Intelligent Health.tech Issue 03 | Page 65

MAINTAINING HEALTHCARE SERVICE CONTINUITY INVOLVES BETTER ASSESSMENT AND MANAGEMENT OF CYBERSECURITY RISKS ASSOCIATED WITH THIRD- PARTY VENDORS ACROSS HEALTHCARE SUPPLY CHAINS .
D I G I T A L D I A G N O S T I C S

MAINTAINING HEALTHCARE SERVICE CONTINUITY INVOLVES BETTER ASSESSMENT AND MANAGEMENT OF CYBERSECURITY RISKS ASSOCIATED WITH THIRD- PARTY VENDORS ACROSS HEALTHCARE SUPPLY CHAINS .

The role of intelligent privileged controls
Privilege escalation is the number one attack vector of risk for healthcare organisations today . Using stolen credentials , attackers can begin moving through systems looking for opportunities to escalate privileges and exploit powerful privileged accounts to install ransomware .
Extending critical identity security practices to include privileged access management should top healthcare organisations ’ action list . Doing so can help protect against ransomware and dramatically drive down risk across the supply chain by enhancing visibility and control over privileged accounts , isolating and monitoring privileged activity , removing direct access to tier zero systems and minimising credential exposure and privilege escalation opportunities . with third-party vendors in installing new security programmes , such as installing and configuring firewalls , implementing security controls to restrict unauthorised traffic and using security patches from third-party security providers .
In addition , Singapore plans to expand the Cybersecurity Act to improve awareness of threats in cyberspace , protect virtual assets that support essential services , and include Non-Critical Information Infrastructures ( Non-CIIs ) that play an important role in the digital economy . It is also looking to update the Cybersecurity Code of Practice for CIIs , which includes the healthcare sector , to help CIIs improve their defence against more sophisticated cyberthreats .
Organisations should also adopt Zero Trust Identity Security programmes that deliver measurable cyber-risk reduction by continuously authenticating the user ' s credentials before accessing an organisation ’ s applications , infrastructure and data across a variety of environments .
Because of the critical nature of healthcare services , providers must adopt a mature cybersecurity posture that provides a high level of resiliency , not just to protect not only their services but also their patients . Having a weak cybersecurity posture can cripple healthcare services , which will lead to severe injury or death . With the right measures in place , healthcare providers can be assured that they continue treating their clients , even in the face of an imminent cyberthreat . �
www . intelligenthealth . tech 65