Anthem Hack, Cracked



Similar documents
Preemptive security solutions for healthcare

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Perspectives on Cybersecurity in Healthcare June 2015

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Things To Do After You ve Been Hacked

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

End-user Security Analytics Strengthens Protection with ArcSight

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

CyberArk Privileged Threat Analytics. Solution Brief

Evolution Of Cyber Threats & Defense Approaches

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Combating a new generation of cybercriminal with in-depth security monitoring

Protect Your Business and Customers from Online Fraud

12 Security Camera System Best Practices - Cyber Safe

Managed Security Services

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Fighting Advanced Threats

HIPAA Security Alert

THE COST OF A DATA BREACH FOR HEALTHCARE ORGANIZATIONS

The Cloud App Visibility Blindspot

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Managed Security Monitoring Quick Guide 5/26/ EarthLink. Trademarks are property of their respective owners. All rights reserved.

Technical Testing. Network Testing DATA SHEET

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

Stay ahead of insiderthreats with predictive,intelligent security

A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD

IBM QRadar Security Intelligence April 2013

Seven Strategies to Defend ICSs

Internet threats: steps to security for your small business

A HELPING HAND TO PROTECT YOUR REPUTATION

SITECATALYST SECURITY

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

Doyourwebsitebot defensesaddressthe changingthreat landscape?

Requirements When Considering a Next- Generation Firewall

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

Compromises in Healthcare Privacy due to Data Breaches

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

2015 VORMETRIC INSIDER THREAT REPORT

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

I ve been breached! Now what?

Bridging the gap between COTS tool alerting and raw data analysis

Content Security: Protect Your Network with Five Must-Haves

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

IBM Security QRadar Vulnerability Manager

Vulnerability Assessment and Penetration Testing Across the Enterprise:

Cisco Advanced Malware Protection

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Comprehensive Advanced Threat Defense

Cisco Security Optimization Service

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Streamlining Web and Security

Big Data and Security: At the Edge of Prediction

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Extreme Networks Security Analytics G2 Vulnerability Manager

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Whitepaper. Advanced Threat Hunting with Carbon Black

I D C A N A L Y S T C O N N E C T I O N

TECH GUYS. Protect Your Practice with a Security Risk Assessment. HCTechGuys.com. HCTechGuys.com TECH GUYS

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Ecom Infotech. Page 1 of 6

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Update on Anthem Cyber Attack General Information for Clients and Brokers

INFORMATION SECURITY FOR YOUR AGENCY

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

AUTOMATED PENETRATION TESTING PRODUCTS

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

PCI Compliance for Cloud Applications

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cyber Security Metrics Dashboards & Analytics

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Analyzing HTTP/HTTPS Traffic Logs

BSHSI Security Awareness Training

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Why Data Security is Critical to Your Brand

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How To Manage Security On A Networked Computer System

Carbon Black and Palo Alto Networks

Transcription:

Anthem Hack, Cracked Failed SIEM Deployment Jolts Industry Today, with so much finger-pointing and talk about Anthem Blue Cross, security failures, who s doing what and who s getting hacked, one of the most important security matters seem clearly to escape the executives with the most skin-in-thegame. The question of course is Quis custodiet ipsos custodes? or, translated from Latin: Who s guarding the guards. This paper presents the case for an effective, properly deployed and administered Security Information Event Management (SIEM) system with supporting processes that mandates event notification escalation. So, "Who s guarding the guards? My close friend Eric N. (CISSP/Security Expert of a nondisclosed enterprise healthcare company) has always asked and said this is the challenge that needs to be addressed and then, readdressed regularly. Concerning Anthem, it is very odd that a DBA would be making application inquiries on sensitive ephi, but it s even odder that a basic SIEM system would have failed to catch this anomaly in the 1 st place. Rather, the SIEM administration is what seemed to fail because if it was properly deployed and they administered the system correctly, the event notification escalation would have protected Anthem for what is now known as the largest HIPAA related date breach in history. Synopsis: The correct SIEM deployment would have guaranteed that more than one set of eyes would have been notified the moment the suspicious activity began. Thus, the proper administration of a SIEM system as found with US ProSIEM would have / could have prevented the Anthem Blue Cross security breach said Jonathan Goetsch, CEO of Las Vegas, Nevada based US ProTech, Inc. "But it also clearly shows that there are folks trying to profit from exploiting and breaching the data." US ProTech found that Internet-connected devices from data bases and billing systems to dialysis machines and the Claims Department -- are getting hammered by malicious attacks. The Report, which measured malicious traffic at healthcare organizations during a one-month period last fall, found almost 50,000 unique attacks across more than 700 devices, with some 375 organizations compromised. The compromised devices ranged from radiology imaging software and Web cameras to firewalls and mail servers, just to name a few.

Virtual private networks were among the most compromised system, accounting for more than 30% of all compromised connected endpoints. Hacked documents detailed one hospital's login, passwords Illustrating the extent of the problem, engineers have cited a network administrator-authored document posted on hacker website 4shared.com that contained password, user ID, firewall login and other systems configuration information from the person's employer, an East Coast hospital. "When a security administrator sits down and writes down his passwords in a document like this, that's bad work," Goetsch said. "You don't put it on a PDF on a public-facing machine." To make matters worse, the document revealed that the hospital used one password across multiple systems. The American Hospital Association (AHA) said in a statement that it is actively involved in helping its member institutions bolster their cybersecurity. "As the national hospital association, the AHA's particular expertise in cybersecurity is raising awareness among our member hospitals of the importance of addressing cybersecurity issues, and we encourage member hospitals to adopt appropriate strategies for cyber-risk management and reduction," the group said. As evidence, Chicago-based AHA cited its 2013 Most Wired report, which indicated that more than 90% of its members had met security objectives across 11 key considerations, such as automatic logoff and encryption of laptops and other workstations. Attacks span breadth of healthcare industry in United States Yet more needs to be done, Goetsch said. "We saw attacks emanating across video conferencing, security, VPNs, firewalls and radiological machines that were compromised and used by adversaries for attacks, and because they are compromised, this means the capacity for a breach is wide open. The breach of a healthcare record is the most valuable data on the gray or black market. Almost three times as much as a stolen credit card number, but unlike credit card fraud, this is something that," he said, "the consumer will be directly responsible for addressing and resolving". "Large institutions, self-insured Funds and even smaller medical provider group are in a very bad place right now with respect to the state of their security," Goetsch said. Patient health can also be at risk. It's possible for a hacked diagnostics machine to send erroneous data about a particular person's medical test, for example, or for an infected dialysis machine to operate incorrectly. Overall, healthcare providers received 72% of malicious traffic, with other segments of the industry -- including health plans, pharmaceutical and healthcare business associates -- attracting most of the rest. The study didn't offer solutions, nor did it detail the impact of the attacks it revealed.

Often talked about but not commonly practiced, a lot of this could be avoided by just having a strong username or password policy that uses difficult-to-decipher logins and passwords. There is also an awareness factor. Let's say you buy a camera. It will be shipped straight from Taiwan, and then you plug it into your network. The hackers note this, and they connect to and use that camera, and then they put a back door in, and this is where compliance regulations come in. There are not rules governing cameras or where you plug in your camera. These are very simple policies to follow, but they need to be there and they need to be enforced." US ProTech, which offers persistent threat protection and other security services to enterprises, conducted the probe using its global network of 6 million sensors and next-generation honey pots, which were located in 38 data centers and 20 major Internet exchanges. US ProTech will conduct similar studies examining other industry verticals in the coming months. Protecting Electronic Protected Health Information Health care organizations present a uniquely appealing target for bad actors due to the value of the data typically stored by these organizations. This data includes patient Social Security number, insurance and/or financial account data, birth date, name, billing address, and phone. At the same time, to maintain connection with patients, employees, insurers, and business partners, health care organizations must provide access to an unusually large number of external networks and web applications. This multi-tiered window of exposure makes health care organizations increasingly vulnerable to online attack. Such attacks can result in: Costly data breaches, in terms of both financial and time loss Penalties imposed by the government because government regulations such as HIPAA mandate strict security for access to electronic health care data, the resultant penalties for a breach can be severe Costs for investigation and administration of fraud claims Loss of customer loyalty and brand reputation One US ProTech Solution Today's attackers use advanced methods and tactics that render conventional security solutions typically signature- and policy-based much less effective. Health care organizations need a solution that can keep up with the speed of today's advanced attacks and protect patients' electronic protected health information (ephi). US ProTech is the only threat intelligence solution that enables organizations to quickly and cost-effectively implement truly proactive security that works at the speed of attackers, raising the organization's overall security posture while lowering its risk profile.

Key benefits for health care organizations Assess the risk level of any attempted data record access in milliseconds Protect against customer account takeover fraud via stolen credentials Block fraudulent account creation Minimize the risk of security-related website downtime Lower the possibility of government-imposed penalties Reduce the risk of security breaches and the associated losses of data, reputation, and revenue, while enhancing the customer experience Key features include: Real-time delivery of fraud and security intelligence data Configurable live IPQ score that enables true risk prioritization Simple, customizable REST API Powerful analytics that provide rich and comprehensive reporting data Geofilter scoring and transaction blocking by geographical attributes Flexible risk categories that let you configure rules and polices unique to your business

So, what is an effective Security Information Event Management (SIEM) system and what processes should be considered as minimum necessary? At US ProTech the answer is comprehensive and addresses every aspect of the issues discussed in the article. We encourage you to seek out a professional and objective advisor who can guide you through the various levels of SIEM system deployment complexity. When comparing solutions you have to consider much more than the total cost of ownership, presence (reputation) within the industry, and levels of support or service agreements. Let us know you re interested and we ll be glad to provide you with a no-obligation consultation.