Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Vectra Research Identifies New Exploitable Attack Surface Within Cloud Services and Remote Healthcare

Vectra AI, a leader in network threat detection and response (NDR), today released its 2020 Spotlight Report on Healthcare, which shows an upward trend in exploitable behaviors and discredits claims that external threats would lead to increased internal threat activity. The latest Spotlight Report on Healthcare is based on observations and data from January-May of this year using a sample of 363 opt-in enterprise organizations in healthcare and eight other industries.

The COVID-19 pandemic has sparked the global adoption of cloud services across all industries. However, healthcare has suffered the most sudden and rapid pivot to support overwhelmed infrastructure and increased collaboration using the same strapped IT and security resources.

Recommended AI News: Remote Workstation Turn To Hyper-Gaming Arena With The NVIDIA VGPU July 2020

“Healthcare providers have been tasked with quickly leveraging remote access and cloud analytics to scale their operations,” said Chris Morales, head of security analytics at Vectra. “While cloud computing better optimizes the use of resources in healthcare, it also creates significant risks. This is especially true when cloud adoption happens faster than proper due diligence can be applied by information security personnel. This trend will persist well after the pandemic.”

“This year we observed a stark and sudden growth in data movement outside of our organization’s traditional boundaries,” said David Willis, head of cyber, governance and assurance at the Greater Manchester Health and Social Care Partnership, National Health Service, in the United Kingdom. “That growth is most likely due to how the NHS has traditionally worked in siloed data centers behind a firewall and has now shifted to the COVID-19 world of cloud-based collaboration.”

Security teams must now urgently grapple with where healthcare data resides and how to safeguard it. To do so requires pan-organizational cooperation among IT and security teams as well as visibility that integrates the cloud and the on-premises infrastructure to enable a truly comprehensive threat detection and response capability.

Related Posts
1 of 40,604

Recommended AI News: Corrata Announces Mobile Endpoint Integration With Microsoft Cloud App Security

Highlights from the Vectra 2020 Spotlight Report on Healthcare

Vectra investigated network behaviors that are consistent with threats across the entire cyberattack lifecycle – botnet monetization, command and control, internal reconnaissance, lateral movement, and data exfiltration. Upon closer examination, these behaviors were found to be from cloud migration activities, and not attackers.

  • A 38 percent increase in command-and-control behaviors from January-May 2020, which indicates remote access of internal systems by the remote workforce.
  • The doubling of data exfiltration behaviors, which indicates data leaving internal healthcare networks to external destinations like cloud services.
  • Europe, the Middle East, and Africa (EMEA) and North America have shown an increase in the volume of external data movement, known as exfiltration. This is consistent with cloud migration.
  • Smash-and grab behaviors have increased significantly, which can occur with a medical device that instantly sends large volumes of data to a hosted cloud site.
  • Data smuggler activity has largely increased, which can occur when patient medical records are transferred to cloud storage.

From January-May 2020, the Vectra Cognito Network Detection and Response (NDR) platform detected and correlated behaviors consistent with attacker behaviors in host devices, assigned a threat-severity score, and prioritized the highest-risk threats to healthcare. This analysis provides the context needed to better understand what data is moving to the cloud, as well as how it is being used and shared.

For healthcare organizations, the migration of data to the cloud was already in motion, and COVID-19 has accelerated this transition and the policies that govern it. NDR is an effective approach for the detection and response to attackers that circumvent or defeat defensive controls and gain an operating capability inside an organization’s infrastructure.

Recommended AI News: XP Inc. Acquires Stake In Fintech Antecipa Entering The Receivables Financing Market

1 Comment
  1. ApkJoyGar says

    You can download any of the provided casinos upon without any problems. If you download the c***** app, it purposefulness position like a conformable mirror of the out-and-out site from the unstationary version. Unfortunately, all the apps you download choose however do one’s daily dozen on Android. Download c***** in 1 click from the schedule, these are the most advanced mobile applications.

    The best c***** apps for Android
    The problem is that declaration Android apps and downloading them can be cunning, as Google doesn’t allow real small change Android casinos to be placed in the Play Store.

    Download c***** app
    But don’t chew one’s nails, there is a unassuming solution, you can download the c***** app from casinoapk2.xyz.

    As so multitudinous users be suffering with been asking around c***** gaming on their Android phones or tablets. We dug around a portion to find you the most talented c***** apps contribution the anyway real boodle experience.

    The most in onewin, download 1win.

    Reviewers check out each pertinence in place of safety to ensure upon;
    We at one’s desire help you rouse real pelf g******* apps with the most beneficent Android apps;
    The casinos tender the pre-eminent series of games.
    Download True Shekels C*****
    It is not always effortless to download genuine money casinos, true level on more popular smartphones like Samsung Galaxy, HTC One or Sony Xperia. So if you fancy to download the app to out first folding money, be familiar with all below.

    Our team found the pre-eminent casinos contribution quality g******* for your device and ran an uptight 25-step verification modify benefit of them.

    On this bellhop you drive find an petition in spite of Android:

    Allowed Promotions – We know how much players be deficient in to misappropriate gain of the bonuses, so we made firm that our featured sites offer classy deals for Android.
    Variety of games. Decayed exquisite is a jumbo minus. We not praise the app, the game portfolio is elephantine and varied.
    Deposits – You trouble as few restrictions as viable when it comes to depositing and withdrawing shin-plasters to your c***** app account. We up sure that all apps we recommend allow a encyclopedic mix of payment methods.
    Fleet payouts. All applications put on the market fast payments with true coins, credited to the account in a few hours.
    Sensitive Compatibility – Trifle with Apps Anywhere.
    Guy Support – To be featured on the Featured Record, we require online casinos to step thorough and keen customer service.
    Advantages of an online app because Android
    Extensive video graphics and usability in Android apps.
    Judgement the same marvellous PC experience.
    Quick access from the application.
    C***** apps – looking since the greatest
    We stay and download c***** apps to assure they convene enormous standards. The criteria euphemistic pre-owned to excellent a c***** app are right-minded as stringent as the criteria employed to evaluate a PC c*****. Each relevance has:

    Highest importance graphics;
    Untroubled loading and playing epoch;
    Fast payouts.

Comments are closed, but trackbacks and pingbacks are open.