This article is part of a series of articles about Telstra Health’s Layered Approach to Cyber Security. You can find out more about our overall approach, and access practical guidance on the people layer and the process layer.

In the previous articles in this series, we highlighted the rising tide of cyber threats in the healthcare landscape and explained how people and process could be optimised to improve your cybersecurity maturity. In this article, we explore the final piece in the layered approach puzzle, technology, and provide practical guidance on how you can use technology to form a highly effective line of defence against cyber threats.

According to the Australian Cyber Security Centre, Healthcare remains the most targeted industry for cyber attacks in Australia, and the threat is accelerating1. As cyber criminals become more sophisticated in their predatory techniques and technologies, so too must healthcare providers in their defences. Technology is a critical component of the layered approach to cyber security and when deployed and managed well, it can be highly effective in preventing, detecting and addressing cyber threats. In Telstra Health’s layered approach to cyber security, multiple components, ranging from technology-enabled asset management through to a frequent back-up regime intersect to deliver a robust line of defence.

 

Telstra Health’s Layered Approach to Cyber Security

Figure 1: Exploring the Technology layer in a layered approach to cyber security

General Figure 1 Exploring The Technology Layer In A Layered Approach To Cyber Securityjpeg

To bolster your technology defences, we have compiled a set of practical suggestions for you to consider. Whatever your level of cyber security maturity, we believe that all healthcare organisations stand to benefit from uplifting cyber controls across the technology layer.

Icon Laptop Blue

1. Know what you need to protect: start with technology-enabled asset management

It’s important to understand what your assets are before determining how you will protect them. Start by identifying, cataloguing and prioritising your information assets in a digital system, such as a configuration management data base (CMDB). This will help you understand the scope of the assets requiring cyber protection. Ensure that this information is kept up to date and that it directly informs your cyber security strategy and approach. Remember, as a healthcare organisation, data is one of your most valuable assets and it must be adequately understood for it to be sufficiently protected.

Icon-Security

2. Layers within layers: build a robust multi-layered security architecture

There are a wide variety of tools and technologies which can be applied to help secure assets against cyber threats. We suggest applying a suite of tools and approaches which meet the unique security requirements of your organisation. This might include one or more of the following:

  • Leveraging proven prevention technologies, including firewalls, endpoint protections, and secure email gateways, which seek to stop cyber attackers in their tracks.
  • Adopting automated monitoring tooling to monitor and detect cyber threats as they arise, apply automated controls and escalate to the appropriate people.
  • Building redundancy into your architecture to enable system functions or components to continue to operate when others have been compromised.
  • Deploy deception technologies, or ‘honeypots’, which are dynamic decoys strategically placed through the technology environment that distract cyber attackers from real assets.
  • Applying network segmentation, which separates assets into sub-networks with different levels of security, limiting an organisation’s exposure in a security breach.

Achieving the right balance in tooling and selecting secure and dependable products and vendors is key. If you need assistance in mapping out your target architecture, seek out a trusted advisor to provide you with the right guidance and support.

Icon Compliant Blue

3. Don’t get left behind: keep all technology patched and up to date

With funding constraints and multiple competing priorities, many healthcare organisations adopt the mantra of “if it ain’t broke, don’t fix it”. This is particularly the case for technology, with healthcare organisations often continuing to operate legacy systems which are end of life.

Without vendor support and utilising ageing technologies, these systems are inherently vulnerable to cyber attack and can expose your organisation to significant risk. Maintaining an up-to-date and appropriately patched technology architecture is essential to keeping cyber criminals out. In order to do so, it’s important for healthcare organisations to view investment in system upgrades as investment in remediating high priority organisational risks.

Icon Primary Community

4. Don’t compromise on security: ensure all staff use enterprise-grade applications

With the onset of the COVID-19 pandemic in early 2021, many healthcare organisations found themselves having to pivot quickly, adapting technology, operations and ways of working. Telehealth in particular became a key priority as healthcare organisations navigated the challenges of lock-down and worked to shield their staff from unnecessary exposure to the virus.

Many organisations devised workarounds utilising widely available consumer technologies for videoconferencing and document sharing. The challenge with this, however, is that these technologies often do not offer the strength of security controls delivered through enterprise-grade applications, such as encryption and the ability to configure security settings.

Healthcare organisations should look to limit, and ultimately eliminate, the use of consumer applications for work purposes. In order to do so, technology functions must seek to understand the requirements of the organisation’s staff and ensure that appropriate enterprise solutions are in place to fulfil them.

One way of achieving this is by embedding business relationship management capabilities and responsibilities within technology, so that technology teams actively engage business stakeholders, understand their needs and ensure that the technology architecture is aligned with business requirements. Equally, technology policies provide clarity on the appropriate use of enterprise systems and should be appropriately communicated and enforced. When not told otherwise, staff might not be aware of the security implications of their technology use and may continue to jeopardise patient and organisational data.

Icon Security Blue

5. Back it up: maintain a frequent back-up and testing regime, and effective supplier security risk management

The frequency and effectiveness of your back-up regime is a key determinant in your ability as a healthcare organisation to recover swiftly from a cyber-attack. Maintaining frequent and reliable back-ups of data, including patient and service data, is an essential component of your technology defence system. It is equally important to regularly test your back-up and restoration process to ensure that the process works and can be relied upon in the event of a cyber-attack.

With the proliferation of cloud infrastructure and applications, it has become increasingly important to maintain effective supplier security risk management. This should involve undertaking due diligence when initially engaging a technology supplier, to ensure that they have effective controls in place to mitigate the impact of security incidents and support a smooth recovery, and regularly monitoring and auditing suppliers, to confirm that they are continuing to apply security controls effectively.

Together, a frequent back-up and testing regime, and effective monitoring of technology vendors, helps to mitigate cyber security risk and improve incident recovery.

News Banners Securemessaging

Access the full article

Discover the insights of “A Layered Approach to Cyber Security: Using technology to beat cyber attackers at their own game” now

Access now
Connected-Health-Solutions-Digital-Health

Connect with our team

Get in contact to discover how our technology and solutions can help your organisation.

Contact