SlideShare uma empresa Scribd logo
1 de 19
© 2016 Avecto Ltdavecto.com
Containing the outbreak
The healthcare security
pandemic
James Maude
Senior Security Engineer
2016 Avecto Ltdavecto.com
© 2016 Avecto Ltdavecto.com
Introducing James Maude
James Maude
Senior Security Engineer
› Broad remit in endpoint security
research, conducting in-depth analysis
of malware and penetration testing to
identify attack vectors and trends in
the evolving security landscape.
› Active involvement in the security
research community
› Background in Digital Forensics &
Research
© 2016 Avecto Ltdavecto.com
What is happening
Ransomware strains
Attack vectors
Explore solutions
Agenda
2016 Avecto Ltdavecto.com
© 2016 Avecto Ltdavecto.com
Ransomware’s impact on the healthcare market has been headline news.
© 2016 Avecto Ltdavecto.com
Ransomware has exploded over the past 12 months
© 2016 Avecto Ltdavecto.com 2016 Avecto Ltdavecto.com
© 2016 Avecto Ltdavecto.com
› Same group as successful Dridex banking trojan campaigns
› Phishing Word document contains dropper macro
› Encrypts data on local drives and network shares
› Attempts to erase local backup copies of files
Locky Analysis
2016 Avecto Ltdavecto.com
© 2016 Avecto Ltdavecto.com
› Evolves quickly, usually undetected ( VirusTotal )
› Multiple strains tested in Avecto labs – all stopped proactively
2016 Avecto Ltdavecto.com
Locky Analysis
© 2016 Avecto Ltdavecto.com 2016 Avecto Ltdavecto.com
Example of a free ransomware kit on the
dark web
© 2016 Avecto Ltdavecto.com 2016 Avecto Ltdavecto.com
Makes generating ransomware payloads easy
© 2016 Avecto Ltdavecto.com
› Low barrier to entry
› Increasingly looking for high value targets
› Network shares and mounted devices
› Decrypting not an option
› Constantly evolving to bypass defences
Ransomware Evolution
2016 Avecto Ltdavecto.com
© 2016 Avecto Ltdavecto.com
› A lot of shared time critical data = high value
› Aging and vulnerable systems
› Admin rights required for legacy apps
› Security not top of agenda
Why is healthcare a target?
2016 Avecto Ltdavecto.com
© 2016 Avecto Ltdavecto.com
› 35% of NHS trusts run XP
› 14% have no transition date set
› Melbourne Health and QBot
The aging population
2016 Avecto Ltdavecto.com
blog.avecto.com
© 2016 Avecto Ltdavecto.com
© 2016 Avecto Ltdavecto.com
CSOChief Security Officer
› Advanced network appliance
› Patched and updated
› Award winning AV software
› SIEM and SOC
› User opens a word doc..
How good security can be undermined by
ransomware
© 2016 Avecto Ltdavecto.com
How to prevent the infection?
2016 Avecto Ltdavecto.com
© 2016 Avecto Ltdavecto.com
› Right medicine in the right dose
› Least Privilege
› Screen and establish a baseline
› Whitelist
› Isolate the vulnerable
› Sandbox applications that
introduce infections
Immunisation
2016 Avecto Ltdavecto.com
As recommended by:
© 2016 Avecto Ltdavecto.com
• Isolates browser, downloaded content and email attachments
• Mitigates ransomware / web threats
• Protect data and contain unknown threats
• #1 Defense strategy
• Easy to achieve whitelisting
• Regain control of unknown applications
• Mitigates 85% Critical Windows vulnerabilities
• Protect user and system
• Privileges when you need them
© 2016 Avecto Ltdavecto.com
Preventing
ransomware in
healthcare is
possible!
1.
Get proactive,
reduce the
attack surface
2.
Foundational
security starts
with the
endpoint
3.
Prevention is possible
Visit www.avecto.com for more details.

Mais conteúdo relacionado

Mais procurados

Web Application Security Ny Cyber Sec Conf
Web Application Security Ny Cyber Sec ConfWeb Application Security Ny Cyber Sec Conf
Web Application Security Ny Cyber Sec Conf
Aung Khant
 

Mais procurados (20)

Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
 
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 Best Practice Next-Generation Vulnerability Management to Identify Threats, ... Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 
CSS Trivia
CSS TriviaCSS Trivia
CSS Trivia
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
How to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style VirusesHow to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style Viruses
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
4 Ways to Respond to Today's Advanced Threats
4 Ways to Respond to Today's Advanced Threats4 Ways to Respond to Today's Advanced Threats
4 Ways to Respond to Today's Advanced Threats
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovate
 
Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)
 
Web Application Security Ny Cyber Sec Conf
Web Application Security Ny Cyber Sec ConfWeb Application Security Ny Cyber Sec Conf
Web Application Security Ny Cyber Sec Conf
 
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
 
Cybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. BaldwinCybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. Baldwin
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 

Destaque

CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
resultsig
 

Destaque (20)

Privilege Management Solution
Privilege Management SolutionPrivilege Management Solution
Privilege Management Solution
 
CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
25th Japan IT Week 2016
25th Japan IT Week 201625th Japan IT Week 2016
25th Japan IT Week 2016
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution Demo
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
 
Create a Safer Learning Environment with Absolute Safe Schools
Create a Safer Learning Environment with Absolute Safe SchoolsCreate a Safer Learning Environment with Absolute Safe Schools
Create a Safer Learning Environment with Absolute Safe Schools
 
SANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems TodaySANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems Today
 
Treat Cyber Like a Disease
Treat Cyber Like a DiseaseTreat Cyber Like a Disease
Treat Cyber Like a Disease
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
 
Point of Sale Insecurity: A Threat to Your Business
Point of Sale Insecurity: A Threat to Your BusinessPoint of Sale Insecurity: A Threat to Your Business
Point of Sale Insecurity: A Threat to Your Business
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 

Semelhante a Containing the outbreak: The healthcare security pandemic

Datto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhDatto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rh
James Herold
 

Semelhante a Containing the outbreak: The healthcare security pandemic (20)

You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Datto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhDatto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rh
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
The Current State of Cybersecurity
The Current State of CybersecurityThe Current State of Cybersecurity
The Current State of Cybersecurity
 

Último

Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in LahoreBest Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Deny Daniel
 
Escorts Lahore || 🔞 03274100048 || Escort service in Lahore
Escorts Lahore || 🔞 03274100048 || Escort service in LahoreEscorts Lahore || 🔞 03274100048 || Escort service in Lahore
Escorts Lahore || 🔞 03274100048 || Escort service in Lahore
Deny Daniel
 
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Sheetaleventcompany
 
Call Girls in Udaipur Girija Udaipur Call Girl ✔ VQRWTO ❤️ 100% offer with...
Call Girls in Udaipur  Girija  Udaipur Call Girl  ✔ VQRWTO ❤️ 100% offer with...Call Girls in Udaipur  Girija  Udaipur Call Girl  ✔ VQRWTO ❤️ 100% offer with...
Call Girls in Udaipur Girija Udaipur Call Girl ✔ VQRWTO ❤️ 100% offer with...
mahaiklolahd
 
surat Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
surat Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetsurat Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
surat Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh
 
visakhapatnam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
visakhapatnam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetvisakhapatnam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
visakhapatnam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh
 
Call Girls Service Chandigarh Sexy Video ❤️🍑 8511114078 👄🫦 Independent Escort...
Call Girls Service Chandigarh Sexy Video ❤️🍑 8511114078 👄🫦 Independent Escort...Call Girls Service Chandigarh Sexy Video ❤️🍑 8511114078 👄🫦 Independent Escort...
Call Girls Service Chandigarh Sexy Video ❤️🍑 8511114078 👄🫦 Independent Escort...
Sheetaleventcompany
 
9316020077📞Majorda Beach Call Girls Numbers, Call Girls Whatsapp Numbers Ma...
9316020077📞Majorda Beach Call Girls  Numbers, Call Girls  Whatsapp Numbers Ma...9316020077📞Majorda Beach Call Girls  Numbers, Call Girls  Whatsapp Numbers Ma...
9316020077📞Majorda Beach Call Girls Numbers, Call Girls Whatsapp Numbers Ma...
Goa cutee sexy top girl
 
vadodara Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
vadodara Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetvadodara Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
vadodara Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh
 
Kottayam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Kottayam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetKottayam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Kottayam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024
Sheetaleventcompany
 

Último (20)

Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in LahoreBest Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
 
Escorts Lahore || 🔞 03274100048 || Escort service in Lahore
Escorts Lahore || 🔞 03274100048 || Escort service in LahoreEscorts Lahore || 🔞 03274100048 || Escort service in Lahore
Escorts Lahore || 🔞 03274100048 || Escort service in Lahore
 
AECS Layout Escorts (Bangalore) 9352852248 Women seeking Men Real Service
AECS Layout Escorts (Bangalore) 9352852248 Women seeking Men Real ServiceAECS Layout Escorts (Bangalore) 9352852248 Women seeking Men Real Service
AECS Layout Escorts (Bangalore) 9352852248 Women seeking Men Real Service
 
Sexy Call Girl Kumbakonam Arshi 💚9058824046💚 Kumbakonam Escort Service
Sexy Call Girl Kumbakonam Arshi 💚9058824046💚 Kumbakonam Escort ServiceSexy Call Girl Kumbakonam Arshi 💚9058824046💚 Kumbakonam Escort Service
Sexy Call Girl Kumbakonam Arshi 💚9058824046💚 Kumbakonam Escort Service
 
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
 
Call Girls in Udaipur Girija Udaipur Call Girl ✔ VQRWTO ❤️ 100% offer with...
Call Girls in Udaipur  Girija  Udaipur Call Girl  ✔ VQRWTO ❤️ 100% offer with...Call Girls in Udaipur  Girija  Udaipur Call Girl  ✔ VQRWTO ❤️ 100% offer with...
Call Girls in Udaipur Girija Udaipur Call Girl ✔ VQRWTO ❤️ 100% offer with...
 
Sexy Call Girl Nagercoil Arshi 💚9058824046💚 Nagercoil Escort Service
Sexy Call Girl Nagercoil Arshi 💚9058824046💚 Nagercoil Escort ServiceSexy Call Girl Nagercoil Arshi 💚9058824046💚 Nagercoil Escort Service
Sexy Call Girl Nagercoil Arshi 💚9058824046💚 Nagercoil Escort Service
 
surat Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
surat Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetsurat Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
surat Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
visakhapatnam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
visakhapatnam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetvisakhapatnam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
visakhapatnam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Service Chandigarh Sexy Video ❤️🍑 8511114078 👄🫦 Independent Escort...
Call Girls Service Chandigarh Sexy Video ❤️🍑 8511114078 👄🫦 Independent Escort...Call Girls Service Chandigarh Sexy Video ❤️🍑 8511114078 👄🫦 Independent Escort...
Call Girls Service Chandigarh Sexy Video ❤️🍑 8511114078 👄🫦 Independent Escort...
 
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real MeetVip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
 
9316020077📞Majorda Beach Call Girls Numbers, Call Girls Whatsapp Numbers Ma...
9316020077📞Majorda Beach Call Girls  Numbers, Call Girls  Whatsapp Numbers Ma...9316020077📞Majorda Beach Call Girls  Numbers, Call Girls  Whatsapp Numbers Ma...
9316020077📞Majorda Beach Call Girls Numbers, Call Girls Whatsapp Numbers Ma...
 
Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510
 
vadodara Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
vadodara Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetvadodara Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
vadodara Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun  UttrakhandDehradun Call Girls 8854095900 Call Girl in Dehradun  Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
 
Budhwar Peth ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Budhwar Peth ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Budhwar Peth ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Budhwar Peth ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology
 
Kottayam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Kottayam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetKottayam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Kottayam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
 

Containing the outbreak: The healthcare security pandemic

  • 1. © 2016 Avecto Ltdavecto.com Containing the outbreak The healthcare security pandemic James Maude Senior Security Engineer 2016 Avecto Ltdavecto.com
  • 2. © 2016 Avecto Ltdavecto.com Introducing James Maude James Maude Senior Security Engineer › Broad remit in endpoint security research, conducting in-depth analysis of malware and penetration testing to identify attack vectors and trends in the evolving security landscape. › Active involvement in the security research community › Background in Digital Forensics & Research
  • 3. © 2016 Avecto Ltdavecto.com What is happening Ransomware strains Attack vectors Explore solutions Agenda 2016 Avecto Ltdavecto.com
  • 4. © 2016 Avecto Ltdavecto.com Ransomware’s impact on the healthcare market has been headline news.
  • 5. © 2016 Avecto Ltdavecto.com Ransomware has exploded over the past 12 months
  • 6. © 2016 Avecto Ltdavecto.com 2016 Avecto Ltdavecto.com
  • 7. © 2016 Avecto Ltdavecto.com › Same group as successful Dridex banking trojan campaigns › Phishing Word document contains dropper macro › Encrypts data on local drives and network shares › Attempts to erase local backup copies of files Locky Analysis 2016 Avecto Ltdavecto.com
  • 8. © 2016 Avecto Ltdavecto.com › Evolves quickly, usually undetected ( VirusTotal ) › Multiple strains tested in Avecto labs – all stopped proactively 2016 Avecto Ltdavecto.com Locky Analysis
  • 9. © 2016 Avecto Ltdavecto.com 2016 Avecto Ltdavecto.com Example of a free ransomware kit on the dark web
  • 10. © 2016 Avecto Ltdavecto.com 2016 Avecto Ltdavecto.com Makes generating ransomware payloads easy
  • 11. © 2016 Avecto Ltdavecto.com › Low barrier to entry › Increasingly looking for high value targets › Network shares and mounted devices › Decrypting not an option › Constantly evolving to bypass defences Ransomware Evolution 2016 Avecto Ltdavecto.com
  • 12. © 2016 Avecto Ltdavecto.com › A lot of shared time critical data = high value › Aging and vulnerable systems › Admin rights required for legacy apps › Security not top of agenda Why is healthcare a target? 2016 Avecto Ltdavecto.com
  • 13. © 2016 Avecto Ltdavecto.com › 35% of NHS trusts run XP › 14% have no transition date set › Melbourne Health and QBot The aging population 2016 Avecto Ltdavecto.com blog.avecto.com
  • 14. © 2016 Avecto Ltdavecto.com
  • 15. © 2016 Avecto Ltdavecto.com CSOChief Security Officer › Advanced network appliance › Patched and updated › Award winning AV software › SIEM and SOC › User opens a word doc.. How good security can be undermined by ransomware
  • 16. © 2016 Avecto Ltdavecto.com How to prevent the infection? 2016 Avecto Ltdavecto.com
  • 17. © 2016 Avecto Ltdavecto.com › Right medicine in the right dose › Least Privilege › Screen and establish a baseline › Whitelist › Isolate the vulnerable › Sandbox applications that introduce infections Immunisation 2016 Avecto Ltdavecto.com As recommended by:
  • 18. © 2016 Avecto Ltdavecto.com • Isolates browser, downloaded content and email attachments • Mitigates ransomware / web threats • Protect data and contain unknown threats • #1 Defense strategy • Easy to achieve whitelisting • Regain control of unknown applications • Mitigates 85% Critical Windows vulnerabilities • Protect user and system • Privileges when you need them
  • 19. © 2016 Avecto Ltdavecto.com Preventing ransomware in healthcare is possible! 1. Get proactive, reduce the attack surface 2. Foundational security starts with the endpoint 3. Prevention is possible Visit www.avecto.com for more details.