IT Security News Blast 04-18-2018

Seven Practices of Healthcare Cybersecurity

Seven Successful Practices for a Robust Healthcare Cyber Security Plan
Hackers can make large sums of money by selling an individual’s medical records on the dark web.  Hospitals must adopt a strong strategy to ensure peoples’ personal data is defended well. Below are seven practices that, if put into action, can be the foundation of a cybersecurity action plan. If security is to be a priority within the healthcare industry as they transition into a more digitalised platform, these principals must be put into action.

Healthcare data a growing target for hackers, cybersecurity experts warn
“Their preferred … target is cash itself. If you can’t get the cash, then you go for things that can be converted to cash. And personal data is one of those things,” he said. Sensitive health information, for example could be used to blackmail a public figure or extract a ransom from a medical provider. And health data has what’s called a large “threat surface” — many vulnerable points where it could be accessed.

At Lakeland Health, IT Leaders are “Changing the Storyline” on Cybersecurity and Seeing Significant Results
“Number one, we wanted to put risk management and cybersecurity at the top of health system leadership agenda. We wanted to be proactive. Second, there is a negative connotation to cybersecurity, mostly fear and negativity, so we wanted to change our storyline and move from fear and negativity to focusing on clinical integrity and business integrity,” he says. “Thirdly, we wanted to use innovative strategies and tools and more agile methodologies to make rapid progress using our distributed, cross-function teams to make improvements.”

The cyber security challenges facing emerging fintech startups
A growing industry, their success lies in offering alternatives to conventional financial solutions through cryptocurrencies, online loans, and robo-advisors. Though it’s a rich tapestry of services that make up the fintech world, they’re united by one challenge: cyber security. Its unfettered growth on online platforms makes this industry uniquely vulnerable to security breaches.

Fintech professional’s tech predictions: 5 – better understanding of privacy settings
Fintech IT professional says: “There will be wider public understanding of privacy settings and how these can be undermined by website operators. Governments will introduce standard definitions for privacy settings, specify default settings and monitor compliance by operators. The public may also shy away from providing as much data as the understanding of how seemingly unimportant information can be assembled over a period of time and interpreted by data analysis, whether that be by commercial, governmental or criminal organisations.

DHS floats ‘collective defense’ model for cybersecurity
“If the past year has shown us anything, it is that our cyber enemies are bolder, more brazen and savvier than ever before,” Nielsen said in an April 17 speech at the RSA Conference in San Francisco. Citing attacks like WannaCry and NotPetya, Nielsen said that adversaries “seem to believe the digital realm is fair game for nefarious activity, and they are often indifferent to collateral damage.”

Tech groups push ‘Geneva convention’ to help foil cyber attacks
The initiative, dubbed the cyber security tech accord, was the brainchild of Brad Smith, president and general counsel of Microsoft. Backers of the agreement include Cisco, HP and Facebook, along with European concerns like Nokia, ABB and ARM. However, some of the world’s largest tech companies — including Apple, Amazon and Google — have not signed the pledge,.

DHS Secretary Promises U.S. Will Strike Back Against Cyber Adversaries
She promised a “full spectrum of response options, both seen and unseen,” to adversary cyberattacks, raising the specter of the U.S. striking back in cyberspace along with the government’s typical responses of indictments and sanctions. Actually enforcing consequences that reduce other nations’ cyber belligerence, however, will be far trickier than issuing a broad warning.

Russia denies ‘feeble’ US, UK charges of internet tampering
In a joint statement Monday, the U.S. Department of Homeland Security, the FBI and the U.K.’s National Cyber Security Centre said the main targets in the alleged tampering of routers and other networking equipment include “government and private-sector organizations,” as well as providers of “critical infrastructure” and internet service providers.

Russian cyber attack should be met by counter-strikes
Russia, he said, “is ripping up the rule book by undermining democracy, wrecking livelihoods by targeting critical infrastructure, and weaponizing information.” Williamson’s predecessor, Sir Michael Fallon, has warned in the past that cyber attacks against the United Kingdom “could invite a response from any domain — air, land, sea or cyberspace,” indicating that a cyber attack could be met with a conventional military response.

US, UK Say Russia Targets Internet Hardware for Espionage
“Victims were identified through a coordinated series of actions between U.S. and international partners,” according to a companion technical alert issued by the U.S. Computer Emergency Response Team (US-CERT). Both nations have “high confidence” in the finding of Russian-sponsored cyber-meddling, which the alert said has been reported by multiple sources since 2015.

Army-funded research discovers way to block cyber intrusions
The U.S. Army-funded research focuses on the Majorana particles, which could become critical building blocks for quantum computers because their unusual properties make them resistant to external interference and prevent loss of quantum information. The research team also includes collaborating members from UC Irvine, UC Davis, and Stanford University. The Majorana particle has been the focus of keen interest for quantum computing in large part because its neutral charge makes it resistant to external interference and gives it the ability to leverage and sustain a quantum property known as entanglement.

North Korea to UNLEASH army of spies to hack USA and UK in cyber war
The dictator has recruited a group of highly intelligent cyber warfare graduates from a top military institution, Mangyongdae Revolutionary Academy to work “undercover” in North Korean embassies overseas and raid financial institutions. The young recruits have been set missions in major countries – one of them on home soil. Students must be high “songbun”, meaning they must be children of North Korea’s top ranked officials or be descendants to exceptionally well-known fighters.

Tech firms, including Microsoft, Facebook, vow not to aid government cyber attacks
The Cybersecurity Tech Accord, which vows to protect all customers from attacks regardless of geopolitical or criminal motive, follows a year that witnessed an unprecedented level of destructive cyber attacks, including the global WannaCry worm and the devastating NotPetya attack. “We recognize that we live in a new world,” Microsoft President Brad Smith said during a speech on Tuesday at the RSA cyber security conference in San Francisco. “We’re living amidst a generation of new weapons, and where cyberspace has become the new battlefield.”

Understanding the players, tactics for a possible war in space
Space is not the sole domain of militaries and intelligence services,” write report authors Brian Weeden and Victoria Samson, “Our global society and economy is increasingly dependent on space capabilities, and a future conflict in space could have massive, long-term negative repercussions that are felt right here on Earth. The public should be as aware of the developing threats and risks of different policy options as would be the case for other national security issues in the air, land, and sea domains.”

In effort to shut down Telegram, Russia blocks Amazon, Google network addresses
But as users flocked to virtual private networks and proxy services to reach Telegram from their mobile devices and computers—or resorted to building their own—government censors added large swaths of IP addresses to the block list. And according to multiple sources within Russia, ISPs there are now blocking large chunks of IP addresses associated with cloud services from Amazon and Google.

U.S. official warns of ‘unintended consequences’ of European data privacy law
Online data privacy is important and contextual across borders and different cultures, Nielsen said during a keynote appearance at the RSA cyber security conference in San Francisco. But “what we don’t want are the unintended consequences of preventing the research community to be able to give us a heads up on (cyber) threats that are coming our way,” she said. “In other words, through trying to protect a citizen’s privacy we eliminate the ability of many of the vendors and researchers who otherwise have access to data to see the trends in attacks,” Nielsen said.

With smart cities, your every step will be recorded
Following revelations that 87m people’s Facebook data was allegedly breached and used to influence electoral voting behaviour, it is ever more important to properly scrutinise where our data goes and how it is used. Similarly, as more and more critical infrastructure falls victim to cyber-attacks, we need to consider that our cities are not only becoming smarter, they are also becoming more vulnerable to cyber-attacks.

Intel, Microsoft to use GPU to scan memory for malware
The company is announcing two specific TDT features. The first is “Advanced Memory Scanning.” In an effort to evade file-based anti-virus software, certain kinds of malware refrain from writing anything to disk. This can have downsides for the malware—it can’t persistently infect a machine and, instead, has to reinfect the machine each time it is rebooted—but makes it harder to spot and analyze. To counter this, anti-malware software can scan system memory to look for anything untoward. This, however, comes at a performance cost, with Intel claiming it can cause processor loads of as much as 20 percent.

Signal app guru Moxie: Facebook is like Exxon. Everyone needs it, everyone despises it
At the same time, Marlinspike points out that it won’t be as easy as simply telling people to walk away from a platform that, for many, has become most if not all of their online activity. “There were a lot of things Facebook could have done, but it wasn’t in their interest to protect our data,” Kocher noted. “It was very much in their interest to take advantage of all the data they collect. We can’t look to the companies that benefit from the status quo to fix these problems.”



Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners.  © 2017 Critical Informatics, Inc. All rights reserved.