Please get in touch using the form below
Possessing large IT infrastructures and vast amounts of stored personal data, organisations in the healthcare sector are a common target for cybercriminals. The WannaCry ransomware attack that hit the UK’s National Health Service in mid-2017 highlights the high level of disruption that malicious attacks can have on hospitals, health trusts, GP practices and other healthcare bodies.
Common cyber security challenges in the healthcare sector include:
• Protecting large, often antiquated IT estates
• Juggling conflicts between service efficiency and patient confidentiality
• Keeping up with continuous workplace digitisation
• Working with limited public funding and competing IT priorities
• Educating staff about cyber security risks
Key security questions organisations in the healthcare sector should be asking:
Patient confidentiality has always been a priority within the healthcare sector, but with the General Data Protection Regulation (GDPR) and Data Protection Act 2018 (DPA) now in force, the importance is greater than ever.
Ensuring that personal data, such as confidential patient health records, is protected against unauthorised processing, accidental loss and destruction forms a key part of the requirements of the GDPR and DPA. So too is the need to have robust procedures in place to detect and investigate personal data breaches as well as report them within 72 hours to a relevant authority and, in high-risk cases, to affected individuals.
€20 million or 4% of global turnover (whichever is greater)
The maximum GDPR penalty for a cyber security breach.
All UK organisations that handle health and social care information must also comply with The National Data Guardian (NDG) Data Security Standards. Among the 10 NDG standards is the need to ensure that personal data is processed securely, conduct annual security testing, achieve Cyber Essentials certification and swiftly report data breaches.
By helping healthcare organisations address gaps in their cyber security as well as proactively detect and respond to threats when they occur, Redscan’s affordable managed cyber security services support swift, hassle-free GDPR, DPA and NDG compliance.
Redscan has extensive experience helping hospitals, health trusts and other healthcare organisations to assess cyber security risk, address vulnerabilities and proactively detect and respond to the latest cyber security threats.
Functioning as an extension of in-house IT resources, ThreatDetect™ is an award-winning MDR service supplying the capabilities needed to monitor, hunt for and remediate cyber-attacks and breaches 24/7.
Experience a real-world cyber-attack simulation to identify the weaknesses an attacker could exploit, quantify the value of data that could be exfiltrated and assess the effectiveness of security investments.
Our CREST-approved, fully customisable pen test engagements enable you to identify vulnerabilities and exposures in your infrastructure, applications, people and processes in order to reduce security risk.
"Should I need any security testing again in the future, Redscan would be my first port of call!"
"Redscan's cost effective service gives us peace of mind that we are doing all we can to protect our clients, our business, our staff, our counterparties and other partners"
"Redscan’s hands on approach identified security flaws that had previously been overlooked by other vendors"
"If you want a solution where someone will look after you 24/7 and give you a very flexible, professional and agile service – you want Redscan"
"We have been very impressed by the quality of Redscan’s engagement, communication and reporting. We will not hesitate to use them for any future testing requirements."
Redscan is hosting a webinar to help organisations learn about the Windows exposures that pose the greatest security risks and what can be done to address them. …
A private hospital with royal patronage chose ThreatDetect™, Redscan’s Managed Detection and Response service, to protect patient data through proactive network and endpoint monitoring.
Jeff Bezos is alleged to have had his personal phone hacked via a video file from the WhatsApp account of a Saudi crown prince.
The national oil company of the Arabian Gulf island nation of Bahrain has been reportedly hit by a disk wiper attack in an alleged nation-state attack.
A hacker from North London has been given 300 hours of unpaid work and a six-month electronic curfew for threatening to reset 319 million iCloud accounts.
Data ransomers have created a public website to expose data and named recent victim companies that chose to rebuild their operations instead of paying up.
The Microsoft threat research team has discovered 44 million compromised Azure AD and Microsoft Services Accounts in the three billion leaked credentials available online.
US authorities have filed charges against two Russian nationals alleged to be running a global cyber crime organisation named Evil Corp.
Redscan solution overview brochure
This content is blocked. Accept cookies to view the content.