10 best cyber security companies in healthcare for 2021
DESCRIPTION
10 Best Cybersecurity Companies in Healthcare for 2021 features a few cybersecurity companies that ensure the safety & confidentiality of healthcare data.TRANSCRIPT
#Self_Secure5 Things you shouldn’t dowith your password
Watch and Learn5 real-life examples that show why cybersecurity is pivotal
JULYISSUE
00
Redefining the Benchmarks of Cybersecurity in Healthcare
BEST
CYBER SECURITY Companies in
HEALTHCARE
For 2021
1
Rob RhodesExecutive Vice President
he proliferation of technology has eased Tthings in the healthcare sector like any other, but security threats have also invaded the
health space. Cybersecurity in the health space has become a cause for concern in the industry and the public.
Since the past few years, hacking and other information technology-related crimes have risen, and healthcare facilities struggle to combat the menace. Data breaches in the healthcare industry saw a record in 2015 and have been steadily rising since then.
The ongoing pandemic only exposed the healthcare industry to cybersecurity concerns and how the industry needs to be resilient in times of crisis like this, and even otherwise. The past years have seen a whopping rise in ransomware, malware, and other cyberattacks. It has thus become pertinent for healthcare providers to be more vigilant and adopt technologies to prevent hacking. Ransomware is not just financially detrimental to the healthcare establishment, but the loss of data can also put the patient’s life at risk.
Recently, the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) warned private and public healthcare sectors of ransomware attacks during holidays.
Several cybersecurity technologies are now available to keep cyber attackers in the health space at bay. Cybersecurity in healthcare protects the confidentiality, integrity, and availability of information. To strengthen cybersecurity, healthcare establishments need to approach
informatics professionals who manage and protect data. It is no wonder then that career in health informatics is one of the most sought-after careers. But it is only of late that governments and healthcare organizations began taking steps to contain cybercrimes in healthcare. The healthcare industry is vulnerable to cyberattacks, and its ignorance has triggered off more attacks.
On this backdrop, we chose few cybersecurity companies that ensure healthcare establishments function smoothly through prevention, detection, and mitigation against cyberattacks. Our latest edition of Insights Care – 10 Best Cybersecurity Companies in Healthcare for 2021 highlights the ever-growing threats and solutions to prevent them in the healthcare segment.
Happy reading to you!
Sumita Sarkar
Cybersecurity - Protecting Information for Normal
Functioning of Healthcare Establishments
Editor’s Note
Articles
CybleEmpowering Healthcare ServiceProviders with State-of-the-ArtCybersecurity
12
ISA CybersecuritySpearheading theCybersecurity Revolution
24
SafeBreachMaximize Security Control Effectiveness.Reduce the Attack Surface
32
CXO
The Right CareThe Importance of
Independence Among Disabled People, Particularly During
A Global Pandemic
20
16
28
CO
NT
EN
TS
Watch and Learn5 real-life examples
that show why cybersecurity is pivotal
#Self_Secure5 Things you shouldn’t do
with your password
CO
VE
R
ST
OR
Y
08
Redefining the Benchmarks of Cybersecurity in Healthcare
Co-designer Paul Belin
Art & Picture Editor Rohil Shinganapurkar
Art & Design Head
Editor-in-Chief Sumita Sarkar
Deputy Editor Abhishaj Sajeev
Senior Editor Anish Miller
Visualiser David King
Priyanka Rajage
Circula�on Manager Tanaji
Research Analyst Eric Smith
Sarah Wilson, John Smith, Alex VincentBusiness Development Execu�ves
Amy JonesBusiness Development Manager
Sales Execu�ves Kelli, Bill, Anna
SME-SMO Execu�ves Atul, Gemson
Digital Marke�ng Manager Alina Sege
Technical Consultants David, Robert
Technical Head Jacob Smile
Marke�ng Manager John Smith
Assistant Technical Head Aditya Kothare
Assistant Digital Marke�ng Manager Amol Wadekar
Copyright © 2021 Insights Success Media and Technology Pvt. Ltd., All rights reserved. The content and images used in this magazine should not be reproduced or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights success.
Reprint rights remain solely with Insights Success Media and Technology Pvt. Ltd. Insights Care is powered by Insights Success Media and Technology Pvt. Ltd.
July, 2021
Follow us on : www.facebook.com/InsightsCare/ https://twitter.com/Insightscare
Insights Success Media Tech LLC
555 Metro Place North, Suite 100,
Dublin, OH 43017, United States
Phone - 302-319-9947
Email: [email protected]
For Subscription: www.insightscare.com
Insights Success Media and Technology Pvt. Ltd.
Office No. 22, Rainbow Plaza, Shivar Chowk,
Pimple Saudagar, Pune, Maharashtra 411017
Phone - India: 7410033802, 74100058552
Email: [email protected]
For Subscription: www.insightscare.com
Assis�ng Editors Nidhi, Trishika
Corporate Offices:
DISCRIPTIONN FORM
DescriptionFeaturing
BlueVoyantbluevoyant.com
James RosenthalCEO
BlueVoyant's proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to
secure your full ecosystem.
CryptoMill CybersecuritySolutions cryptomill.com
Nandini Jolly, FounderPresident, and CEO
CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises,
professionals, and individuals.
Cyblecyble.io
Beenu Arora, Co-founder
and CEO Manish Chachada
Co-founder and COO
DataArtdataart.com
Eugene GolandPresident and CEO
DataArt is a global software engineering firm that takes a uniquely human approach to solving problems.
iatricSystemsiatric.com
Rob Rhodes
Executive Vice President
iatricSystems, Inc., is a healthcare technology company dedicated to improving the delivery of care through technology.
Joe Head, CTOINTRUSION's Shield is a bi-directional Zero Trust solution protecting you from Zero-Day and Malware-Free attacks.
INTRUSIONintrusion.com
Keith AlexanderChairman Founder
and Co-CEO
IronNet Cybersecurity is a global cybersecurity leader that is revolutionizing how enterprises, industries, and
governments secure their networks.
ISA Cybersecurity Ince-isa.com
Kevin DawsonPresident and CEO
SafeBreach Incsafebreach.com
Guy Bejerano, CEO Itzik Kotler, CTO
SafeBreach is the top cybersecurity solution provider that delivers a
'hacker's view' of an enterprise's security posture for total and
continuous security assessment, validation, and to help prioritize and
remediate based on where the biggest risk is to the business
Cyble is an AI powered cyber threat intelligence company that empowers global organizations with darkweb &
cybercrime monitoring.
ISA is Canada's leading pure-play cybersecurity company, with nearly three decades of experience delivering
cybersecurity end-to-end services and people, you can trust.
HUB Securityhubsecurity.io
Eyal MosheCo-founder and CEO
HUB Security is a Confidential computing, cyber security platform for critical infrastructure, AI and financial services.
IronNet CybersecurityInc ironnet.com
Company Name
Redefining the Benchmarks of Cybersecurity in Healthcare
Rob Rhodes, the Executive Vice
President for iatricSystems,
started his career in Healthcare
IT in 1990 at MEDITECH. Rob
moved into the Hospital Provider
space in several roles, including
Chief Information Officer. Rob’s
strong background in technology,
hospital operations, and
information security & privacy
led him to join iatricSystems in
2013 as Senior Director of Patient
Privacy. Rob led the team that
achieved KLAS Category Leader
with the iatricSystems Security
Audit Manager product for four
consecutive years.
About the Leader
C O V E R S T O R Y
Rob RhodesExecutive Vice President
Every individual who uses a
smartphone or IoT device is
aware of the crucial role that
cybersecurity plays. From protecting
one’s privacy to averting digital
threats for multinational companies,
cybersecurity has evidently become
an inevitable necessity of our
everyday lives.
To cater to this necessity,
cybersecurity companies diligently
strive to innovate solutions that
revolutionize how the IT and
associated industries perceive threat
protection. One prominent name
among such companies is TMiatricSystems , Inc., a healthcare
technology company dedicated to
improving the delivery of care
through technology.Headquartered at Daytona Beach,
Florida, iatricSystems, Inc. was
founded to bring together healthcare
experience, products, services, and
partners to deliver solutions that
enhance existing investments in
healthcare IT.
“Over the past 30 years, we have
supported more than 1,300 hospitals
and provided solutions to the
Hospital and Healthcare Market that
protect the privacy and security of
patient data and healthcare systems,”
says Rob Rhodes, the Executive
Vice President for iatricSystems.
In the following interview, Rob
shares his insights on the current
landscape of the healthcare
cybersecurity solutions market, the
impact of the COVID-19 pandemic
on the industry, and his vision for the
company.
Below are the highlights from the
interview:
What aspects make iatricSystems
stand out from the competition?
The best way to improve the delivery
of care through technology is to have
a team that has walked in their shoes.
Our solutions are built by combining
the skills of our clinicians, nurses,
lab techs, other subject-matter
experts, and the skills of our IT &
Information Security and Privacy
experts.
Over the past 30 years, we have supported more than 1,300
hospitals and provided solutions to the Hospital and Healthcare Market that protect the privacy and security of patient data and
systems.
The best way to
improve the
delivery of care
through
technology is to
have a team that
has walked in their
shoes.
10 Best Cybersecurity Companies in Healthcare For 2021
What is your opinion on the
impact of the current pandemic on
the global healthcare sector, and
how has your company fared
during the pandemic?
The pandemic put a lot of stress on
the global healthcare market and has
required overworked healthcare
heroes to continue to have to do more
with less. Despite decreasing hospital
margins, we’ve seen that
organizations are still committed to
providing the highest quality, safest,
and most secure healthcare possible.
Our company has managed the
pandemic well, as we have continued
to do our best to support the mission
of our customers.
In your opinion, what could be the
future of the healthcare technology
services sector—specifically
cybersecurity—post the pandemic?
And how are you strategizing your
company’s operations for that
future?
The pandemic continues to
underscore the need for good
cybersecurity. Cybercriminals don’t
take days off, and we’ve all seen the
headlines of numerous healthcare
system breaches from hackers taking
advantage of the pandemic.
Organizations had to act quickly to
provide remote working
opportunities, and the pandemic has
increased opportunities for curious
individuals to snoop on medical
records in-house.
In response to new challenges, the
healthcare technology space is
continuously evolving. With more
breaches happening every day,
privacy and security teams need all
the help they can get. We’ve
seen—and have made—great
progress in the Artificial Intelligence
space and have already begun to
include AI in our core products to
uncover breaches before they
happen, as well as automation tools
to allow privacy and security teams
to focus on more important tasks.
As an established leader, what is
your advice to the budding
entrepreneurs and enthusiasts
aspiring to venture into healthcare
tech services?
My advice would be to understand
your customer’s world and the
threats that they face daily. Your goal
should be to help clients manage
threats in a way that overcomes their
unique challenges. Hospitals have
limited budgets for staff and
technology, but they still need the
highest levels of security.
How do you envision scaling
iatricSystems’ operations in 2021?
We continue to improve our
technology to help our customers
improve the productivity of their
teams. Via our managed privacy
services, AI-driven technology,
virtual assistants, and relationships
with top-notch cybersecurity
partners, we can help even the
smallest organizations fight the bad
guys.
Your goal should be to help clients
manage threats in a way that overcomes
their unique challenges.
Via our managed privacy services, AI-driven technology, virtual assistants, and relationships with top-notch cybersecurity
partners, we can help even the
smallest organizations fight
the bad guys.
About the leader
Beenu Arora is a Senior Technology Strategist, cybersecurity leader
having completed his MBA from London Business School and
Columbia Business School. He has over 15 years of extensive
international and cross-functional experience in technology, cyber-
security, risk consulting and transformation programs in nancial
and energy, utilities and mining sectors across IT and
OT/ICS/SCADA.
He has advised multiple FORTUNE® 50 and FORTUNE® 100
organizations on engagements ranging from cybersecurity strategy
development to program execution and operations. Beenu is also a
member of the Forbes Technology Council with 15+ years of
international cybersecurity experience prior to Cyble.
Can you imagine a world without internet today? It’s difficult to separate information technology from our lives. From ordering groceries online and
opting for digital banking services to working from home and looking after our health through health apps, every aspect of our lives is impacted by the technology.
Undoubtedly technology has made our lives simpler. However, it has also brought a myriad of disadvantages with it. As the whole world pivoted to an everything-digital approach during the initial phase of the COVID-19 pandemic, it also presented hackers with more opportunities to introduce sophisticated malwares and phishing attacks.
In such conditions, businesses choose prevention against cyberattacks by availing mitigation services from cyber intelligence companies. Established in 2019, Cyble is one such cyber intelligence company that has been empowering businesses with their mitigation services and cybercrime monitoring.
Backed by Y Combinator as a part of its 2021 winter cohort, Cyble has been recognized by Forbes as one of the top 20 Best Cybersecurity Startups to Watch in 2020. More recently, Cyble secured a spot as a Silver Winner at the Cybersecurity Excellence Awards 2021 for its Threat Detection, Intelligence, and Response – North America.
We at Insights Care interviewed Beenu Arora, CEO and Manish Chachada, COO of Cyble for its latest edition where the duo shared the genesis of the company and how, through its unique offerings, the company has been empowering businesses against cybercrimes.
Keep reading to get a glimpse of cyber security world and the current scenario of healthcare and cyber security shared by these experienced leaders.
Please brief our audience about Cyble, its mission, and the key aspects of its stronghold within the cyber security niche.
12| July 2021|www.insightscare.com
Empowering Healthcare Service Providers with State-of-the-Art Cybersecurity
10 Best Cyber Security Companies in Healthcare For 2021
Cyble's ultimate objective is to
provide organizations with
real-time visibility into their
threat landscape
““
Manish Chachada, Co-founder, and COO of Cyble, is a seasoned
professional with over 15+ years of International Corporate
Finance and Business Management experience. His experience
spans across business and nancial management, operations
management, auditing and assurance, merger and acquisitions
(M&A), international tax strategy, and capital raising. A Chartered
Accountant from the Institute of Chartered Accountants of India
and an MBA from Columbia and London Business School, Manish
takes a keen interest in business and technology.
Currently, he co-chairs the special interest technology group for
Financial Executive Network Group (FENG), one of the largest
global networks for nance professionals. In February 2021,
Manish became a part of the prestigious Forbes Business Council,
an invitation-only community for world-class C-suite and business
executives.
Founded in 2019, Cyble is an Atlanta-based, AI-powered, and Y Combinator-backed cyber intelligence company that empowers businesses with darkweb and cybercrime monitoring and mitigation services. Cyble's ultimate objective is to provide organizations with real-time visibility into their threat landscape.
Cyble has an extensive team of qualified industry experts, security researchers, and cyber security specialists. At Cyble, we are continually striving towards expanding our visibility over the darkweb and updating our technology to match the ever-increasing sophistication of cyberattacks..
Tell us more about your products and services which make your company stand out from the competition?
Cyble Vision is our proprietary SaaS product that indexes internet-wide data from the deep, dark, and surface web.
13|July 2021|www.insightscare.com
Beenu AroraCyble Founder, CEO, and Member of Forbes Technology Council
Manish Chachada Co-founder, COO, and Member of Forbes Business Council Headquarters
Comprising over 140B+ darkweb records, 15B+ open-source intelligence (OSINT) records, and 50B+ threat indicators, our extensive datasets help us analyze close to a billion pages every day, hunting for key cyber security events with our proprietary risk models. Cyble stands out from the competition on account of the scale, depth, diversity, and accuracy of its constantly expanding database.
What is your opinion on the impact of the current pandemic on the global cyber security space, and what challenges did you face during the initial phase of the pandemic?
The pandemic has placed the health sector at the receiving end of novel cybersecurity challenges arising from cyberthreats with COVD-19 as the threat vector. As the world continues to battle the current coronavirus crisis, cybercriminals are taking advantage of the panic to launch sophisticated scams and phishing attacks on enterprises, individual computing systems, and healthcare and research institutions. We expect cybersecurity challenges to evolve over the months to come.
During the challenging time, as organizations grappled with unprecedented changes and adjusted to measures such as work-from-home, Cyble was not left unaffected. The safety of our employees was of paramount importance to us. Employee health and well-being continues to be of utmost importance to us. With our workforce scattered across the world, our efforts continue to be directed at supporting our workforce and helping them navigate through the crisis.
With continuous development in technologies such as AI and big data, what is your prediction about the future of the cyber security space pertaining to the healthcare services?
Threat actors quickly adapt to new technologies. With the rapid development and adoption of disruptive technologies such as AI, machine learning, and big data, cybercriminals are sure to leverage the situation to launch cyberattacks with escalating degrees of sophistication.
The pandemic has significantly impacted the cyberthreat landscape in the healthcare sector. With targeted attacks on the COVID-19 vaccine cold chain to leaked medical
14| July 2021|www.insightscare.com
records, we expect the healthcare sector to be met with an increased array of cybercrime in the future. As the healthcare industry adopts advanced technologies for improved patient treatment, cybercriminals and cyber threat actors can be expected to exploit the vulnerabilities that may accompany these changes.
As an established leader, what would be your advice to the budding entrepreneurs and enthusiasts aspiring to venture into the cyber security industry?
For any business, old or new, it is important to set stringent security protocols. As a budding entrepreneur and cybersecurity enthusiast, its crucial to stay abreast of the changing threat landscape and the evolution of the cybersecurity industry. Having data safety systems in place and conducting routine security audits are a must. Another critical aspect is to train employees on spotting potential security problems.
How do you envision on scaling your company’s operations and offerings in 2021?
Being a growing company, Cyble is actively expanding its global team in lockstep with the needs of our increasing client base. This helps us understand our clients' needs better and provide them with timely and actionable intelligence.
In addition, with cybercrime showing no signs of slowing down in 2021, our efforts are continuously directed at implementing innovative techniques and technologies to further expand our visibility across the Darkweb. A significant aspect of scaling our capabilities also involves boosting our artificial intelligence and human intelligence to higher levels.
5 EXAMPLES
THAT
WHY IS PIVOTAL
CYBERSECURITY
16| July 2021|www.insightscare.com
Watch and Learn
SHOW
17| July 2021|www.insightscare.com
n today’s internet-driven world, Idata breaches have become far more evident than the general
population realizes. Data breaches sometimes affect hundreds of billions of people at a time. Data breaches can often be lethal enough to change the whole course of your life.
Huge complications can be experienced by businesses, individuals, or even governments from having sensitive information compromised. Hackers have ways to get you through emails, text messages, Bluetooth, or any other online or offline service that you use. Without adequate attention to detail, even a minor vulnerability can cause you a huge data breach. Following are five of the biggest data breaches that occurred in recent times, causing sensitive information to leak from some of the biggest internet platforms. Yahoo – One of the biggest security breaches that the modern world has seen in recent years is Yahoo. The incident which took place in 2013 ended up costing 3 billion hacked accounts.
Yahoo revealed this massive security breach initially in 2016, saying it affected 1 billion accounts. It was later exposed that the security breach affected almost all of Yahoo user accounts. This particular security breach resulted in Yahoo losing millions of users. Yahoo was in an acquisition deal with Verizon during this time, which was later settled at a lesser price.
Alibaba – In November 2019, data was stolen from the database of Alibaba, a Chinese shopping website. Almost 1.1 billion counts of user data were stolen from the website over eight months. This was done by a developer
who was working for an affiliate marketer. The customer data that was stolen included usernames and mobile numbers. Although the developer and marketer apparently stole the data for their own use and did not sell it on the black market, they were both sentenced to three years of prison time.
LinkedIn – One of the latest large-scale security breaches happened in June 2021 when professional networking giant LinkedIn saw data of almost 700 million of its users posted on a dark web forum. This number was estimated to be 90% of its total users.
A hacker going by the alias of ‘God User’ used data scraping techniques by exploiting the site’s API. He first dumped a set of 500 million user information data of LinkedIn customers. LinkedIn argued that no sensitive or personal data was exposed. However, God User posted a data sample that included information like email address, phone number, geolocation record, gender, and other social media details.
Sina Weibo – In March of 2020, Sina Weibo, one of China’s largest social media platforms, was hacked, compromising data of over 538 million of its users. Personal details like real names, site usernames, gender, location, and phone numbers were stolen from the website. Reports said that the attacker then sold the data on the dark web for $250 only. China’s Ministry of Industry and Information Technology (MIIT) asked Sina Weibo to improve its data security measures to protect its users’ private information and inform them when incidents like data security breaches happen. Facebook – Another big data security breach happened in April 2019 when two datasets from Facebook apps were revealed to the public internet. Data of
more than 530 million Facebook users were compromised that included their phone numbers, account names, and Facebook Ids.
However, the data was posted two years later on the internet for free, projecting new and real criminal intent surrounding the data. Keeping in mind the sheer number of phone numbers affected and easily available on the dark web, security researcher Troy Hunt added functionality to his HaveIBeenPwned (HIBP) breached credential checking site that would let users check if their phone numbers had been exposed in the breached data.
All these examples make a solid case for why having potent cyber security is so important. It is crucial for users at all levels to prevent data security breaches to keep their personal and confidential information safe from being compromised.
Some of the practices that help with better security of sensitive information, which everyone should follow, include patching and upgrading software, enforcing strong credentials and multi-factor authentication, upgrading devices, and generally being educated about the security practices that prohibit your data from getting stolen.
- Trishika R.
18| July 2021|www.insightscare.com
Angie Conley is the Founder and CEO of Abilitech Medical, which brings innova�ve solu�ons to
market that allow people living with upper-limb neuromuscular condi�ons to func�on
independently.
The company’s first product, the Abilitech™ Assist, is a powered ortho�c device providing func�onal
assistance and support to the elbow and shoulder to improve the lives of people in the U.S. affected
by neuromuscular weakness.
20| July 2021|www.insightscare.com
The Importance of INDEPENDENCE AMONGDISABLED PEOPLE, Particularly During a
GLOBAL PANDEMIC
The COVID-19 pandemic has affected millions of people, disrupting daily lives and challenging physical and mental wellbeing. This was especially
true for the disabled population – people who live with unique complications of everyday tasks and compromised immune systems, and who are both physically challenged and often socially isolated.
Navigating logistics to get to a healthcare appointment is challenging for our users, and the limited access to healthcare has been exacerbated during the pandemic. A one-hour appointment thirty minutes away can take up to eight hours and multiple helpers, similar to rural healthcare access.
Helpers or personal care attendants (PCAs) were in short supply pre-pandemic. Typically, five PCAs are needed for every one that is available. It is common to have multiple people help one disabled person each week and, if they are lucky, a mix of family members can piece together the help needed throughout the day.
The costs of care are not often covered by insurance and can lead to significant out-of-pocket expenses. Given the number of people who filter through homes to support care needs, there is an increased exposure to COVID, leading many disabled people to cut back on help. Much of the burden of care has shifted to families, resulting in increased social isolation. Even public transportation became dangerous during the rapid spread of COVID.
Abilitech™ Assist Benefits
The Abilitech Assist is a powered orthotic device that provides functional assistance with activities of daily living (ADLs) for many people who live with arm weakness caused by long-term conditions such as Muscular
Dystrophy, Multiple Sclerosis, spinal cord injury, and stroke.
The Abilitech Assist device enables many everyday activities such as eating, drinking, and opening doors. The device is designed to help our patients with washing their hands and using a face mask, both important ways to prevent the spread of COVID, flu, and other illnesses. It also provides increased access to technology like cell phones and computers, which are particularly impactful because they provide an opportunity for communication.
Addressing the Heightened Logistical Challenges of Patient Isolation During the Pandemic
Over the past few years, the team at Abilitech Medical has conducted extensive research and worked one-on-one with disabled people and their care teams. This has given us important insights into the social challenges created by isolation. We have woven these findings into the
21| July 2021|www.insightscare.com
- By Angie Conley, Founder and CEO, Abilitech™ Medical
The Right Care
development of our products and focused on our mission to restore independence using assistive technology. Our technology literally opens doors to newfound independence.
Telehealth
One of the benefits that COVID brought was the increased use of telehealth. It makes sense for so many applications and we believe it will reduce costs of care and increase access to healthcare. Telehealth has been lifesaving for many people during the pandemic, and now those with limited use of their arms can also have access to virtual care, which helps close the healthcare equity gap for the disabled population.
Abilitech Medical was quick to pivot at the early onset of COVID and developed a telehealth assessment program to meet the needs of our clients. Our assessments helped to determine if the person would be a good candidate for the Assist, answer questions, gather information, and connect with a patient’s care team.
Easing Disruptions in Social Connections and Care
Research on the psychological impact of mass trauma (e.g., natural disasters, illness outbreaks) suggests that the pandemic might particularly harm the mental health of marginalized populations who have less access to socioeconomic resources and supportive social networks.
Social isolation and loneliness have also been associated with increases in heart disease, dementia, and other health problems, according to the Na�onal Academies of Science, Engineering, and Medicine.
These mental and physical impacts spiked during COVID. Disabled people, who already struggle with the mental stress of living with their longer-term conditions, were particularly susceptible to increased mental and physical challenges caused by further isolation and disconnection from social engagements and care.
Today, as social distancing guidelines lessen, the Assist can enable a person to hug a loved one – in person. Before the Assist was available, hugging, handwashing, and fist-bumping were not possible for many disabled people.
While adequate research on the specific impact of COVID-19 on the disability community is not yet available, several studies are underway or in the planning phase. At Abilitech Medical, we look forward to continuing to study the impact our products have on the health and wellness of the disabled population. Currently, we have a clinical study underway with Muscular Dystrophy patients at the University of Minnesota and Gillette Children’s Specialty Healthcare in St. Paul, Minn.
We feel privileged to play a part in solving the enormous challenges brought on by COVID for those already challenged by disabilities. We have witnessed a true resilience in so many whom, in the face of adversity, demonstrate determination and hope for a better future that includes new technology to restore independence, which will have mental, physical, and social benefits.
COVID gave many of us insight into what it feels like when a typical day is disrupted by severe limitations…just what the disabled population lives with even without the presence of a pandemic. COVID opened our minds and our hearts even further to keep innovating solutions
22| July 2021|www.insightscare.com
SUBSCRIBE
TODAYNever Miss An Issue
Stay in touch.Subscribe to Insightscare Get Insightssuccess
Magazine in print, & digital on www.insightscare.com
Check should be drawn in favor of :INSIGHTS SUCCESS MEDIA TECH LLC
www.insightscare.com
Spearheading the Cybersecurity Revolution
We live in a world that is driven by data. Leveraging this data for deriving beneficial outcomes is an empowering approach – and
equally vulnerable when in the wrong hands.
The discipline of cybersecurity caters to the latter part. Data and privacy protection is prioritized when cybersecurity solutions are implemented.
Companies operating in the cybersecurity sector are ceaselessly striving to deliver innovative and comprehensive solutions with the motive of aiding organizations to be less concerned about the security of their data. ISA Cybersecurity is one prominent name among leading cybersecurity companies catering to the healthcare sector.
ISA Cybersecurity has been recognized by IDC as a ‘Major Player’ in the Canadian security space. In a recent customer satisfaction survey conducted by IDC, the company was ranked #1 for ‘Highly Responsive Staff’, and #2 overall among security service providers in the Canadian market. The company is also proud to have preferred partner status with over 30 of the leading cybersecurity vendors in the world.
In the following interview, Kevin Dawson, the President & CEO of ISA Cybersecurity shares valuable insights about the cybersecurity industry and how ISA is planning to lead the game in 2021.
Here are the interview highlights of ISA cybersecurity:
Please brief our audience about ISA Cybersecurity, its mission, and the key aspects of its stronghold within the
cybersecurity niche.ISA Cybersecurity is proud to be Canada's leading cybersecurity-focused company, with nearly three decades of experience delivering cybersecurity services. We bring in real-world implementations of technology that are essential for customer success and that maximize the return on cybersecurity investment. We offer the perfect combination of large-firm expertise and small-firm flexibility for our services. Our corporate vision is straightforward: to help create a world in which everyone is safe from cyber threats.
Tell us more about your products and services which make your company stand out from the competition?We have a comprehensive cybersecurity practice embracing advisory and assessment services; architecture design and implementation services; digital forensics/incident response services; and an impressive range of hosted and managed services. But, I think a key differentiator is that we truly strive to make it easy to do business with us.
We understand that every customer has their own threat landscape, their own unique circumstances, their own budgetary constraints, and so on. So, we work with our customers to understand and define their requirements, then partner with them to deliver cybersecurity services on a project basis, short-term, long-term – whatever is the best fit for them.
What is your opinion on the impact of the current pandemic on the global cybersecurity space, and what challenges did you face during the initial phase of the pandemic?The COVID-19 pandemic definitely raised the global profile of cybersecurity. Threat actors saw opportunities to exploit security gaps created by the rush to support
24 | 2021 | www.insightcare.comJuly
Kevin Dawson
President & CEO
25 | 2021 | www.insightcare.comJuly
10 Best Cyber Security Companies in Healthcare For 2021
distributed remote workforces. Phishing scams and ransomware attacks reached all-time highs as criminals sought to capitalize on the fear and uncertainty that many of us were feeling.
The number of reported breaches over the last year and a half has been staggering, and no one was immune – SMBs were frequent targets, but high-profile and global companies suffered disruption and data loss as well. And, as we’ve seen, healthcare has been one of the most frequently attacked sectors, with dozens of breaches reported just in Canada and the United States alone.
From our perspective, ISA Cybersecurity was very well-positioned to withstand the sudden lockdown. As a technology company and specialists in cybersecurity, we already had a mature and well-tested distributed workforce structure in place – our operations were fully remote within hours of the first stay-at-home orders, and service levels to our customers were maintained without incident.
With continuous development in technologies such as AI and big data, what is your prediction about the future of the cybersecurity space pertaining to the healthcare services niche?Healthcare is one of the most frequently targeted industries for hackers. Hospitals provide an essential service, therefore, in the minds of the criminals, they are more willing to pay ransoms. Time and budget pressures often make it challenging for healthcare facilities to stay up to date with patching and staff training, creating potential exposures. And complex IT networks and hard-to-manage IoT device networks are increasingly commonplace. Given this risk landscape, sophisticated threat intelligence and advanced threat detection – powered by the latest in AI and machine learning – will become even more critical tools for the healthcare sector.
Threat actors are becoming increasingly sophisticated and persistent in their attacks, so healthcare needs to be more proactive in defending against both known and unknown threats and be prepared to recognize and block unauthorized activity patterns should they occur. Emerging cybersecurity technologies can help, since more traditional defenses cannot keep up.
As an established leader, what would be your advice to the budding entrepreneurs and enthusiasts aspiring to venture into the cybersecurity industry?
ISA Cybersecurity
has been recognized
by IDC as a ‘Major Player’
in the Canadian
security space.
“
“
It is no secret that there’s a shortage of cybersecurity talent out there today. I encourage anyone interested in pursuing a career in this field to get involved. ISA Cybersecurity has forged strong ties with several Canadian post-secondary educational institutions over the years, providing financial support and mentorship for tomorrow’s cybersecurity specialists.
We are also passionate about encouraging more women to pursue careers in cybersecurity. I believe there is always room for new ideas and new ways of thinking – we need strength in numbers and diversity to win the battle against cyber threats.
How do you envision scaling your company’s operations and offerings in 2021?Our cloud solutions are already highly available and almost limitlessly scalable. We hired several additional staff members in 2020, and the headcount growth this year has been strong as well. As our client base has expanded, we are making sure that we are fully staffed to continue to provide top-flight cybersecurity services and support.
We are also very excited about the launch of a new cybersecurity service practice in fall of 2021. While I’m not at liberty to discuss the details just yet, I encourage readers to bookmark our website at www.isacybersecurity.com and subscribe to our CyberCast newsletter for the latest developments as they are announced.
About Kevin DawsonKevin has nearly 30 years’ experience in the IT industry and is a recognized expert in the cybersecurity field. In addition to leading ISA Cybersecurity, Kevin is actively involved in the academic community, advocating for cybersecurity education at the post-secondary level in Canada.
He serves as an advisor to two Canadian universities, providing mentorship around cybersecurity and program development. Kevin is an active member of several advisory boards for industry-leading cybersecurity vendors, a frequent speaker and facilitator for cybersecurity-focused events, and a regular contributor of security articles and thought leadership on LinkedIn.
26 | 2021 | www.insightcare.comJuly
Password Protection:
5
things you
shouldn’tdo with your
Passwords In the internet age, almost all of our essential tasks are conducted online – whether work-related or
something personal. We create accounts on the internet for different sites and are asked to create strong passwords everywhere. But what is the purpose of a password, let alone a strong one?
Passwords or passphrases help act as the first line of defense against any kind of unauthorized user trying to infiltrate into your personal and confidential information. With the growing internet world, phishing or hacking attacks have become more common, and having a strong password helps one stay safe from any such attacks that try to get access to your private information.
28 | July 2021 | www.insightcare.com
#Self_Secure
29 | July 2021 | www.insightcare.com
Following are the top five things you shouldn’t do with your passwords to stay safe:
Don’t write your password down anywhere – This is one of the worst mistakes one can make with handling their password. There is no use in creating a strong password if you’re writing it down somewhere, especially if you’ve written down your password in a place easily accessible to people. Writing your password down in your diary, notebook, or someplace visible to other people can cost you your privacy and security.
A better alternative to writing your password down somewhere is getting a password manager, which stores and locks all your passwords under a single Master Password. Popular password managers like KeePass and Kaspersky Password manager help you create dozens of unique and strong passwords using only one Master Password that you need to remember ensuring better protection against potential hackers.
Don’t use the same password over multiple websites – It’s hard to remember all the unique passwords one creates to log in to multiple websites. Hence, people end up doing the easy thing: setting the same password for multiple websites. This is again a grave error that one makes with managing their password.
In case a hacker cracks down on even your strong password on a particular website, he now has access to all the important websites that you logged into, revealing all your confidential information due to the websites sharing the same password set by you. It is crucial to have a unique and strong password for every website that you visit to ensure maximum security.
Don’t share your password with people – People often end up telling or sharing their password with people they trust, which can sometimes prove to be a serious blunder they make with their password.
One can never know if another person has malicious intentions in their mind. Keeping your password secretive is a very important step in ensuring good password protection. When you alone know your password, you don’t have to worry about other people leaking that information anywhere.
Don’t use personal information while setting your password – Using your personal information while setting your password makes it easy for people to guess your passphrase. People often use information like their birth date, the name of their loved ones, or information similar to this kind to create their password.
Using information like that makes it simple for a potential hacker to hack into your account and get access to your private or personal information. Try to use unique symbols and random alphabets and numbers to make your password super secure from being guessed.
Don’t keep the same password for longer – Changing your passwords once in a while to a unique and strong one ensures utmost security against having your accounts hacked. This might seem like a mundane task to do, but practicing this method is one of the proven ways to keep safe from potential cyberpunks.
Revise and look through the passwords you haven’t changed in years and update them to a unique passphrase. That being mentioned, don’t change
your passwords too often. As stated by a study conducted by the Federal Trade Commission, people who change their password regularly make it 48% easier for them to get exposed to hacking. Changing passwords too often will result in you creating uncomplicated passwords that are easy to guess.
Practicing these don’ts of creating and managing passwords will help you ensure great security against phishing or hacking attacks. Another tip to help you ensure good security on the internet is to create a strong recovery question if you forget your password and have to recover it by answering a personal question that only you know an answer to.
Having a weak recovery question will render the strongest of passwords useless as a potential hacker or relative can easily guess it and hack into your account. Keeping a check on all these factors will help you with the highest possible protection of your sensitive information.
- Trishika R.
30 | July 2021 | www.insightcare.com
While technology has simplified our lives, it has also created new problems with threats to our data, privacy, and business operations.
During the initial phase of COVID-19 pandemic, the world saw the best and worst of technology. The unprecedented speed of developing effective COVID vaccines was enabled by breakthroughs in biotech, but hackers exploited the tech infrastructure to attack the global vaccine supply chain and more.
The pandemic casts a sharp light on the need for robust cybersecurity in healthcare. SafeBreach is the top cybersecurity solution provider that delivers a 'hacker's view' of an enterprise's security posture for total and continuous security assessment, validation, and to help prioritize and remediate based on where the biggest risk is to the business.
SafeBreach, under the leadership of its co-founders Guy Bejerano, CEO, and Itzik Kotler, CTO, has successfully stepped up with a groundbreaking platform that empowers businesses to fully utilize their security technologies by minimizing the technological risks. Major healthcare providers are using SafeBreach’s patented breach-and-attack simulation platform to reduce their attack surface and business risk. The following interview covers the genesis of SafeBreach and how the company has progressively advanced its capacity to help customers secure their business operations.
Please brief our audience about your company, its mission, and the key aspects of its stronghold in the cybersecurity niche.SafeBreach’s mission is to change the way that industry deals with security and risk and enable companies to use the security technologies they have invested in, to their fullest capability. By validating those technologies against attacks, from the known to the latest emerging threats, businesses continuously drive risk down. The core function that SafeBreach delivers is security control validation. When companies know which security controls actually work in their environment, they can invest for real impact, and protect more. They can quantify risks to the business and drive a security strategy aligned with the company's business growth. What SafeBreach does – validate security
controls continuously – changes the mindset of defenders to offensive and proactive, and the end result is that we help to build a safer world.
Tell us more about your products and services which make your company stand out from the competition?SafeBreach is the world’s most widely used continuous security validation platform in enterprise companies. The company's patented platform empowers CISOs and their teams to validate security controls, maximize effectiveness of those controls, and drive down risk.
SafeBreach provides a ‘hacker’s view’ of an enterprise’s security posture by continuously validating security controls. It presents and dynamically updates findings in customized dashboards to enable stakeholders to focus with precision on the biggest risks to the organization.
SafeBreach automatically and safely executes thousands of attack methods to validate the network, endpoint, cloud, container, and email security controls against its Hacker’s
TMPlaybook , the world’s largest collection of attack data broken down by methods, tactics, and threat actors. Data from SafeBreach validations can improve SOC team responses and empower management teams to better manage risk and invest resources.
SafeBreach is recognized by Frost & Sullivan as the Leader in the Breach and Attack Simulation Market in 2021. See the Frost Radar/Quadrant published in 2021.
SafeBreach Maximize Security Control Effectiveness. Reduce the Attack Surface.
32| July 2021|www.insightscare.com
Guy Bejerano, CEO
Guy Bejerano is co-founder and CEO of SafeBreach, a pioneer in the emerging category of continuous security validation. Before SafeBreach, Guy was CSO of LivePerson, leading the security of one of the world's largest cloud platforms and providing security for more than 1 billion web visits across the internet each month. Guy has more than 24 years of deep domain expertise in operational, application, and network security, specializing in building security programs for global companies and cloud services, including the Information Security branch and red-team operations of the Israeli Air Force.
Itzik Kotler, CTO
Itzik Kotler is CTO and Co-Founder of SafeBreach. Itzik has more than a decade of experience researching and working in the computer security space. He is a recognized industry speaker, having spoken at DEFCON, Black Hat USA, Hack In The Box, RSA Europe, CCC, and H2HC. Before founding SafeBreach, Itzik served as CTO at Security Art, an information security consulting firm, and before that he was SOC Team Leader at Radware (NASDQ: RDWR).
ABOUT THE LEADERS
SafeBreach's mission is to change the way the industry deals with security and risk and enable
companies to use the security technologies they have invested to the fullest.
“
“
33| July 2021|www.insightscare.com
Following are the most impactful differentiators of the SafeBreach platform in addressing customer needs. Fulfills Operational NeedsŸ SafeBreach generates insights
automatically to ensure remediation, at scale, of the highest priority gaps. The platform correlates data-driven results from testing security controls against numerous attack scenarios to automatically identify the highest priority security gaps, so that teams can focus on the most impactful remediation efforts.
Ÿ Integration with SOAR platforms for automated remediation of security gaps. Tight integration with Cortex XSOAR now fully automates fast-changing IOCs such as hashes, IPs, and domains that have been proven to breach enterprise companies. Ensures security controls are updated quickly and effectively while orchestrating the behavioral indicators so your security team is aligned to defend the business.
Ÿ Prioritization of vulnerability patching based on the likelihood of exploitability, impact on critical assets, and external access.
Ÿ Scale and maturity.
Progress from Operational to StrategicŸ 24-hour SLA for emerging threats
to deliver organizational security posture for imminent threats.
Ÿ Prioritization of security gaps in the context of the threats they represent.
Ÿ Security posture assessment based on the MITRE ATT&CK framework to allow for a uniform and contextualized security program management around MITRE ATT&CK including the new MITRE v9 techniques.
StrategicSafeBreach provides unique
capabilities that enable CISOs and security teams to be more strategic every day, while pushing a transition to more offensive security, versus defensive and reactive. Ÿ Optimizing risk and value in a
business context.Ÿ Help the CISO to quantify risk.Ÿ Support priority and investment
decisions in a business context.Ÿ Identify risk to revenue with the
security posture of revenue-generating business units.
Ÿ Communicate to the board with clear KPIs to show security program effectiveness in systematically reducing risk.
Ÿ Determine and justify spend on security tools, based on outcome-driven metrics.
SafeBreach Labs - and 24-hour SLA on new US CERT alerts Our research teams are dedicated to maintaining the SafeBreach platform at maximum potential. They achieve this by arming the platform with the industry leading SafeBreach Hacker’s Playbook of attack methods, which our researchers work constantly to expand and strengthen. SafeBreach Labs externally monitors the hacker underground, sources intelligence feeds, and collaborates with external security research teams. We are dedicated to providing the latest attack methods to our customers and we uphold a 24-hour SLA on adding attacks identified from US Cert Alerts. SafeBreach Labs researchers also continuously identify new attack methods before hackers discover them as a part of our research and development effort to simulate the hacker. This research is shared with the security community at leading conferences such as Black Hat, RSA, and DEFCON. SafeBreach Labs also contributes techniques to the MITRE ATT&CK framework. Customer Success Team Designed to Help Customers Operationalize the
SafeBreach PlatformCustomer Success Account Managers as a single point of contactSafeBreach Customer Success Managers team consists of Customer Success Account Managers (CSAM) who focus on business outcome and relationship management of customers and Technical Customer Success Managers (TCSM) who focus on delivering technical deliverables for each use case along with technical support. Each customer is assigned a CSAM and TCSM with CSAM being a single point of interface.
SafeBreach Customer Success Account Managers (CSAM) along with Technical Customer Success Manager (TCSM) assigned for each customer perform key functions for each customer such as use case workshops, deployment of the SafeBreach platform in the Customer Environment, Technical Support, and Proactive Customer Success Management with business review and ROI assessments with a single point of contact for all post-sales needs of the customers.
Deployment/Professional ServicesAfter a formal post-sale kick-off meeting, assigned Customer Success Account Managers and Technical Customer Success Managers for each customer account follow a structured process and engagement model to work with the customer’s security teams, SOC, and CISO office bearers to explore and review all use cases of the customers, scope the deployment of the SafeBreach Platform, provide technical consulting, project management to roll out in multiple phases, provide training for all customer team members and help customers operationalize the SafeBreach Platform.
24/7 Technical SupportThe Customer Success Team (Technical Customer Success Managers) is also responsible for technical support of customers 24x7 helping customers get their support issues addressed in a timely and
10 Best Cyber Security Companies in Healthcare For 2021
34| July 2021|www.insightscare.com
efficient manner. Instead of a tiered model with potential time delays, customers have a single point of contact through their assigned Customer Success Manager. Complementing the assigned Technical Customer Success Managers, customers also are assigned a personalized support engineer who has full knowledge of the customer environment. This significantly speeds up resolution of issues and dispenses with the friction and time delay of triaging support calls. Continuous Product Engagement Our Customer Success Team acts as a bridge between customers and the SafeBreach product management team to conduct various product beta programs helping early vetting and adoption of new features. Each CS team member relays key product feedback from their customers to the product team as they come, documenting each of the requests and tracking them until the feedback is addressed or new features are shipped to respective customers. The CS Team also facilitates periodic roadmap sessions, and walks customers through new features.
What is your opinion on the impact of the current pandemic on the global cybersecurity space, and what challenges did you face during the initial phase of the pandemic? Companies needed to do more with less to protect against the existing and new types of threats. Attackers were exploiting the pandemic targeting the healthcare industry and the COVID-19 vaccine supply chain. SafeBreach experienced a significant widening in demand for its platform from financial services to healthcare, manufacturing, technology, utilities, transportation, government, retail, and other industries. Using SafeBreach, security professionals can validate and maximize the effectiveness of the controls they already have. With SafeBreach they prioritize which security gaps need to be fixed first. The sequence of remediation is based on the greatest impact to the business. Security professionals using SafeBreach can guide their organizations on where to prioritize new investments to lower cyber risk overall. With continuous development in technologies such as AI and big data, what is your prediction about the future of the cybersecurity space pertaining to healthcare services? AI and big data are valuable technologies that are becoming pervasive, and they will change healthcare as well as other domain problems. Having said that, they are not immune to security attacks whether it's on the infrastructure or the actual implementation and that's something to keep in mind.
Ÿ Frost Radar 2021: Global Leader in Breach and
Attack Simulation Market
Ÿ Frost & Sullivan: 2021 Company of the Year in
Breach and Attack Simulation
Ÿ Globee Global Excellence -- Cyber Security - for BAS
2021
Ÿ Forbes, 2020 - The 20 Best Cybersecurity Startups
To Watch In 2020.
Ÿ Calcalist - 2020 The 50 Most Promising
Cybersecurity Startups in Israel
Ÿ Hot 150 Cyber Security Companies 2020
Ÿ TAG Cyber - Distinguished Vendor 2020 (50 chosen
from 1700)
Ÿ CRN - 2019 Emerging Vendors to Know in 2019
Ÿ CRN - Top Cybersecurity Startups
Ÿ CNBC Upstart 100 – 2018
Ÿ Gartner Cool Vendor 2017
Ÿ Dark Readings' Best of Blackhat Awards 2016
Finalist
Ÿ RSA Sandbox Finalist 2016
Ÿ Network World Hot Security Companies to Watch in
2016
Ÿ SINET 2016 Innovator
Ÿ CRN Tech Innovators 2016
Rewards
and
Recognitions
35| July 2021|www.insightscare.com
As an established leader, what would be your advice to the budding entrepreneurs and enthusiasts aspiring to venture into the cybersecurity industry?Dream big, don't be afraid to take on a big problem, of which there are many in the cybersecurity industry, and commit yourself to solving it.
How do you envision scaling your company's operations and offerings in 2021?In 2021, we have accelerated product development, and expanded channel partnerships in North American and around the world. We will continue to expand our presence in EMEA and APAC markets this year and next.
SafeBreach and its team have been able to win recognition
and awards, including from industry-shaping entities like
Forbes, Frost & Sullivan, Gartner, CNBC, Dark Reading,
and CRN, among others.