Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/30/2016
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat Security Launches Healthcare Security Awareness and Training Program

Program designed to help healthcare companies assess and manage growing security risk, protect critical patient data

Pittsburgh, PA – March 29, 2016 Wombat Security Technologies (Wombat), the leading provider of cyber security awareness and training solutions, today launched a comprehensive new healthcare program designed to help healthcare providers protect critical patient information as the threat of a data breach continues to rise.

According to Symantec’s 2015 Internet Security Breach Report, the healthcare sector has reported the largest number of data breaches for four years in a row.  The report states that there are 37 percent of breaches are within healthcare more than triple the number of breaches that happen in retail which was reported to be only 11 percent.

Wombat’s solution is a bundled package, offering CyberStrength knowledge assessments, ThreatSim simulated phishing attack tool, interactive training modules, and security awareness materials. It is designed to give healthcare providers the necessary tools to protect and deflect data breaches within the busy pace of their organizations. The program includes automatically assigning training to users who need it most, allowing users to track and measure progress and dynamically tailoring program efforts to address specific threats as they continue to evolve.  Wombat’s auto-enrollment feature, and short, interactive training modules are an ideal fit for an industry faced with unique challenges in regard to staff and shift management.

Monongahela Valley Hospital drove a 90 percent reduction in successful phishing attacks and malware infections using Wombat’s solutions. “Since partnering with Wombat, we've seen a significant increase in user awareness and recognition of suspicious emails,” said the Senior Manager of IT Operation at Monongahela Valley Hospital. “Instead of clicking on these messages, our employees have caught and alerted us to more than ten separate phishing attacks, and in the ten months following the launch of our Wombat training program, we have seen a dramatic decline in infections caused by inappropriate email activity.”

“Our partnership with Wombat has been a true success and has helped us to educate individuals at all levels of our organization, which we feel is critical to protecting our patient's healthcare information, our employees' data, and our internal networks and systems,” he added.

The cost of a data breach is a rising concern for the healthcare industry. A report by Ponemon/IBM, 2015 Cost of a Data Breach Study, found that the average global per-record cost of a healthcare data breach is $363, which is more than twice the $154 average per-record cost across all global industries.

“Healthcare institutions are increasingly targeted by hackers, making it absolutely critical to deliver effective training to anyone who is not well-informed of HIPAA-mandated safeguards,” said Joe Ferrara, President and CEO of Wombat Security. “Our new healthcare program gives organizations a powerful suite of tools to protect healthcare information and patient records, while improving an organizations security posture. We are committed to providing our customers with the tools they need to change employee behavior and reduce risk within their organizations.”

The Healthcare Security Awareness and Training Program includes a best practices document, providing guidance on running a successful program in a healthcare setting and showing how all of the pieces of this bundle fit into the four key steps of Wombat’s Continuous Training Methodology: Assess, Educate, Reinforce, and Measure).  The complete program components are:

1.       Assessments (for baseline measurements and to track improvements)

·         CyberStrength – Predefined Health Info (PHI) CyberStrengh assessment that includes questions specific to PHI and the latest HIPAA standard

·         ThreatSim – Wombat’s simulated phishing attack tool, including healthcare-specific simulated phishing templates

2.       Education Modules -  Short, interactive training modules available on-demand

·         Protected Health Information

·         Email Security

·         Data Protection and Destruction

·         Physical Security

3.       Reinforcement Components

·         PhishAlarm - Email Button for quick reporting of suspicious emails

·         Security Awareness Materials - Posters, articles, images and security-minded giveaways

4.       Measurement Tools

·         Each product has reporting and analytic tools to identify areas of weakness and measure progress

Wombat’s Continuous Training Methodology has been shown to reduce successful phishing and malware infections by up to 90%. Their market-leading approach and award winning Security Education Platform currently helps over 1,000 enterprise organizations change employee behavior and dramatically reduce the risk of a cyber-attack.

About Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS-based cyber security education solution includes a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. Wombat, recognized by Gartner as a leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors, is helping Fortune 1000 and Global 2000 customers in industry segments such as finance and banking, energy, technology, higher education, retail and consumer packaged goods to strengthen their cyber security defenses

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17545
PUBLISHED: 2019-10-14
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
CVE-2019-17546
PUBLISHED: 2019-10-14
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
CVE-2019-17547
PUBLISHED: 2019-10-14
In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
CVE-2019-17501
PUBLISHED: 2019-10-14
Centreon 19.04 allows attackers to execute arbitrary OS commands via the Command Line field of main.php?p=60807&type=4 (aka the Configuration > Commands > Discovery screen).
CVE-2019-17539
PUBLISHED: 2019-10-14
In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.