top of page

Blog Samples

Client: Foxnet IT Shared Services Provider, Canada

What makes healthcare data so valuable to cyber-criminals?

The unique risks and results that our digital healthcare systems face.

 

When it comes to cybersecurity these days, most people are more concerned about keeping their financial information safe than their health information, even though their PHI (Personal Health Information) is significantly more valuable on the black market. When a bad actor obtains the name, birth date, social security number, and medical history for an individual, not only can they establish a counterfeit identity, they can bill insurance companies for phony medical procedures. Cybercrime Magazine recently quoted former FBI Special Cybersecurity Agent Scott Augenbaum as saying:

 

“It’s dangerous out there, bad guys steal your stuff; you’re probably not getting it back. It’s not that I’m telling organizations that they have to completely change the way they do things. They just need some individuals who know how to prevent this problem, so they don’t need to be the next victims of identity theft or cybercrime.”

 

As if the challenge of COVID 19 were not enough for healthcare workers right now, hackers have used it as an opportunity to capitalize on the special risks that exist in the digital healthcare environment including:

  • Lack of a two-factor authentication process.

  • Gaps in security systems for health care providers who work from home.

  • Being an attractive target for ransomware attackers who are willing to hold data hostage even if it puts patients’ lives at risk – there have been as many as 36 cyber-security-related deaths per 10,000 patients according to researchers at Vanderbilt University.

  • The number of unencrypted, unsecured medical devices that are interconnected and need to be in order to deliver quality patient care.

 

The healthcare industry experiences two-to-three times the number of cyberattacks each year when compared to other verticals and has seen triple digit increases since 2018. Going forward, Cybersecurity Ventures, an organization that is dedicated to cybersecurity research and statistics, believes that "people can be hacked via their wirelessly connected and digitally monitored implantable medical devices (IMDs) — which include cardioverter defibrillators (ICD), pacemakers, deep brain neurostimulators, insulin pumps, ear tubes, and more.” This, combined with a current shortage in cybersecurity professionals that is sure to grow over the next decade, are serious causes for concern!

 

At FoxNet, we can help. Our Managed Services provide healthcare organizations peace of mind by constantly monitoring their networks to prevent data breaches, protect them from ransomware threats, and identify phishing expeditions that have been created to steal PHI.

 

For many years we’ve been designing, deploying, and managing IT infrastructures in on-premises, cloud, or hybrid environments – and are known throughout the region for helping organizations of any size overcome their IT challenges and achieve their IT goals. We’re a community-minded organization that was recently recognized as one of Canada’s Top 100 Service Providers by CDN Industry magazine and included in Cloudtango’s Top 50 MSPs in Canada list.  If you’d like to learn how you can keep your business in the cloud safely and your operations running smoothly, reach out to us today or email info@foxnetsolutions.com.

Client: Privafy Internet Security

 

Arrow and Privafy: A Revolutionary Security Offering

Did you know that 80% of security breaches involve data-in-motion incidents? Last week, Privafy’s VP of Sales, David Tipping, kicked off some revolutionary new security offerings in the Arrow Webinar, Driving MRR With Security-as-a-Service.

Privafy founders Rick Clemmer (CEO, NXP Semiconductors), Guru Pai (former Chief Product Officer, Verizon and founder, Verizon Labs), Kumar Vishwanathan (former Chief Technologist and founding member, Verizon Labs) and Sundar Rangamani (former Chief Technologist, Verizon) came together to create Privafy because they agreed on one thing; today’s traditional security infrastructures can’t keep up. They envisioned a cloud-native application that would simplify security to protect business from data-in-motion threats with one single solution.

It all started when they realized that managed security was, at the time, the only layer in the security stack without a SaaS solution. They knew that every business, no matter the size, needs comprehensive, easy-to-use security that doesn’t require a huge upfront investment. They wanted to build a partnership with MSPs and MSSPs by creating a security product that provides monthly recurring revenue and doesn’t require constant patching or a team of experts to keep it up and running.

Privafy products can be tailored to fit your needs. CloudEdge™ secures the workloads of public and private clouds, AppEdge™ protects data traveling to and from individual devices, and NetEdge™ ensures on-premises security. PrivafyCentral provides unified management that monitors data security and trends in one place. It has a single portal for all locations, mobile devices, and clouds. It provides detailed analytics across all functions, sets off real-time alerts, and administers policy control and tracking by application.

Imagine the relief that your clients will feel when you show them how Privafy has revolutionized security by building a system that requires no local administration, provides automated monitoring and response, as well as automated patching, fixes, and updates. As a service provider, you will be able to serve more customers, maximize margins, and scale your business without increasing costs.

Intrigued?

Watch this Arrow webinar to discover more details or contact Brendan Bradley to get started today!

Kathleen Booton

kabooton@gmail.com

303.916.7308

All original images and text copyright © 2018 Kathleen Booton
bottom of page