Dataconomy
  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
Subscribe
No Result
View All Result
Dataconomy
  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Rising cybersecurity risks threaten the healthcare industry

by Kerem Gülen
August 3, 2022
in News, Cybersecurity, Healthcare
Home News
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

The most recent data breach report from IBM sheds light on why there is a rising gap between company cybersecurity investment and record data breach expenses. While businesses are investing more than ever on cybersecurity, the cost and intensity of data breaches continue to climb.

With the average data breach cost exceeding $4.35 million, 2022 is expected to break all previous records for enterprise breaches globally. That is 12.7 % more expensive than the $3.86 million average data breach cost in 2020. It was also discovered that a record 83% of businesses reported multiple breaches and that it takes 277 days on average to discover a breach. Enterprises must therefore examine their cybersecurity tech stacks to identify gaps and areas for improvement.


Tech-assisted bullying: How to deal with cyberstalking?


The IBM report puts cybersecurity risks under the spotlight

An effective place to start is by tightening security surrounding identity management and privileged access credentials. More businesses need to adopt identity definitions as the new security perimeter. According to IBM’s report, privileged credentials have been compromised in 19% of all breaches. The average duration of breaches brought on by stolen credentials was 327 days. The Dark Web’s best-selling privileged access credentials are in high demand for access to the IT infrastructure of financial services.

IBM report stresses out the rising cybersecurity risks in the healthcare sector
Enterprises must examine their cybersecurity tech stacks to identify any gaps and areas for improvement

The report also demonstrates businesses’ reliance on implicit confidence in their overall IT infrastructure and security tech stacks. Identity and access management (IAM), privileged access management (PAM), and cloud security flaws make costly breaches possible. When zero trust can cut typical breach losses by almost $1 million, 79% of critical infrastructure firms didn’t implement one.

To lower the frequency of breaches, businesses must view implicit trust as the open back door that gives hackers access to their systems, passwords, and most sensitive confidential information. In addition, we recommend checking cybersecurity practices to stay safe against today’s digital perils.

Key takeaways for enterprises

The size of the expanding cybersecurity gap in healthcare is also quantified in the paper. According to IBM’s analysis, the average cost of a healthcare data breach is now estimated to be $10.1 million, setting a new record and surpassing last year’s $9.23 million figure by almost $1 million. The average breach cost in healthcare has been the highest for twelve years, rising 41.6 % since 2020.

According to the data, as runaway costs are putting financial strain on businesses and customers worldwide, the cost of breaches is increasing at an inflationary rate, adding gasoline to the fire. Sixty percent of the businesses participating in IBM’s study claim that they increased their product and service costs due to the breach. At the same time, supply chain interruptions, the Ukrainian conflict, and the weak demand for goods persist. Consumers are already struggling when it comes to paying for healthcare expenses. The latest PwC report expects costs to rise by 6.5% in 2022.

IBM report stresses out the rising cybersecurity risks in the healthcare sector

The IBM study also discovered that 12 to 24 months after a breach, approximately 30% of costs are still incurred, resulting in enduring price hikes for consumers.

“It is clear that cyberattacks are evolving into market stressors that are triggering chain reactions, [and] we see that these breaches are contributing to those inflationary pressures,” explained the head of strategy for IBM Security’s X-Force research team, John Hendley.


The elephant in the room: Employees ignore cybersecurity training sessions


Prioritizing these three areas can help healthcare providers with tight cybersecurity budgets lower the cost of a breach while advancing zero-trust initiatives. A practical zero-trust architecture must have identity access management (IAM) that is effective, flexible, and protects both machine and human identities.

IBM report stresses out the rising cybersecurity risks in the healthcare sector
“It is clear that cyberattacks are evolving into market stressors that are triggering chain reactions”

According to IBM’s study, IAM is the most successful in lowering breach costs of the zero-trust components examined. For example, Ivanti, Palo Alto Networks, Ericom, Fortinet, and Akamai are some of the leading IAM providers. The ZTEdge platform from Ericom is notable for its integration of ML-enabled identity and access management, zero-trust network access (ZTNA), micro-segmentation, secure web gateway (SWG), and remote browser isolation (RBI), as well as Web Application Isolation.

Tags: CybersecurityData BreachhealthcareibmIBM report

Related Posts

The Messi Effect

The Messi Effect

June 8, 2023
WordPress has its own AI writing assistant now

WordPress has its own AI writing assistant now

June 7, 2023
Why should you consider the new Google Cloud Consulting tools?

Why should you consider the new Google Cloud Consulting tools?

June 7, 2023
Why is the most anticipated AAA game of 2023 not working for some?

Why is the most anticipated AAA game of 2023 not working for some?

June 7, 2023
If Midjourney goes down, your backup plan is here

If Midjourney goes down, your backup plan is here

June 7, 2023
Soon you will get advice from Instagram’s 30 different personalities

Soon you will get advice from Instagram’s 30 different personalities

June 7, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

LATEST ARTICLES

The Messi Effect

You look at it every day, so at least have it good

WordPress has its own AI writing assistant now

Why should you consider the new Google Cloud Consulting tools?

Freepik AI creates good images, but not as stunning as those Midjourney creations

Why is the most anticipated AAA game of 2023 not working for some?

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy
  • Partnership
  • Writers wanted

Follow Us

  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.