




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)
文檔簡介
PAGE
10
2024HIMSSHealthcareCybersecuritySurvey|?2025HealthcareInformationandManagementSystemsSociety
2024HIMSSHealthcareCybersecuritySurvey
TableofContents
ExecutiveSummary 3
MethodologyandDemographics 4
Methodology 4
Demographics 4
LevelsofResponsibility 5
TypesofOrganizationsRepresented 5
EconomicsofHealthcareCybersecurity 6
BudgetsareImproving 6
OverallITBudgetsareModestlyImproving 6
AllocationofcurrentITbudgettocybersecurity 7
Comparing2023to2024:CybersecurityBudgetAllocations 8
TrendsinCybersecurityBudgetAllocations 9
CybersecurityBudgetsProjectedtoRise 10
Changestocybersecuritybudgetin2025 10
EffectofCybersecurityBudgetIncreasesin2025 11
SecurityAwareness 12
SecurityAwarenessPrograms 12
Effectivenessofsecurityawarenessprograms 13
SecurityIncidents 14
SignificantSecurityIncidents 14
InitialPointsofCompromise 14
TestingofIncidentResponsePlans 15
StakeholderParticipationinTabletopExercises 16
What’sHappeningwithRansomware 17
PresentState 17
2024RansomwareTrends 17
RansomwareTrends:2022-2024 18
ToPayorNottoPay–RansomwarePayments 19
Proactivevs.ReactiveSecurityMeasures 20
FutureState 21
AIAdoptioninHealthcare 22
AllowingtheUseofAIinHealthcare 22
ToGovernorNot:OrganizationalApproachestoAI 22
AITechnologyUseCases 23
AIGuardrails 24
ApprovalProcessforAITechnology 24
ActiveMonitoringofAITechnology 25
AcceptableUsePolicyforAITechnology 25
FutureConcernsRegardingAI 26
ManagingThird-PartyRisks 27
Third-PartyRiskManagementPrograms 27
Third-PartySecurityIncidents 28
ImpactsofThird-PartySecurityIncidents 29
InsiderThreatPrograms 30
FormalInsiderThreatPrograms 30
InsiderThreatandAI 31
InsiderThreatActivityInvolvingThirdParties 32
Conclusion 33
AboutHIMSS 34
HowtoCitethisSurvey 34
HowtoRequestAdditionalInformation 34
ExecutiveSummary
CybersecurityBudgets
??Investments-Organizationsarededicatingmoreresourcestofortifydefenses.
??StrategicFocus-Budgetsareincreasinglyalignedwithcriticalvulnerabilities.
SecurityAwareness
??PhishingMitigation-Programstargetphishing,theleadingattackvector.
??InnovativeTraining-Gamificationandscenario-basedtrainingboostengagement.
SecurityIncidents
??PhishingDominance-Phishingisthetopmethodofcompromise.
??AI-DrivenAttacks-Deepfakesareanemergingthreat.
Ransomware
???CombattingRansomware-Ransomwaredefensecontinuestobeapriority.
?FewerRansomPayments-Fewerransomwarevictimsarereportingpayingransom.
ArtificialIntelligence
??PolicyShortfalls-AlackofformalAIgovernanceincreasesrisk.
??LimitedOversight-ThereislimitedmonitoringofAIusage.
Third-PartyRisks
??Third-PartyIncidents-Significantincidentsinvolvingthird-partiesarenotable.
?Impacts-Third-partyincidentscausedisruptionandotherimpacts.
InsiderThreats
??FormalPrograms-Formalprogramsareneededtomanageinsiderthreats.
MethodologyandDemographics
The2024HIMSSHealthcareCybersecuritySurveyreflectstheresponsesof273healthcarecybersecurityprofessionals.Theseprofessionalshadatleastsomeresponsibilityforday-to-daycybersecurityoperationsoroversightofthehealthcareorganization’scybersecurityprogram.Respondentswhoindicatedtheydidnothaveanylevelofresponsibilityforeitherday-to-daycybersecurityoperationsoroversightwerenoteligibletotakethesurvey.
Methodology
ThedataforthissurveywascollectedbetweenNovember6andDecember16,2024.Questionsaskedrespondentsabouttheirperspectives,knowledge,andexperiencesoverthepast12months.Forsimplicity,werefertothisdataas"2024"throughoutthisreport.
Similarly,datafromprevioussurveysisidentifiedbytheyearinwhichitwascollected.
Demographics
AsshowninFigure1below,respondentsheldvariousroles,includingexecutivemanagement(50%),non-executivemanagement(37%),andnon-management(13%).ExecutivemanagementincludedindividualsintheC-suite,non-executivemanagementcomprisedseniormanagement,andnon-managementencompassedanalystsandspecialists.
Figure1:RespondentRoles
LevelsofResponsibility
AsshowninFigure2below,respondentsreportedvaryinglevelsofinvolvementintheirorganization'scybersecurityprograms.46%hadprimaryresponsibility,30%sharedresponsibility,and24%wereinvolvedasneededintheday-to-dayoperationsoroversight.
Figure2:RespondentCybersecurityResponsibility
TypesofOrganizationsRepresented
AsshowninFigure3below,respondentsrepresentedadiverserangeoforganizations,includinghealthcareproviders(50%),vendors(18%),consultingfirms(13%),governmententities(8%),andotherorganizations(11%).Otherorganizationsincludedacademicinstitutions,non-profits,payors,andlifesciencescompanies.
Figure3:TypesofOrganizations
EconomicsofHealthcareCybersecurity
Investinginrobustcybersecuritymeasuresisnolongeroptionalforhealthcareorganizations—itisessential.Yet,achievingastrongcybersecurityposturerequiressufficientresources,whichareoftenlimitedbybudgetaryconstraints.ChiefInformationSecurityOfficersandtheirteamsfrequentlyfindthemselvesbalancingtheneedtoaddressevolvingthreatswiththerealityoftightfinancialresources.
Healthcareorganizationswithgreaterfinancialresourcesarebetterequippedtoleveragerobustcybersecuritysolutions.Sufficientcybersecurityfundingenablesorganizationstoaccessadvancedtools,hireskilledpersonnel,andimplementcomprehensivestrategies.
Conversely,limitedbudgetscanposechallenges,makingitmoredifficulttoaddresstheever-evolvingcyberthreatlandscapeeffectively.However,evenwithmodestresources,strategicplanningandprioritizationcanplayacriticalrole.
BudgetsareImproving
OverallITBudgetsareModestlyImproving
Traditionally,healthcareorganizationshavegenerallyallocated6%orlessoftheirITbudgetstocybersecurity,accordingtoaggregatedatafromthe2018to2022and2024HIMSSHealthcareCybersecuritySurveys.SincecybersecuritybudgetsaretypicallycarvedoutofoverallITbudgets,thissurveyexaminedboththeexpectedchangesinoverallITbudgetsfromfiscalyear2024tofiscalyear2025andthecurrentallocationofthosebudgetstocybersecurity.
AsshowninFigure4below,aslightmajorityofrespondents(52%)reportedthattheir
organizations’overallITbudgetswouldincreaseduringthisperiod,while10%indicatedadecrease.28%ofrespondentsreportednochangeintheiroverallITbudgets.TenpercentofrespondentsdidnotknowabouttheanticipatedchangeinITbudgetfrom2024to2025.
Figure4:AnticipatedChangeinITBudget2024to2025
AllocationofcurrentITbudgettocybersecurity
UnderstandinghoworganizationsallocatetheirITbudgetstocybersecurityprovidesvaluableinsightintotheirprioritizationofsecuritymeasures.Variabilityinspendinglevelshighlightsdifferencesinhoworganizationsapproachprotectingtheirsystemsanddata.Thesebudgetarydecisionspresentopportunitiestostrengthendefensesandenhancepreparednessagainstevolvingthreats.
WhenaskedaboutorganizationalallocationofthecurrentITbudgettocybersecurity,20%ofrespondentsindicatedthattheirorganizationhadnospecificcarve-outbutspentmoneyoncybersecurity,asshowninFigure5below.However,19%ofrespondentsreportedtheirorganizationsallocated3-6%oftheoverallITbudgettocybersecurity;14%reported7-10%;7%reported11-14%;9%reportedmorethan14%;and7%reported1-2%.
Onepercentofrespondents—severalvendorsandahealthcareprovider—indicatedtheirorganizationsdonotspendanymoneyoncybersecurity.Notably,23%ofrespondentsdidnotknowwhatpercentageoftheirorganizations’ITbudgetswereallocatedtocybersecurity.
Figure5:PercentofOrganization’sITBudgetSpentonCybersecurity
Comparing2023to2024:CybersecurityBudgetAllocations
Datafromthe2023and2024HIMSSHealthcareCybersecuritySurveysrevealanotableshiftincybersecuritybudgetallocations.Thepercentageoforganizationsallocating3-6%oftheirITbudgetstocybersecurityincreasedfrom13%in2023to18%in2024,whilethoseallocating1-2%decreasedfrom10%to7%,asshownbelowinFigure6.Allocationsbetween7-10%weresimilar,decreasingslightlyfrom15%oforganizationsin2023to14%in2024,whileabove10%droppedsignificantly,from21%oforganizationsin2023to16%in2024,reflectingapossibleredistributionofresourcesormorestrategicspending.
Thepercentageoforganizationswithoutaspecificcarve-outforcybersecurityincreasedslightly,from19%in2023to20%in2024.Additionally,respondentsunawareoftheirorganizations’cybersecuritybudgetallocationsrosefrom19%in2023to23%in2024,pointingtopotentialgapsincommunicationorgovernanceovercybersecurityspending.
Thesefindingssuggestthatorganizationsareoptimizingcybersecurityinvestments,movingtowardmoremoderatebudgetallocations.However,theincreaseinrespondentsunawareoftheirorganizations’cybersecuritybudgetallocationsunderscorestheneedforimprovedcommunicationaroundcybersecuritypriorities.Whileexecutivemanagementrespondentsweregenerallyawareofcybersecuritybudgetallocations,non-managementandnon-executivemanagementrespondentsdemonstratedlimitedawareness,highlightinganopportunityforbetterinformationsharingaboutorganizationalcybersecurityprograms.
Figure6:CybersecurityBudgetAllocation,2023vs.2024
TrendsinCybersecurityBudgetAllocations
Overtheyears,cybersecuritybudgetallocationwithinITbudgetshasshownnotablefluctuations,reflectingchangesinorganizationalprioritiesandresourceallocationstrategies.AsshowninTable1,organizationsreportingnocybersecurityallocationremainedsteadyat1-3%,whileallocationsinthe1-2%rangepeakedat18%in2020butdroppedto7%in2024.Budgetsinthe3-6%rangedippedto13%in2023beforerecoveringto18%in2024,indicatingstabilityinmoderatespending.Allocationsinthe7-10%rangegraduallyincreasedfrom10%in2020to14%in2024,showinggrowinginvestmentinhighercybersecuritybudgets.Budgetsexceeding10%peakedat21%in2023beforefallingto16%in2024,suggestingshiftstowardmorebalancedspending.
Thepercentageofhealthcareorganizationswithflexibleorunspecifiedcybersecuritybudgetsdeclinedfrom26%in2019to20%in2024,reflectingimprovedbudgetingpractices.However,respondentsunawareoftheirorganizations’cybersecuritybudgetsrosefrom18%in2020to23%in2024,highlightingcommunicationgaps.Whilemodestincreasesinhealthcarecybersecuritybudgetsareevident,additionalinvestmentsarecriticaltoaddressgrowingthreats,protectsensitiveassets,andsupportnewtechnologies.Withoutsufficientfunding,organizationsriskdisruptionstopatientcare,lossoftrust,andsignificantfinancialandreputationalharm.
Table1:CybersecurityBudgetAllocation,2019-2024
BudgetAllocation
2019
2020
2021
2023
2024
Noallocation 1%
1%
1%
3%
1%
1-2percent
9%
18%
18%
10%
7%
3-6percent 25%
24%
22%
13%
19%
7-10percent
11%
10%
15%
15%
14%
Morethan10percent 10%
6%
11%
21%
16%
FlexibleAllocation
26%
23%
24%
19%
20%
Don’tKnow 18%
18%
10%
19%
23%
CybersecurityBudgetsProjectedtoRise
Changestocybersecuritybudgetin2025
Anticipatedchangestocybersecuritybudgetsprovideinsightintoorganizations’evolvingprioritiesandstrategies.Withthegrowingcomplexityofcyberthreats,manyorganizationsrecognizetheneedtoadjusttheirspendingtostayahead.Theseshiftshighlightanincreasingfocusonbolsteringdefensesandaddressingemergingrisks.AsshowninFigure7below,amongrespondentswhoreportedaspecificallocationfortheirorganizations’cybersecuritybudgets,aslightmajority(55%)anticipatedanincreasein2025.Only4%expectedadecrease,while21%statedtheirbudgetswouldremainthesame.Notably,20%ofrespondentsindicatedtheydidnotknow.
Figure7:ChangetoCybersecurityBudgetin2025
EffectofCybersecurityBudgetIncreasesin2025
Amongrespondentswhoindicatedthattheircybersecuritybudgetswouldincrease,weaskedwhethertheincreaseenabledtheirorganizationstomakemeaningfulimprovements,suchasinvestinginadditionalstaff,tools,and/orpolicies.AsshowninFigure8,amajority(57%)reportedsignificantimprovementstothetoolstheyuse,47%reportedsignificantimprovementstopolicies,and31%reportedsignificantimprovementstostaff.Notably,34%statedthattheincreaseallowedforonlysomeimprovementsacrossstaff,tools,andpolicies.Threepercentindicatedthattheincreasemerelymaintainedexistingsupportforstaff,tools,andpolicies,and8%ofrespondentsstatedthattheydidnotknow.
Figure8:ImpactofIncreaseinCybersecurityBudgetfor2025
SecurityAwareness
SecurityAwarenessPrograms
Effectivesecurityawarenesstrainingisvitalforhelpingemployeesrecognizeandrespondtocybersecuritythreats.Organizationsuseavarietyofmethodstoengagetheirworkforcesandreinforcekeyconcepts,tailoringtheirapproachestoaddresstheirspecificrisks.Understandingthestrategiesemployedprovidesvaluableinsightintohoworganizationsprioritizeeducationaspartoftheiroveralldefensestrategies.
AsshowninFigure9below,respondentsreportedusingavarietyofmethodsforsecurityawarenesstraining,with73%citingregularemailalertsandcommunications,63%usingsimulatedphishing,49%usinginteractivediscussions,and47%holdingin-personorvirtualworkshops.Incidentresponseexercisesliketabletopswereusedby38%,while10%engagedininteractivegames.Notably,4%reportednotraining,2%wereunawareiftrainingoccurred,and3%usedalternatemethodslikevideo-basedtrainingorcomplianceactivities,whicharenotequivalenttoeffectivecybersecuritytraining.Only40%addressedemergingthreatslikedeepfakes,quishing(QRcodephishing),andsmishing(SMSphishing),highlightingtheneedforcomprehensive,up-to-datetrainingprogramstocounterevolvingthreats.
Organizationsmayneedtodevelopcustomtrainingprogramssinceoff-the-shelfsecurityawarenesstrainingmightnotadequatelyaddressemergingthreats.Tailoredapproachesensurethattrainingisrelevantandcomprehensive,equippingteamstoeffectivelyidentifyandrespondtosophisticatedattacks.
Figure9:MethodsforSecurityAwarenessTraining
Effectivenessofsecurityawarenessprograms
Securityawarenessprogramsareakeyelementoforganizationaldefense,designedtoeducateemployeesonrecognizingandrespondingtopotentialthreats.Ascybersecurityriskscontinuetoevolve,theeffectivenessoftheseprogramsiscriticalinreducingvulnerabilitiesandpreventingincidents.Evaluatinghowwelltheseprogramsperformcanhighlightareasforimprovementandensuretheyremainalignedwiththechangingthreatlandscape.
AsshowninFigure10below,weaskedrespondentswhoseorganizationsconductsecurityawarenessprogramstoassesstheeffectivenessoftheseprograms.Amajority(62%)indicatedtheirprogramsaresomewhateffective,while18%describedthemasveryeffective.Another18%reportedtheirprogramsareonlyslightlyeffective,and2%statedtheyarenoteffectiveatall.Therelativelylowpercentageofrespondentsratingtheirprogramsasveryeffective(18%)suggestsaneedforenhancedstrategies.Itissuggestedthatorganizationsfocusonkeyareasforimprovement,includingaddressingemergingthreatsandmitigatingrisksfromnewandemergingtechnologies.Strengtheningthesesecurityawarenessprogramscouldbetterequiporganizationstostayaheadofevolvingcybersecuritychallengesandbolstertheiroveralldefenses.
Proactivemeasures,suchasgamification,tabletopexercises,andinteractiveworkshops,canhelpeducatetheworkforceaboutbothbasicandadvancedthreats.Theseapproachescanengageemployeeseffectively,fosteringpracticalskillsandawareness.
Socialengineeringremainsadominantattackmethod,makingitcrucialforsecurityawarenessprogramsinhealthcareorganizationstoaddressemergingthreatssuchasdeepfakes(image,audio,video),smishing,andquishing.
Figure10:EffectivenessofSecurityAwarenessTrainingPrograms
SecurityIncidents
SignificantSecurityIncidents
InitialPointsofCompromise
Understandinginitialpointsofcompromiseiskeytoidentifyingvulnerabilitiesandstrengtheningdefensessincetheyoftenserveasgatewaysforattackers.Addressingtheseweaknessescansignificantlyreducetheriskofbreachesandimprovesecurityposture.AsshowninFigure11below,weaskedrespondentstoidentifyinitialpointsofcompromiseforsignificantsecurityincidentsinthepastyear.Generalemailphishing(63%),SMSphishingandtargetedspear-phishing(each34%),businessemailcompromise(31%),phishingwebsites(21%),maliciousads(20%),socialmediaphishing(19%),vishing(voicephishing)(17%),andwhaling(alsoknownasexecutiveimpersonation)(16%),deepfakeimages(6%),audiodeepfakes(4%),videodeepfakes(3%),distributeddenialofservice(DDoS)attacks(3%),andprivacybreaches(3%)werereported.Eightpercentdidnotknow.Eighteenpercentreportednosignificantsecurityincidents,
Figure11:InitialPointsofCompromiseforSignificantSecurityIncidentsinthePast12Months
TestingofIncidentResponsePlans
Regulartestingofincidentresponseplansisessentialtoensureorganizationsarepreparedtohandlecybersecurityincidentseffectively.Tabletopexercisesplayacriticalroleinidentifyinggaps,improvingcoordination,andstrengtheningoverallresponsecapabilities.Understandinghowfrequentlyorganizationsengageintheseexercisesprovidesinsightintotheirlevelofpreparednessandcommitmenttomitigatingpotentialrisks.
Weaskedrespondentswhethertheirorganizationsconducttabletopexercisestotestthecapabilitiesoftheirincidentresponseprograms.AsshowninFigure12below,45%ofrespondentsindicatedthattheirorganizationsdoconducttabletopexercises,while39%reportedtheydonot.Sixteenpercentstatedthattheywereunsurewhethertheirorganizationsconducttabletopexercises.
Thesefindingshighlightamixedlevelofpreparednessamongorganizations,withmanyfailingtotesttheirincidentresponseplansbyusingtabletopexercises.Tabletopexercisesarecriticalforsimulatingvariousscenarios,identifyinggapsinresponsecapabilities,andstrengtheningoverallincidentresponsestrategies.
The16%ofrespondentsunawareofwhethertheirorganizationsconducttheseexercisespointstopotentialgapsincommunicationandparticipation.Thisunderscorestheimportanceofincludingallrelevantstakeholders—regardlessoftheirrole—intabletopexercises.Improvingcommunicationandtransparencyaboutincidentresponseeffortscanhelpensurebroaderorganizationalawarenessandmoreeffectivepreparednessforpotentialincidents.
Figure12:OrganizationsConductingTabletopExercisesforIncidentResponseTesting
StakeholderParticipationinTabletopExercises
Respondentswhoseorganizationsconducttabletopexercisesidentifiedparticipants.Theresultsshowadiverserangeofparticipantsbutalsohighlightgapsinparticipation.AsshowninFigure13below,ITstaff(89%)andcybersecuritystaff(77%)werethemostfrequentlyinvolvedstakeholders,reflectingtheircriticalrolesinmanagingandrespondingtoincidents.Seniormanagementparticipationwasreportedat73%,whileexecutives,includingC-suiteleaders,participatedin58%ofcases,demonstratingrobustlevelofleadershipengagement.
Otherdepartmentswithinhealthcareorganizationswereinvolvedintabletopexercises:
Compliance(48%)
Clinicians(44%)
Informatics(44%)
Humanresources(43%)
Legal(42%)
Accountingandfinance(35%)
Externalparties,suchasvendors(22%)andcontractors(15%),hadlowparticipationrates.Thismaypointtoanareaforimprovement,giventheirpotentialinvolvementwhenincidentsoccur.Additionally,theboardofdirectorsparticipatedinonly21%ofcases,despitetheircriticalroleinoverseeingcybersecurityrisk.Twopercentofrespondentsstatedtheydidnotknowwhichstakeholdersparticipate,whileanother2%reportedthatotherstakeholders,suchasemergencypreparednessprofessionals,wereinvolvedonanadhocbasis.
Figure13:TabletopExerciseParticipants
What’sHappeningwithRansomware
PresentState
Ransomwareattackscontinuetobeasignificantthreat.Oftenstatesponsored,theseattacksarehighlyorganizedandsophisticated.Healthcareorganizationsexperiencedaggressiveattackssinceatleast2018,andthethreatremainsaspersistentasever.
1
Ransomwareleaksitesareprevalent.
2
Healthcareproviders,payors,vendors,andotherentitiesacrossthehealthcareecosystemhavebeentargeted.Ransomwareremainsacriticalissue,highlightingtheneedforrobustdefensesandeffectiveresponsestrategies.
2024RansomwareTrends
Healthcareorganizationsappeartobepreparedtopreventanddefendagainstransomwareattacksin2024.AsshownbelowinFigure14,amajorityofrespondents(74%)indicatedthattheirorganizationshadnotexperiencedransomwareattacksinthepast12months.However,13%reportedthattheirorganizationshadbeentargeted,underscoringtheongoingriskransomwareposestothehealthcareandpublichealthsector.Thirteenpercentofrespondents—primarilyfromnon-executivemanagementandnon-managementroles—statedtheydidnotknowwhethertheirorganizationshadexperiencedsuchanattack.
Figure14:RansomwareAttackin2024
1U.S.DepartmentofHealthandHumanServices.RansomwareTrendsinHealthcare.,https://
/sites/default/files/ransomware-healthcare.pdf.
AccessedJan.242025.2PaloAltoNetworks.Unit42RansomwareLeakSiteDataAnalysis.PaloAltoNetworks,
/unit-42-ransomware-leak-site-data-analysis/.AccessedJan.242025.
RansomwareTrends:2022-2024
Thepercentageofrespondentsreportingthattheirorganizationsexperiencedransomwareattackshasremainedrelativelyconsistentinrecentyears.AsshowninFigure15below,in2024,13%indicatedtheirorganizationshadexperiencedaransomwareattack,slightlyhigherthanthe12%reportedin2023andmatchingthe13%reportedin2022.Similarly,thepercentageofrespondentsreportingnoransomwareattacksremainedsteadyat74%in2024,comparedto75%in2023and78%in2022.Respondentswhodidnotknowwhethertheirorganizationsexperiencedaransomwareattackwere13%ofrespondentsin2023and2024,comparedto9%in2022.
Thesefindingshighlighttheimportanceofimprovingvisibilityandtransparencyregardingransomwareincidents.Evenwhenorganizationsarenotdirectlyimpacted,thepersistentthreatofransomwarenecessitatesconstantvigilance,proactiveplanning,androbustdefensestosafeguardsensitiveassetsandensureoperationalandclinicalcontinuity.
Figure15:RansomwareAttacksfrom2022-2024
ToPayorNottoPay–RansomwarePayments
Ransomwarevictimsfacethetoughdecisionofwhethertopay,basedontheirspecificcircumstances.Amonghealthcareorganizationsvictimizedin2024,62%ofrespondentsreportednotpayingaransom,11%paidtheransom,and27%didnotknow,asshowninFigure16.In2023,30%ofrespondentsstatedthattheirorganizationspaidtheransom,while52%didnot,and18%didnotknow,asshownbelowinFigure17.Payingaransomnotonlyhasthepotentialtoemboldenthreatactorsbutalsoincreasesthelikelihoodofrepeatedtargetingoradditionalattacksonotherhealthcareorganizations.Thereisaneedforbettercoordination,planning,andinformationsharingtoimproveresilience.
Figure16:RansomwarePaymentsin2024
Figure17:RansomwarePaymentsin2023-2024
Proactivevs.ReactiveSecurityMeasures
Organizationsreportedarangeofproactiveandreactivesecuritymeasuresinresponse
toevolvingcyberthreats.AsshownbelowinFigure18,themostcommonactionsincludedimplementingnewsecuritytools(62%)andestablishingnewsecuritypolicies(57%),emphasizingtheimportanceofstrengtheningbothtechnicaldefensesandgovernanceframeworks.
Nearlyhalfofrespondents(49%)reportedenhancingtheirsecurityawarenesstrainingprograms,underliningthecriticalroleofworkforceeducationinrecognizingandmitigatingpotentialthreats.Othersignificantmeasuresincludedupgradinglegacytechnology(43%)andincreasingcybersecuritystaff(30%),bothessentialformaintainingoperationalresilienceinthefaceofsophisticatedattacks.
Asmallerpercentageofrespondentsreportedinvestingincyberliabilityinsurance(16%)orenhancingexistingcoverage(14%),reflectingalesscommonbutstillimportantstrategyformanagingthepotentialfinancialimpactsofcyberincidents.
Whilethesefindingsindicateapredominantlyproactivestanceamonghealthcareorganizations,theyalsohighlightareasforimprovement.Notably,16%ofrespondentsstatedtheywereunawareofwhatmeasureshadbeenimplemented,and3%reportedthatnonewchangesweremade—anapproachthatalignsmorecloselywithreactivesecuritypractices.Additionally,3%focusedsolelyondevicelifecyclemanagement,
which,whileimportant,maynotadequatelyaddressthebroaderrisksposedbytoday’s
evolvingthreatlandscape.
Figure18:Post-RansomwareAttackChanges
FutureState
Ransomwareattacksarelikelytocontinueevolving,withanincreaseinbothfrequencyandsophistication.Emergingtechnologies,suchasartificialintelligenceand,inthefuture,quantumcomputing,areexpectedtoacceleratethistrend.
3
However,greaterinformationsharingwithinandacrossorganizationscanstrengthentheresilienceofthehealthcaresector.
ThedevelopmentofCentralBankDigitalCurrencies(CBDCs),includingthoseintheUnitedStatesandothernations,mayalsohelpmitigatecybersecurityrisks.Byofferingsecure,regulatedalternativestocryptocurrencies,CBDCscouldreducetheappealofuntraceablepaymentsoftenexploitedbyransomwareattackers.Whiletheiradoptionisstilldebated,CBDCshavethepotentialtodisrupttheransomwareecono
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 光伏股份分配合同范本
- 機械加工合股合同范本
- 培訓(xùn)機構(gòu)課程協(xié)議協(xié)議書
- 手機屏幕材料檢測協(xié)議書
- 房屋更名轉(zhuǎn)讓合同范本
- 托管合伙入股合同范本
- 客戶產(chǎn)品試用合同范本
- 單身老人雇女保姆協(xié)議書
- 員工單店入股合同范本
- 工業(yè)印刷設(shè)備買賣協(xié)議書
- 電力維修簡單的協(xié)議書模板
- 第七屆江西省大學(xué)生金相技能大賽知識競賽單選題題庫附有答案
- 廣東省廣州市天河區(qū)2023-2024學(xué)年學(xué)年高一下學(xué)期期末考試數(shù)學(xué)試卷(解析版)
- 2024年江蘇省高考生物試卷(真題+答案)
- 電梯安裝修理維護程序文件及表格(符合TSG 07-2019特種設(shè)備質(zhì)量保證管理體系)
- 上海市2023-2024學(xué)年八年級下學(xué)期期末數(shù)學(xué)練習(xí)卷(原卷版)
- 2024年荊州客運從業(yè)資格考試題庫
- 10kV-500kV輸變電設(shè)備交接試驗規(guī)程
- 2024年四川省涼山“千名英才智匯涼山”行動第二批引才675人歷年(高頻重點提升專題訓(xùn)練)共500題附帶答案詳解
- 股權(quán)質(zhì)押貸款合同案例
- 美容衛(wèi)生管理制度打印版
評論
0/150
提交評論