabilities, as well as regularly updating and patching the software, are of the utmost importance.

Another approach we focus on is the secure by design, secure by default model for technology products. How are we protected by design? how we insist that manufacturers are indeed using things like memory-safe languages ​​and look into vulnerability disclosure programs and other measures to make sure what we’re buying is safe ? How do we make sure that, as consumers, we’re pushing that to our vendors and they’re really being asked those tough questions?

Then, how do we as consumers be sure that what we are buying and buying is by default safe? How do we make sure that, out of the box, it has a certain level of security built-in and that we won’t have to pay extra for a secure model versus an insecure model?

Finally, within our institutions and healthcare, how can we move this discussion away from CISOs and CIOs and really extend them to CEOs and boards? Over the years, we have often expected the CISO or CIO to handle the security of the entire enterprise. Often, when they’re talking with the CEO and the board about cybersecurity challenges and vulnerabilities, it doesn’t make sense – it’s a foreign language. How can we shift that conversation from simply asking the CISO to accept risk, change the landscape, and protect the organization, instead, extend that conversation to the CEO and the board? How do we really instill a sense of corporate cyber responsibility among those who are risk accepting?

For me, it’s a three-legged stool. We spend a lot of time on risk identification and risk mitigation. We forget the third step of that stool, which is risk acceptance, and risk acceptance is really with the CEO and the board. How do we make sure they understand the risk they are accepting at the end of the day? We always accept some risk. We’ll never redo everything, but making sure risk acceptance is well informed at the highest levels of the organization is really what we need to get there.

Read more: As cyber threats grow, can Zero Trust protect healthcare organizations’ data?

Health Technology: How can healthcare organizations strengthen their safety culture and ensure that safety is on everyone’s mind?

Natarajan: It’s about getting everyone involved. It’s about moving it from an IT solution to an organizational solution and making sure that not only is the CEO and the board aware, but, frankly, everybody is aware. This includes each physician, each employee in the facility who supports clinical care and the downstream supply chain. You also have to make sure that you are not introducing new vulnerabilities.

I mean, we know that some hospitals rely on on-time delivery and a lot of third-party vendors, sources and contracts. How do you make sure that the people you’re working with are protected and that, clearly, they’re practicing the level of cyber security that you expect of them? You also need to be sure that you’re asking them the questions they’re asking, that you’re choosing products and vendors that have a specific focus on cyber security, and that you’re using cyber security to guide your decision making.

It really does take everyone. People joke about who would click on a phishing link, but people will click on anything. Computers are very prevalent and available in healthcare these days, and many people still think they can get a million dollars through email. So, we have to address that trend and make sure that people are thinking with a cyber security mindset in every role throughout the organization. We shouldn’t just expect our CISOs and our IT and cyber security teams to solve this for the organization. Everyone has a role to play and everyone has to play their part.

Previous Post

Core inflation has come down a lot

Next Post

FTX Bankruptcy Lawyers Ask Court to Recover $323 Million From FTX Europe Leadership

admin

admin

Next Post
FTX Bankruptcy Lawyers Ask Court to Recover $323 Million From FTX Europe Leadership

FTX Bankruptcy Lawyers Ask Court to Recover $323 Million From FTX Europe Leadership

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Journal Official

Welcome to our News Magazine Website, your go-to source for the latest and most compelling news around the Globe. Stay informed, stay inspired, and explore the world through our comprehensive and user-friendly platform.

Follow Us

Recent posts

  • Open Access vs. Subscription: Masa Depan Aksesibilitas Jurnal Akademik
  • Strategi Memilih Jurnal yang Tepat untuk Naskah Penelitian Anda
  • Peran Jurnal Terindeks Scopus: Mengapa Penting untuk Karier Akademik
  • Etika Penulisan Ilmiah: Menghindari Plagiarisme dan Pelanggaran Kode Etik
  • Memahami Proses Peer Review: Kunci Kualitas Publikasi Ilmiah

Recent News

Open Access vs. Subscription: Masa Depan Aksesibilitas Jurnal Akademik

December 7, 2025

Strategi Memilih Jurnal yang Tepat untuk Naskah Penelitian Anda

December 7, 2025
  • Home
  • About Us
  • Privacy Policy
  • Contact Us
  • Disclaimer
  • Terms & Conditions

© 2023 Journal Official - News Magazine

No Result
View All Result
  • Disclaimer

© 2023 Journal Official - News Magazine