healthcare is one of the most cybertargeted … · advanced persistent threats (apts) ddos other...

3
HEALTHCARE IS ONE OF THE MOST CYBERTARGETED INDUSTRIES IN THE WORLD Leading Attacks and Vectors Desktops Email Everything Else 60% 30% PHISHING, SPEARPHISHING & WHALING RANSOMWARE TROJANS ZERO-DAY THREATS WE DIDN’T KNOW ABOUT UNKNOWN ADVANCED PERSISTENT THREATS (APTS) DDoS OTHER BRUTE FORCE Why are desktops a common threat vector? Maintaining all the agents in your enterprise is extremely difficult. Desktops are a threat because they have outdated agents on them Read the full SANS Report SANS Healthcare Provider Breaches and Risk Management Road Maps, July 2016

Upload: others

Post on 14-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HEALTHCARE IS ONE OF THE MOST CYBERTARGETED … · ADVANCED PERSISTENT THREATS (APTS) DDoS OTHER BRUTE FORCE Why are desktops a common threat vector? Maintaining all the agents in

HEALTHCARE IS ONE OF THE MOST CYBERTARGETED INDUSTRIES IN THE WORLD

Leading Attacks and Vectors

Desktops

Email

Everything Else

60%30%

PHISHING,SPEARPHISHING& WHALING

RANSOMWARE

TROJANS

ZERO-DAY THREATSWE DIDN’T KNOW ABOUT

UNKNOWN

ADVANCED PERSISTENTTHREATS (APTS)

DDoS

OTHER

BRUTE FORCE

Why are desktops a common threat vector?

Maintaining all the agents in your enterprise is extremely difficult.

Desktops are a

threat because they

have outdated agents on them

Read the full SANS Report

SANS Healthcare Provider Breaches and Risk Management Road Maps, July 2016

Page 2: HEALTHCARE IS ONE OF THE MOST CYBERTARGETED … · ADVANCED PERSISTENT THREATS (APTS) DDoS OTHER BRUTE FORCE Why are desktops a common threat vector? Maintaining all the agents in

THIRD-PARTY WORKERS CONNECTING TO YOUR NETWORKS

Contractor Management

See Control Orchestrate

What is the risk to organizations

from third-party workers?

— Protect sensitive systems & data

— Securely enable multi-level guest access

— Comply with regulatory mandates

— Simplify network access control

NEGLIGENT

HUMAN THREATS

16%8% 8% MALICIOUS

THE SOLUTION:

ForeScout

Guest/Visitor/Contractor Management is important in guarding against Third Party Risks

Learn More About ForeScout’s Guest Access Management Solution

SANS Healthcare Provider Breaches and Risk Management Road Maps, July 2016

Page 3: HEALTHCARE IS ONE OF THE MOST CYBERTARGETED … · ADVANCED PERSISTENT THREATS (APTS) DDoS OTHER BRUTE FORCE Why are desktops a common threat vector? Maintaining all the agents in

Traditional

mobile device

management is

ineffective and

hospitals are

worried about

mobile access

and unsecure

devices

connecting to

networks.

ForeScout mobile and BYOD offerings can help secure these devices.

HOSPITALS ARE CONCERNED ABOUT UNSECURE DEVICES

Securing Mobile & BYOD Devices

COMPANY-ISSUED BOTH BYOD

13.4% 47% 29.1%

22.0% 57% 9.4%

12.6% 65% 7.9%

9.4% 51% 22.0%

12.6% 48% 20.5%

14.2% 51% 15.0%

INSECURE/UNPROTECTED ENDPOINTS

LOST OR STOLEN MOBILE DEVICES

LACK OF EMPLOYEE AWARENESS ABOUT SECURITY POLICIES

CORRUPT OR MALICIOUS MOBILEAPPLICATIONS INFECTING ENDPOINTS

INSECURE WEB BROWSING

INSECURE WI-FI USE

RISK OF PROPERLY COMPLETINGEDISCOVERY DEMANDS

14.2% 37% 15.7%

Learn more about how you can secure Mobile and BYOD devices

SANS Healthcare Provider Breaches and Risk Management Road Maps, July 2016