Cybersecurity Challenges Faced by the Healthcare Industry

Cybersecurity, computer network security or information security is the security of computer networks and computers from malicious computer activity, data loss or damage, and also from the intentional or unintentional disruption or misuse of the services provided. In other words, it is about the prevention of security breaches, the hacking or other damage of a system, whether done deliberately or unintentionally. These activities may include sabotage (by a person or group) or vulnerability (by a program or device). The latter refer to the ability of a system or application to gain access to or utilize a system that does not properly protect its secrets. It also covers the unintentional communication or collaboration with another entity that is trying to break into or misuse security of a system.

The rise of terrorist groups and coordinated cyber attacks by rogue nation-states has put the global IT and cyber defense communities under pressure to develop tools, techniques and procedures that can better detect, prevent, and defend against emerging and ongoing cyber threats. A major part of this worldwide effort focuses on the detection, prevention and response to strategic and tactical cyber warfare or offensive operations. One area of growing concern in cyberdefense is spear phishing. Spear phishing involves a cyber attacker sending emails or threats to a target computer that appear to be those of legitimate businesses or organizations. These organizations often view the emails as coming from someone they know. As a result, they contact their computer owners and ask them to click on a link in the email that supposedly leads to a valuable information source.

Other forms of cyber malware include denial of service, which allows an attacker to shut down a server or network because the attacker thinks it is not secure anymore. This leaves all users unable to access the Internet or use any type of online storage. This includes email servers, websites, and internal network components. Another popular form of malware is malware that creates additional vulnerabilities for a host system through simple configuration or ‘rapid vulnerability.’ Finally, there is the so-called malware that attacks and installs keyloggers, backdoor programs, backdoor software and other malicious software to monitor and collect user data.