Few organisations have been placed under pressure as extreme over the past year as those working in healthcare. In many cases, this has been a catalyst for rapid digital transformation. Yet with healthcare organisations (HCOs) stretched to the limit, security gaps inevitably appear in systems that support life-saving work on the COVID-19 front line.
As 2020 showed, many cyber-criminals have no qualms about disrupting HCOs, and putting lives at risk, in order to extort victims with ransomware and data theft. To find out more on exactly how fast the pandemic is driving cloud adoption, and how well the sector understands its cybersecurity challenges, Trend Micro commissioned a global study of more than 2,500 IT decision makers in 28 countries across several industry sectors, including healthcare.
This past week, the US National Security Agency (NSA) released a rare security advisory urging organisations to patch a list of critical vulnerabilities. The top 25 list detailed the software flaws most frequently being targeted by state-sponsored Chinese operatives. Although most CVEs were published in 2020, a few date back several years.
What does this tell us? That many organisations are still not patching systems promptly enough, even though the result of a major state-sponsored or cybercrime intrusion could be catastrophic. This is where virtual patching can save the day.
Today, open source software powers some of the world’s largest organisations. But that in turn means it is a target for cyber-criminals and nation state actors. As one of the most popular Linux distributions out there, Red Hat Enterprise Linux (RHEL) is well regarded in security circles. Yet when iterations reach end-of-maintenance support, customers must act quickly to protect their servers.
This is where virtual patching capabilities could help to mitigate risk and extend the value of investments in RHEL.
Cloud computing is transforming organisations across the globe, making them more nimble, cost efficient and responsive to market demands. But security remains a perennial barrier. Unfortunately, outdated notions around how security should look in the cloud may be creating a false impression that migration is inherently more risky than keeping data on-premises. In fact, cloud-ready solutions exist to provide an environment as secure if not more so than traditional ones.