Click me

Healthcare Cyberattacks

Healthcare Cyberattacks Infographic by "This level of compromise and control could easily lead to a wide range of criminal activities that are currently not being detected. For example,C hackers..can even manipulate medical devices used to administer critical care." Barbara Filkins, Senior SANS Analyst and Healthcare Specialist 94% of Medical Institutions Reported Being Victims of a Cyberattack Victims Not Victims 49,917 Unique malicious events 723 malicious IP addresses Unique source 375 U.S.-based compromised healthcare organizations Breakdown: Sources of Malicious Traffic 8.5% - 0.5% 6.1% 9.9% Source of Malicious Traffic 72% Healthcare Providers Healthcare Business Associates Healthcare Clearinghouses Health Plans Pharmaceutical Other Healthcare Organizations Breakdown: Compromised Applications 16% -33% 3% 3% 7% Compromised Applications 7% 16% VPN Applications and Devices Firewalls Web-based call center website Routers Radiology Imaging Software Video Conferencing Systems Digital Video Systems Enterprise Network Controllers (ENCS) Other Q "Security devices and applications themselves were either compromised, which is a common tactic among malware families, or these "protection" systems are not detecting malicious traffic coming from the network endpoints inside the protected perimeter.. That means they are out of compliance with privacy and security regulations for patient data." Barbara Filkins, Senior SANS Analyst and Healthcare Specialist Data Source: "Health Care Cyberthreat Report: Widespread Compromises Detected, Compliance Nightmare on Horizon," SANS and Norse © 2014 Additive Analytics Create infographics

Healthcare Cyberattacks

shared by lauradhamilton on Feb 21
1 share
375 United States healthcare organizations have been compromised. Today, with the Internet Of Things (IOT), even life-sustaining medical devices such as pacemakers are the targets of cyberattacks.


Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy


Click the code to copy
Customize size