top of page
Writer's pictureEnterra

Healthcare Wakes Up to Cybersecurity Risks: Mapping Weaknesses & Building Resilience

The healthcare industry is taking a big step towards fortifying its defenses against cyberattacks. The Department of Health and Human Services (HHS) is spearheading a project to map vulnerabilities caused by single points of failure in the healthcare technology landscape.


This initiative comes after a February ransomware attack on Change Healthcare, a critical UnitedHealth Group unit, sent shockwaves through the system. The attack disrupted claims processing, impacting millions of dollars in payments. The cascading effects caught care providers, regulators, and lawmakers by surprise, highlighting the dangers of relying on a single dominant provider for essential services.


Why is a Single Point of Failure Risky?

Imagine a major highway being shut down entirely because of a single bridge closure. That's the kind of disruption a cyberattack on a dominant technology provider can cause in healthcare. When a large portion of the industry relies on one company for a crucial service, a successful attack on that company can cripple the entire system.

The Change Healthcare attack exemplifies this risk. The company processes a massive chunk of healthcare funds, and the cyberattack froze those funds, causing significant disruptions for providers and patients alike.


Mapping the Weaknesses

The HHS project aims to create a roadmap of these vulnerabilities. By identifying companies that act as chokepoints, the healthcare sector can be better prepared to address potential disruptions. This map will likely pinpoint areas like electronic medical records (EMR) systems, where a limited number of suppliers hold significant sway.


Benefits of the Risk Map

A comprehensive risk map offers several advantages:

  • Targeted Solutions: Knowing the weak spots allows for focused efforts to strengthen cybersecurity in those areas. The government and healthcare companies can work together to develop specific plans for shoring up these vulnerabilities.

  • Improved Preparedness: By pinpointing potential chokepoints, healthcare providers can plan for emergencies and outages. This could involve having backup suppliers in place or conducting joint incident response exercises with key tech vendors.

  • Industry-Wide Attention: The map will raise awareness about cybersecurity risks across the healthcare sector. This can lead to increased investment in security measures and a more proactive approach to protecting sensitive patient data.


Challenges and Potential Solutions

Cost remains a significant hurdle for smaller healthcare providers who may not be able to afford the redundancy offered by backup suppliers. The project discussions are exploring ways to address this challenge, such as negotiating pre-arranged agreements with alternative vendors for emergency situations.

The industry is also looking at collaborative solutions, like practicing incident response scenarios with tech providers. This would involve simulating outages to test response plans and identify areas for improvement.


Understanding and Achieving Cybersecurity Maturity with Enterra

The healthcare sector's journey towards cybersecurity maturity aligns perfectly with Enterra's Cybersecurity Maturity Model. This model outlines various stages of cybersecurity preparedness, ranging from minimal to adaptive. As the HHS project identifies areas of vulnerability, healthcare organizations can utilize Enterra's model to assess their current security posture and develop a roadmap for improvement.

Enterra's model emphasizes that cybersecurity is an ongoing process, not a destination. Here's a simplified breakdown of the stages outlined in the model, alongside the

technological solutions that can help organizations climb the 5 stage maturity ladder:


  • Minimal Stage: Basic or no formal measures in place.

  • How we Engage: Identify critical systems and data, and implement basic security measures like firewalls and antivirus software.


  • Basic Stage: Some awareness and rudimentary practices, but still susceptible to attacks.

  • How we Engage: Develop a formal cybersecurity policy and conduct security awareness training for staff. Implement basic threat detection like Early Warning Cyber Systems (EWC) and added response tools.


  • Coordinated Stage: More robust security measures with formalized programs and proactive strategies.

  • How we Engage: Integrate security into existing workflows. Implement Endpoint Detection and Response (EDR) to strengthen endpoint security. Utilize Cloud Access Security Brokers (CASB) for cloud environments.


  • Proactive Stage: Proactive management with cutting-edge technologies for enhanced resilience.

  • How we Engage: Leverage Security Orchestration, Automation, and Response (SOAR) platforms to automate incident response. Implement Zero Trust Security to enforce strict access controls. Utilize Extended Detection and Response (XDR) for a comprehensive view of your security posture.


  • Adaptive Stage: Continuously evolving security architecture to stay ahead of emerging threats.

  • How we Engage: Regularly review and update security measures based on the latest threats and vulnerabilities. Conduct penetration testing to identify and address security weaknesses.


Call To Action

As cyber threats evolve, so must the healthcare sector's approach to cybersecurity. Enterra stands ready to partner with healthcare organizations on their journey towards cybersecurity maturity. By leveraging Enterra's expertise and the insights from the HHS mapping project, healthcare providers can build a more secure and resilient infrastructure for patient data and critical healthcare operations.


The importance of protecting critical infrastructure has never been greater. A secure healthcare system is not just vital for patient care, it's a linchpin in the overall health and well-being of a nation. By working together, the healthcare sector, technology providers, and government agencies can ensure a future where critical healthcare services remain safe and accessible for all.

ความคิดเห็น


bottom of page