There’s been no slowdown when it comes to healthcare-related security breaches. For the 12 months through July 2021, 706 healthcare data breaches (of 500 or more records) were reported to the U.S. Department of Health and Human Services Office for Civil Rights (OCR). Those 706 breaches exposed the records of a whopping 44,369,781 people.
A big part of the reason healthcare data breaches are so prevalent — and damaging — is because attackers can linger for extended periods within healthcare networks. Consider that IBM’s Cost of a Data Breach Report 2020, which found the average time to identify a breach in 2020 was 228 days (that’s just too long). Yet, the average time within the healthcare industry was 329 days (that’s way too long).
For the healthcare industry to mitigate the damage from such security breaches, healthcare providers need to get proactive when chasing down threats in their organizations by employing the art of threat hunting.
What is threat hunting?
Threat hunting is a proactive security approach where analysts meticulously comb through networks to detect and quarantine cyber threats that elude standard cybersecurity measures. Standard security measures include firewalls, anti-virus or malware freeware and other reactive type cyber programming.