As the study was done by the American multinational technology and consulting corporation IBM (International Business Machines), cyber criminals or hackers began to switch their attention from banks to the financial sector of medical facilities.

According to the report “2016 Cyber ​Security Intelligence Index, last year Health Organization took first place in the number of cyber attacks”.

Hackers Switched Their Attention To The Financial Sector Of Health Organization

The “2016 Cyber ​​Security Intelligence Index” report presents data about the security threats collected from 1st January to 31st December 2015 with 8 thousand security threats. There are more than 100 countries with IBM client devices.

5 of 8 major attacks since 2010 occurred in the first half of 2015. In total, more than 100 million records of health system users have been kidnapped in the past year.

Health care customer records have been relevant and reliable for many years, and therefore they are highly valued among hackers.

Credit card information, social security numbers, email addresses, health information, and information about the profession, which hackers can use for fraudulent purposes and identity theft.

According to the American multinational technology and consulting corporation IBM (International Business Machines) experts, healthcare organizations are in the first place in the list of companies most often exposed to cyber attacks in 2015.

This is followed by industrial enterprises, banks, government agencies, and transportation companies. Financial institutions previously occupied first place among the favorite victims of hackers in 2015. They were in the ​third position by switching attention to intruders in the health and industry sector.

Reducing the number of cyber attacks also contributed to the improvement of the protection systems of banks, and according to the American multinational technology and consulting corporation IBM (International Business Machines), 60% of cyber attacks in the past year have been carried out by insiders with access to the system.

LEAVE A REPLY

Please enter your comment!
Please enter your name here