Dataconomy
  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
Subscribe
No Result
View All Result
Dataconomy
  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Rising cybersecurity risks threaten the healthcare industry

by Kerem Gülen
August 3, 2022
in News, Cybersecurity, Healthcare
Home News
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

The most recent data breach report from IBM sheds light on why there is a rising gap between company cybersecurity investment and record data breach expenses. While businesses are investing more than ever on cybersecurity, the cost and intensity of data breaches continue to climb.

With the average data breach cost exceeding $4.35 million, 2022 is expected to break all previous records for enterprise breaches globally. That is 12.7 % more expensive than the $3.86 million average data breach cost in 2020. It was also discovered that a record 83% of businesses reported multiple breaches and that it takes 277 days on average to discover a breach. Enterprises must therefore examine their cybersecurity tech stacks to identify gaps and areas for improvement.


Tech-assisted bullying: How to deal with cyberstalking?


The IBM report puts cybersecurity risks under the spotlight

An effective place to start is by tightening security surrounding identity management and privileged access credentials. More businesses need to adopt identity definitions as the new security perimeter. According to IBM’s report, privileged credentials have been compromised in 19% of all breaches. The average duration of breaches brought on by stolen credentials was 327 days. The Dark Web’s best-selling privileged access credentials are in high demand for access to the IT infrastructure of financial services.

IBM report stresses out the rising cybersecurity risks in the healthcare sector
Enterprises must examine their cybersecurity tech stacks to identify any gaps and areas for improvement

The report also demonstrates businesses’ reliance on implicit confidence in their overall IT infrastructure and security tech stacks. Identity and access management (IAM), privileged access management (PAM), and cloud security flaws make costly breaches possible. When zero trust can cut typical breach losses by almost $1 million, 79% of critical infrastructure firms didn’t implement one.


Join the Partisia Blockchain Hackathon, design the future, gain new skills, and win!


To lower the frequency of breaches, businesses must view implicit trust as the open back door that gives hackers access to their systems, passwords, and most sensitive confidential information. In addition, we recommend checking cybersecurity practices to stay safe against today’s digital perils.

Key takeaways for enterprises

The size of the expanding cybersecurity gap in healthcare is also quantified in the paper. According to IBM’s analysis, the average cost of a healthcare data breach is now estimated to be $10.1 million, setting a new record and surpassing last year’s $9.23 million figure by almost $1 million. The average breach cost in healthcare has been the highest for twelve years, rising 41.6 % since 2020.

According to the data, as runaway costs are putting financial strain on businesses and customers worldwide, the cost of breaches is increasing at an inflationary rate, adding gasoline to the fire. Sixty percent of the businesses participating in IBM’s study claim that they increased their product and service costs due to the breach. At the same time, supply chain interruptions, the Ukrainian conflict, and the weak demand for goods persist. Consumers are already struggling when it comes to paying for healthcare expenses. The latest PwC report expects costs to rise by 6.5% in 2022.

IBM report stresses out the rising cybersecurity risks in the healthcare sector

The IBM study also discovered that 12 to 24 months after a breach, approximately 30% of costs are still incurred, resulting in enduring price hikes for consumers.

“It is clear that cyberattacks are evolving into market stressors that are triggering chain reactions, [and] we see that these breaches are contributing to those inflationary pressures,” explained the head of strategy for IBM Security’s X-Force research team, John Hendley.


The elephant in the room: Employees ignore cybersecurity training sessions


Prioritizing these three areas can help healthcare providers with tight cybersecurity budgets lower the cost of a breach while advancing zero-trust initiatives. A practical zero-trust architecture must have identity access management (IAM) that is effective, flexible, and protects both machine and human identities.

IBM report stresses out the rising cybersecurity risks in the healthcare sector
“It is clear that cyberattacks are evolving into market stressors that are triggering chain reactions”

According to IBM’s study, IAM is the most successful in lowering breach costs of the zero-trust components examined. For example, Ivanti, Palo Alto Networks, Ericom, Fortinet, and Akamai are some of the leading IAM providers. The ZTEdge platform from Ericom is notable for its integration of ML-enabled identity and access management, zero-trust network access (ZTNA), micro-segmentation, secure web gateway (SWG), and remote browser isolation (RBI), as well as Web Application Isolation.

Tags: CybersecurityData BreachhealthcareibmIBM report

Related Posts

The latest ChatGPT DAN prompt is here! Learn how to jailbreak ChatGPT-4 and explore ChatGPT jailbreak prompts. Meet ChatGPT uncensored...

Playing with fire: The leaked plugin DAN unchains ChatGPT from its moral and ethical restrictions

March 31, 2023
What is Microsoft Security Copilot? Learn how to access and use it. We explained everything you need to know about the GPT-4 powered chatbot.

Microsoft Security Copilot is the AI-ssential tool for cybersecurity experts

March 29, 2023
Consensus AI makes accessing scientific information easier than ever

Consensus AI makes accessing scientific information easier than ever

March 27, 2023
ChatGPT now supports plugins and can access live web data

ChatGPT now supports plugins and can access live web data

March 24, 2023
What is the Microsoft Loop app, and how to access it? We explained everything you need to know about the new Notion rival. Keep reading...

Microsoft Loop is here to keep you always in sync

March 29, 2023
Adobe Firefly AI: See ethical AI in action

Adobe Firefly AI: See ethical AI in action

March 22, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

LATEST ARTICLES

Playing with fire: The leaked plugin DAN unchains ChatGPT from its moral and ethical restrictions

The art of abstraction in computer science

AI whisperers, fear, Bing AI ads and guns: Was Elon right?

The strategic value of IoT development and data analytics

AI experts call for pause in development of advanced systems

Microsoft Security Copilot is the AI-ssential tool for cybersecurity experts

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy
  • Partnership
  • Writers wanted

Follow Us

  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.