There’s been no slowdown when it comes to healthcare-related security breaches. For the 12 months through July 2021, 706 healthcare data breaches (of 500 or more records) were reported to the U.S. Department of Health and Human Services Office for Civil Rights (OCR). Those 706 breaches exposed the records of a whopping 44,369,781 people.
A big part of the reason healthcare data breaches are so prevalent — and damaging — is because attackers can linger for extended periods within healthcare networks. Consider that IBM’s Cost of a Data Breach Report 2020, which found the average time to identify a breach in 2020 was 228 days (that’s just too long). Yet, the average time within the healthcare industry was 329 days (that’s way too long).
For the healthcare industry to mitigate the damage from such security breaches, healthcare providers need to get proactive when chasing down threats in their organizations.
What is threat hunting?
Like ‘AI’, ‘machine learning’, or ‘actionable intelligence’, ‘Cyber Threat Hunting’ has become an industry buzzword that is used in multiple contexts and now has no clear definition. But understanding how to hunt across an environment requires that we must first understand exactly what Cyber Threat Hunting