Intelligent CIO APAC Issue 21 | Page 84

FINAL WORD
Kamal Brar , VP and General Manager at Asia Pacific and Japan , Rubrik
In the new world of Zero Trust , however , we ’ re moving to a model where we always continuously verify and authenticate . The other two pieces linked to that are the assumption that at some point in time , our data will be compromised . With very clear zero-trust principles , devices have multi-factor authentication , for instance , which reinforces security within organizations ’ systems . In that ecosystem with Zero Trust , there ’ s less likelihood of a breach occurring .
How can healthcare practitioners practise cyber-hygiene when focusing on their patients ? multiple systems , and they ’ re all interconnected , which can cripple an entire platform .
Cybercriminals exploit their victims ’ cyber habits through executing malicious threats under the facade of daily activities in the likes of private messages , social media posts and e-mails . Education on the risk of cyber habits may not suffice as there remains a need to train healthcare practitioners ’ ability to detect fraud .
Furthermore , there is a significant increase in cyberrisks , as ransomware attacks alone jumped by 715 % in 2021 globally .
In spite of massive investments in perimeter , endpoint and application-layer security defenses , cyberattacks are becoming more sophisticated alongside the exponential rise of data , and attackers remain successful in gaining access to data .
Having a robust data security solution in place creates immutability , where data can ’ t be encrypted .
With digitalization , we also see that there is a great amount of data that is fragmented across different systems , having different ways to secure them . As medical data is quite sensitive , we see that the value of data is at its highest today .
As innovation catches up to today ’ s healthcare needs , there comes the problem of not only sharing data efficiently , but also ensuring that data is protected in all circumstances .
How can healthcare organizations put forward a ‘ Zero Trust ’ philosophy to protect their data from being compromised ?
Building a zero-trust foundational framework is built on three core principles ; trust no one ( no individual or application ), validate everyone / everything and always verify . We once lived in a world where accessing data means we can continue to go on and about with our business .
As such , healthcare institutions need to have a clear understanding of online security protocols , safe browsing practices , secure password creation and storage , alongside the necessary tools and software that detect suspicious activities . With all these in hand , healthcare organizations will be better prepared to deal and fend off any kind of cyberattacks .
Tips for the healthcare sector to protect their patients ’ data
Modern technology is key . When legacy systems are used , often security is built on top , but not integrated at the core and considered from day one . A proactive inside-out data security approach that assumes an attack is inevitable builds a focus on protecting mission-critical data and systems .
In addition to modern technology and data security platforms , there will be elements that cannot be underestimated , such as people and processes . Providing training and education on the potential risks as we move to network-based access or remote access is of utmost importance . Often some of the most dangerous risks an organization is up against are internal and many times unintentional .
With the right technology and training in place , processes enable clarity on how to respond if and when a breach occurs . We need to ask the right questions : What is the remediation plan ? How do we recover if we experience a cyberattack ?
Those three elements go hand in hand – technology , the people and , of course , the process . p
84 INTELLIGENTCIO APAC www . intelligentcio . com