You are on page 1of 40

Watch and Learn

5 real-life examples
that show why
cybersecurity is pivotal

1
BEST
CYBER
SECURITY
Companies in
HEALTHCARE
For 2021 JULY
ISSUE
00
#Self_Secure
5 Things you shouldn’t do
with your password

Rob Rhodes
Executive Vice President

Redefining the Benchmarks of Cybersecurity in Healthcare


Cybersecurity -
Protecting Information for Normal
Functioning of Healthcare Establishments

T he proliferation of technology has eased


things in the healthcare sector like any other,
but security threats have also invaded the
health space. Cybersecurity in the health space has
become a cause for concern in the industry and the
informatics professionals who manage and protect
data. It is no wonder then that career in health
informatics is one of the most sought-after careers.
But it is only of late that governments and
healthcare organizations began taking steps to
public. contain cybercrimes in healthcare. The healthcare
industry is vulnerable to cyberattacks, and its
Since the past few years, hacking and other ignorance has triggered off more attacks.
information technology-related crimes have risen,
and healthcare facilities struggle to combat the On this backdrop, we chose few cybersecurity
menace. Data breaches in the healthcare industry companies that ensure healthcare establishments
saw a record in 2015 and have been steadily rising function smoothly through prevention, detection,
since then. and mitigation against cyberattacks. Our latest
edition of Insights Care – 10 Best Cybersecurity
The ongoing pandemic only exposed the healthcare Companies in Healthcare for 2021 highlights the
industry to cybersecurity concerns and how the ever-growing threats and solutions to prevent them
industry needs to be resilient in times of crisis like in the healthcare segment.
this, and even otherwise. The past years have seen a
whopping rise in ransomware, malware, and other
cyberattacks. It has thus become pertinent for Happy reading to you!
healthcare providers to be more vigilant and adopt
technologies to prevent hacking. Ransomware is not
just financially detrimental to the healthcare
establishment, but the loss of data can also put the Sumita Sarkar
patient’s life at risk.

Recently, the Federal Bureau of Investigation (FBI)


and Cybersecurity and Infrastructure Security
Agency (CISA) warned private and public
healthcare sectors of ransomware attacks during
holidays.

Several cybersecurity technologies are now


available to keep cyber attackers in the health space
at bay. Cybersecurity in healthcare protects the
confidentiality, integrity, and availability of
information. To strengthen cybersecurity,
healthcare establishments need to approach
Editor’s Note
12 CXO

C O N T E N T S
Cyble
Empowering Healthcare Service
Providers with State-of-the-Art
Cybersecurity

32 20
The Right Care
The Importance of
Independence Among Disabled
People, Particularly During
A Global Pandemic

SafeBreach Articles
Maximize Security Control Effectiveness.
Reduce the Attack Surface
16
Watch and Learn
24 5 real-life examples
that show why
cybersecurity is pivotal

28

ISA Cybersecurity #Self_Secure


5 Things you shouldn’t do
Spearheading the with your password
Cybersecurity Revolution
C O V E R S T O R Y

08

Redefining the Benchmarks of Cybersecurity in Healthcare


Editor-in-Chief Sumita Sarkar

Senior Editor Anish Miller


Deputy Editor Abhishaj Sajeev
Assis ng Editors Nidhi, Trishika

Visualiser David King


Art & Design Head Priyanka Rajage
Co-designer Paul Belin
Art & Picture Editor Rohil Shinganapurkar

Business Development Manager Amy Jones


Marke ng Manager John Smith
Business Development Execu ves Sarah Wilson, John Smith, Alex Vincent
Sales Execu ves Kelli, Bill, Anna

Technical Head Jacob Smile


Assistant Technical Head Aditya Kothare
Technical Consultants David, Robert

Digital Marke ng Manager Alina Sege


Assistant Digital Marke ng Manager Amol Wadekar
SME-SMO Execu ves Atul, Gemson

Research Analyst Eric Smith


Circula on Manager Tanaji

sales@insightscare.com
July, 2021
Corporate Offices:
Insights Success Media Tech LLC Insights Success Media and Technology Pvt. Ltd.
555 Metro Place North, Suite 100, Office No. 22, Rainbow Plaza, Shivar Chowk,
Dublin, OH 43017, United States Pimple Saudagar, Pune, Maharashtra 411017
Phone - 302-319-9947 Phone - India: 7410033802, 74100058552
Email: info@insightscare.com Email: info@insightscare.com
For Subscription: www.insightscare.com For Subscription: www.insightscare.com

Follow us on : www.facebook.com/InsightsCare/ https://twitter.com/Insightscare

Copyright © 2021 Insights Success Media and Technology Pvt. Ltd., All rights reserved. The content and images used in this magazine should not be reproduced or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights success.
Reprint rights remain solely with Insights Success Media and Technology Pvt. Ltd. Insights Care is powered by Insights Success Media and Technology Pvt. Ltd.
Company Name Featuring Description

BlueVoyant's proprietary data, analytics and technology,


BlueVoyant James Rosenthal
bluevoyant.com coupled with deep expertise, works as a force multiplier to
CEO secure your full ecosystem.

CryptoMill Cybersecurity Solutions provides advanced,


CryptoMill Cybersecurity Nandini Jolly, Founder innovative data security solutions for enterprises,
Solutions cryptomill.com President, and CEO professionals, and individuals.

Beenu Arora, Co-founder Cyble is an AI powered cyber threat intelligence company


Cyble
and CEO Manish Chachada that empowers global organizations with darkweb &
cyble.io
Co-founder and COO cybercrime monitoring.

DataArt Eugene Goland DataArt is a global software engineering firm that takes a
dataart.com President and CEO uniquely human approach to solving problems.

HUB Security
hubsecurity.io DISCRIPTIONN
Eyal Moshe
Co-founder and CEO FORM
HUB Security is a Confidential computing, cyber security
platform for critical infrastructure, AI and financial services.

iatricSystems Rob Rhodes iatricSystems, Inc., is a healthcare technology company


iatric.com Executive Vice President dedicated to improving the delivery of care through technology.

INTRUSION INTRUSION's Shield is a bi-directional Zero Trust solution


Joe Head, CTO
intrusion.com protecting you from Zero-Day and Malware-Free attacks.

Keith Alexander IronNet Cybersecurity is a global cybersecurity leader that


IronNet Cybersecurity is revolutionizing how enterprises, industries, and
Chairman Founder
Inc ironnet.com governments secure their networks.
and Co-CEO

ISA is Canada's leading pure-play cybersecurity company,


ISA Cybersecurity Inc Kevin Dawson with nearly three decades of experience delivering
e-isa.com President and CEO cybersecurity end-to-end services and people, you can trust.

SafeBreach is the top cybersecurity solution provider that delivers a


SafeBreach Inc Guy Bejerano, CEO 'hacker's view' of an enterprise's security posture for total and
safebreach.com Itzik Kotler, CTO continuous security assessment, validation, and to help prioritize and
remediate based on where the biggest risk is to the business
C O V E R S T O R Y

Redefining the Benchmarks of Cybersecurity in Healthcare

About the Leader


Rob Rhodes, the Executive Vice
President for iatricSystems,
started his career in Healthcare
IT in 1990 at MEDITECH. Rob
moved into the Hospital Provider
space in several roles, including
Chief Information Officer. Rob’s
strong background in technology,
hospital operations, and
information security & privacy
led him to join iatricSystems in
2013 as Senior Director of Patient
Privacy. Rob led the team that
achieved KLAS Category Leader
with the iatricSystems Security
Audit Manager product for four
consecutive years.
Rob Rhodes
Executive Vice President
10 Best Cybersecurity Companies in Healthcare For 2021

E very individual who uses a


smartphone or IoT device is
aware of the crucial role that
cybersecurity plays. From protecting
one’s privacy to averting digital
Over the past 30 years, we have
supported more than 1,300
hospitals and provided solutions
threats for multinational companies, to the Hospital and Healthcare
cybersecurity has evidently become Market that protect the privacy
an inevitable necessity of our
and security of patient data and
everyday lives.
systems.
To cater to this necessity,
cybersecurity companies diligently
strive to innovate solutions that
revolutionize how the IT and
associated industries perceive threat
protection. One prominent name
among such companies is
iatricSystemsTM, Inc., a healthcare
technology company dedicated to
improving the delivery of care
through technology.
Headquartered at Daytona Beach, cybersecurity solutions market, the
Florida, iatricSystems, Inc. was impact of the COVID-19 pandemic
founded to bring together healthcare on the industry, and his vision for the
experience, products, services, and company.
partners to deliver solutions that
enhance existing investments in Below are the highlights from the
The best way to healthcare IT. interview:

improve the “Over the past 30 years, we have What aspects make iatricSystems
delivery of care supported more than 1,300 hospitals stand out from the competition?
and provided solutions to the
through Hospital and Healthcare Market that The best way to improve the delivery
technology is to protect the privacy and security of of care through technology is to have
patient data and healthcare systems,” a team that has walked in their shoes.
have a team that says Rob Rhodes, the Executive Our solutions are built by combining
has walked in their Vice President for iatricSystems. the skills of our clinicians, nurses,
lab techs, other subject-matter
shoes. In the following interview, Rob experts, and the skills of our IT &
shares his insights on the current Information Security and Privacy
landscape of the healthcare experts.
What is your opinion on the cybersecurity—post the pandemic?
impact of the current pandemic on And how are you strategizing your Via our managed
the global healthcare sector, and company’s operations for that
how has your company fared future?
privacy services, AI-
during the pandemic? driven technology,
The pandemic continues to virtual assistants,
The pandemic put a lot of stress on underscore the need for good
the global healthcare market and has cybersecurity. Cybercriminals don’t
and relationships
required overworked healthcare take days off, and we’ve all seen the with top-notch
heroes to continue to have to do more headlines of numerous healthcare cybersecurity
with less. Despite decreasing hospital system breaches from hackers taking
margins, we’ve seen that advantage of the pandemic.
partners, we can
organizations are still committed to Organizations had to act quickly to help even the
providing the highest quality, safest, provide remote working smallest
and most secure healthcare possible. opportunities, and the pandemic has
increased opportunities for curious
organizations fight
Our company has managed the individuals to snoop on medical the bad guys.
pandemic well, as we have continued records in-house.
to do our best to support the mission
of our customers. In response to new challenges, the
healthcare technology space is should be to help clients manage
In your opinion, what could be the continuously evolving. With more threats in a way that overcomes their
future of the healthcare technology breaches happening every day, unique challenges. Hospitals have
services sector—specifically privacy and security teams need all limited budgets for staff and
the help they can get. We’ve technology, but they still need the
seen—and have made—great highest levels of security.
progress in the Artificial Intelligence
space and have already begun to How do you envision scaling
Your goal include AI in our core products to
uncover breaches before they
iatricSystems’ operations in 2021?

should be to happen, as well as automation tools We continue to improve our


help clients to allow privacy and security teams technology to help our customers
to focus on more important tasks. improve the productivity of their
manage threats teams. Via our managed privacy
in a way that As an established leader, what is services, AI-driven technology,
your advice to the budding virtual assistants, and relationships
overcomes entrepreneurs and enthusiasts with top-notch cybersecurity
their unique aspiring to venture into healthcare partners, we can help even the
tech services? smallest organizations fight the bad
challenges. guys.
My advice would be to understand
your customer’s world and the
threats that they face daily. Your goal
10 Best Cyber Security Companies in Healthcare For 2021

Empowering Healthcare Service Providers


with State-of-the-Art Cybersecurity

C
an you imagine a world without internet today? It’s
About the leader
difficult to separate information technology from
our lives. From ordering groceries online and
Beenu Arora is a Senior Technology Strategist, cybersecurity leader
opting for digital banking services to working from home
having completed his MBA from London Business School and
and looking after our health through health apps, every
Columbia Business School. He has over 15 years of extensive
aspect of our lives is impacted by the technology.
international and cross-functional experience in technology, cyber-
security, risk consulting and transformation programs in nancial
Undoubtedly technology has made our lives simpler.
and energy, utilities and mining sectors across IT and
However, it has also brought a myriad of disadvantages
OT/ICS/SCADA.
with it. As the whole world pivoted to an everything-digital
approach during the initial phase of the COVID-19
He has advised multiple FORTUNE® 50 and FORTUNE® 100
pandemic, it also presented hackers with more opportunities
organizations on engagements ranging from cybersecurity strategy
to introduce sophisticated malwares and phishing attacks.
development to program execution and operations. Beenu is also a
member of the Forbes Technology Council with 15+ years of
In such conditions, businesses choose prevention against
international cybersecurity experience prior to Cyble.
cyberattacks by availing mitigation services from cyber
intelligence companies. Established in 2019, Cyble is one
such cyber intelligence company that has been empowering
businesses with their mitigation services and cybercrime
monitoring.
Backed by Y Combinator as a part of its 2021 winter
cohort, Cyble has been recognized by Forbes as one of the
top 20 Best Cybersecurity Startups to Watch in 2020. More
recently, Cyble secured a spot as a Silver Winner at the
Cybersecurity Excellence Awards 2021 for its Threat


Detection, Intelligence, and Response – North America.

We at Insights Care interviewed Beenu Arora, CEO and


Cyble's ultimate objective is to Manish Chachada, COO of Cyble for its latest edition
provide organizations with where the duo shared the genesis of the company and how,

real-time visibility into their
threat landscape
through its unique offerings, the company has been
empowering businesses against cybercrimes.

Keep reading to get a glimpse of cyber security world and


the current scenario of healthcare and cyber security shared
by these experienced leaders.

Please brief our audience about Cyble, its mission, and


the key aspects of its stronghold within the cyber
security niche.

12| July 2021|www.insightscare.com


Manish Chachada
Co-founder, COO, and Member of
Forbes Business Council Headquarters

Beenu Arora
Cyble Founder, CEO, and Member
of Forbes Technology Council

Founded in 2019, Cyble is an Atlanta-based, AI-powered, Manish Chachada, Co-founder, and COO of Cyble, is a seasoned
and Y Combinator-backed cyber intelligence company that professional with over 15+ years of International Corporate
empowers businesses with darkweb and cybercrime Finance and Business Management experience. His experience
monitoring and mitigation services. Cyble's ultimate spans across business and nancial management, operations
objective is to provide organizations with real-time management, auditing and assurance, merger and acquisitions
visibility into their threat landscape. (M&A), international tax strategy, and capital raising. A Chartered
Accountant from the Institute of Chartered Accountants of India
Cyble has an extensive team of qualified industry experts, and an MBA from Columbia and London Business School, Manish
security researchers, and cyber security specialists. At takes a keen interest in business and technology.
Cyble, we are continually striving towards expanding our
visibility over the darkweb and updating our technology to Currently, he co-chairs the special interest technology group for
match the ever-increasing sophistication of cyberattacks.. Financial Executive Network Group (FENG), one of the largest
global networks for nance professionals. In February 2021,
Tell us more about your products and services which Manish became a part of the prestigious Forbes Business Council,
make your company stand out from the competition? an invitation-only community for world-class C-suite and business
executives.
Cyble Vision is our proprietary SaaS product that indexes
internet-wide data from the deep, dark, and surface web.

13|July 2021|www.insightscare.com
Comprising over 140B+ darkweb records, 15B+ open- records, we expect the healthcare sector to be met with an
source intelligence (OSINT) records, and 50B+ threat increased array of cybercrime in the future. As the
indicators, our extensive datasets help us analyze close to a healthcare industry adopts advanced technologies for
billion pages every day, hunting for key cyber security improved patient treatment, cybercriminals and cyber threat
events with our proprietary risk models. Cyble stands out actors can be expected to exploit the vulnerabilities that
from the competition on account of the scale, depth, may accompany these changes.
diversity, and accuracy of its constantly expanding
database. As an established leader, what would be your advice to
the budding entrepreneurs and enthusiasts aspiring to
What is your opinion on the impact of the current venture into the cyber security industry?
pandemic on the global cyber security space, and what
challenges did you face during the initial phase of the For any business, old or new, it is important to set stringent
pandemic? security protocols. As a budding entrepreneur and
cybersecurity enthusiast, its crucial to stay abreast of the
The pandemic has placed the health sector at the receiving changing threat landscape and the evolution of the
end of novel cybersecurity challenges arising from cybersecurity industry. Having data safety systems in place
cyberthreats with COVD-19 as the threat vector. As the and conducting routine security audits are a must. Another
world continues to battle the current coronavirus crisis, critical aspect is to train employees on spotting potential
cybercriminals are taking advantage of the panic to launch security problems.
sophisticated scams and phishing attacks on enterprises,
individual computing systems, and healthcare and research How do you envision on scaling your company’s
institutions. We expect cybersecurity challenges to evolve operations and offerings in 2021?
over the months to come.
Being a growing company, Cyble is actively expanding its
During the challenging time, as organizations grappled with global team in lockstep with the needs of our increasing
unprecedented changes and adjusted to measures such as client base. This helps us understand our clients' needs
work-from-home, Cyble was not left unaffected. The safety better and provide them with timely and actionable
of our employees was of paramount importance to us. intelligence.
Employee health and well-being continues to be of utmost
importance to us. With our workforce scattered across the In addition, with cybercrime showing no signs of slowing
world, our efforts continue to be directed at supporting our down in 2021, our efforts are continuously directed at
workforce and helping them navigate through the crisis. implementing innovative techniques and technologies to
further expand our visibility across the Darkweb. A
With continuous development in technologies such as AI significant aspect of scaling our capabilities also involves
and big data, what is your prediction about the future of boosting our artificial intelligence and human intelligence
the cyber security space pertaining to the healthcare to higher levels.
services?

Threat actors quickly adapt to new technologies. With the


rapid development and adoption of disruptive technologies
such as AI, machine learning, and big data, cybercriminals
are sure to leverage the situation to launch cyberattacks
with escalating degrees of sophistication.

The pandemic has significantly impacted the cyberthreat


landscape in the healthcare sector. With targeted attacks on
the COVID-19 vaccine cold chain to leaked medical

14| July 2021|www.insightscare.com


Watch and Learn

5 EXAMPLES
THAT SHOW
WHY
CYBERSECURITY
IS PIVOTAL

16| July 2021|www.insightscare.com


17| July 2021|www.insightscare.com
I n today’s internet-driven world,
data breaches have become far
more evident than the general
population realizes. Data breaches
sometimes affect hundreds of billions
who was working for an affiliate
marketer. The customer data that was
stolen included usernames and mobile
numbers. Although the developer and
marketer apparently stole the data for
more than 530 million Facebook users
were compromised that included their
phone numbers, account names, and
Facebook Ids.

of people at a time. Data breaches can their own use and did not sell it on the However, the data was posted two
often be lethal enough to change the black market, they were both sentenced years later on the internet for free,
whole course of your life. to three years of prison time. projecting new and real criminal intent
surrounding the data. Keeping in mind
Huge complications can be LinkedIn – One of the latest large- the sheer number of phone numbers
experienced by businesses, individuals, scale security breaches happened in affected and easily available on the
or even governments from having June 2021 when professional dark web, security researcher Troy
sensitive information compromised. networking giant LinkedIn saw data of Hunt added functionality to his
Hackers have ways to get you through almost 700 million of its users posted HaveIBeenPwned (HIBP) breached
emails, text messages, Bluetooth, or on a dark web forum. This number was credential checking site that would let
any other online or offline service that estimated to be 90% of its total users. users check if their phone numbers had
you use. been exposed in the breached data.
A hacker going by the alias of ‘God
Without adequate attention to detail, User’ used data scraping techniques by All these examples make a solid case
even a minor vulnerability can cause exploiting the site’s API. He first for why having potent cyber security is
you a huge data breach. Following are dumped a set of 500 million user so important. It is crucial for users at
five of the biggest data breaches that information data of LinkedIn all levels to prevent data security
occurred in recent times, causing customers. LinkedIn argued that no breaches to keep their personal and
sensitive information to leak from sensitive or personal data was exposed. confidential information safe from
some of the biggest internet platforms. However, God User posted a data being compromised.
sample that included information like
Yahoo – One of the biggest security email address, phone number, Some of the practices that help with
breaches that the modern world has geolocation record, gender, and other better security of sensitive information,
seen in recent years is Yahoo. The social media details. which everyone should follow, include
incident which took place in 2013 patching and upgrading software,
ended up costing 3 billion hacked Sina Weibo – In March of 2020, Sina enforcing strong credentials and multi-
accounts. Weibo, one of China’s largest social factor authentication, upgrading
media platforms, was hacked, devices, and generally being educated
Yahoo revealed this massive security compromising data of over 538 million about the security practices that
breach initially in 2016, saying it of its users. Personal details like real prohibit your data from getting stolen.
affected 1 billion accounts. It was later names, site usernames, gender,
exposed that the security breach location, and phone numbers were - Trishika R.
affected almost all of Yahoo user stolen from the website. Reports said
accounts. This particular security that the attacker then sold the data on
breach resulted in Yahoo losing the dark web for $250 only. China’s
millions of users. Yahoo was in an Ministry of Industry and Information
acquisition deal with Verizon during Technology (MIIT) asked Sina Weibo
this time, which was later settled at a to improve its data security measures
lesser price. to protect its users’ private information
and inform them when incidents like
Alibaba – In November 2019, data data security breaches happen.
was stolen from the database of
Alibaba, a Chinese shopping website. Facebook – Another big data security
Almost 1.1 billion counts of user data breach happened in April 2019 when
were stolen from the website over eight two datasets from Facebook apps were
months. This was done by a developer revealed to the public internet. Data of

18| July 2021|www.insightscare.com


Angie Conley is the Founder and CEO of Abilitech Medical, which brings innova ve solu ons to
market that allow people living with upper-limb neuromuscular condi ons to func on
independently.
The company’s first product, the Abilitech™ Assist, is a powered ortho c device providing func onal
assistance and support to the elbow and shoulder to improve the lives of people in the U.S. affected
by neuromuscular weakness.

20| July 2021|www.insightscare.com


The Right Care

The
Importance of INDEPENDENCE AMONG
DISABLED PEOPLE, Particularly During a
GLOBAL PANDEMIC - By Angie Conley, Founder and CEO, Abilitech™ Medical

T he COVID-19 pandemic has affected millions of


people, disrupting daily lives and challenging
physical and mental wellbeing. This was especially
true for the disabled population – people who live with
unique complications of everyday tasks and compromised
immune systems, and who are both physically challenged
and often socially isolated.

Navigating logistics to get to a healthcare appointment is


challenging for our users, and the limited access to
healthcare has been exacerbated during the pandemic. A
one-hour appointment thirty minutes away can take up to
eight hours and multiple helpers, similar to rural healthcare
access.

Helpers or personal care attendants (PCAs) were in short


supply pre-pandemic. Typically, five PCAs are needed for Dystrophy, Multiple Sclerosis, spinal cord injury, and
every one that is available. It is common to have multiple stroke.
people help one disabled person each week and, if they are
lucky, a mix of family members can piece together the help The Abilitech Assist device enables many everyday
needed throughout the day. activities such as eating, drinking, and opening doors. The
device is designed to help our patients with washing their
The costs of care are not often covered by insurance and hands and using a face mask, both important ways to
can lead to significant out-of-pocket expenses. Given the prevent the spread of COVID, flu, and other illnesses. It
number of people who filter through homes to support care also provides increased access to technology like cell
needs, there is an increased exposure to COVID, leading phones and computers, which are particularly impactful
many disabled people to cut back on help. Much of the because they provide an opportunity for communication.
burden of care has shifted to families, resulting in increased
social isolation. Even public transportation became Addressing the Heightened Logistical Challenges of
dangerous during the rapid spread of COVID. Patient Isolation During the Pandemic

Abilitech™ Assist Benefits Over the past few years, the team at Abilitech Medical has
conducted extensive research and worked one-on-one with
The Abilitech Assist is a powered orthotic device that disabled people and their care teams. This has given us
provides functional assistance with activities of daily living important insights into the social challenges created by
(ADLs) for many people who live with arm weakness isolation. We have woven these findings into the
caused by long-term conditions such as Muscular

21| July 2021|www.insightscare.com


development of our products and focused on our mission to These mental and physical impacts spiked during COVID.
restore independence using assistive technology. Our Disabled people, who already struggle with the mental
technology literally opens doors to newfound stress of living with their longer-term conditions, were
independence. particularly susceptible to increased mental and physical
challenges caused by further isolation and disconnection
Telehealth from social engagements and care.

One of the benefits that COVID brought was the increased Today, as social distancing guidelines lessen, the Assist can
use of telehealth. It makes sense for so many applications enable a person to hug a loved one – in person. Before the
and we believe it will reduce costs of care and increase Assist was available, hugging, handwashing, and fist-
access to healthcare. Telehealth has been lifesaving for bumping were not possible for many disabled people.
many people during the pandemic, and now those with
limited use of their arms can also have access to virtual While adequate research on the specific impact of COVID-
care, which helps close the healthcare equity gap for the 19 on the disability community is not yet available, several
disabled population. studies are underway or in the planning phase. At Abilitech
Medical, we look forward to continuing to study the impact
Abilitech Medical was quick to pivot at the early onset of our products have on the health and wellness of the disabled
COVID and developed a telehealth assessment program to population. Currently, we have a clinical study underway
meet the needs of our clients. Our assessments helped to with Muscular Dystrophy patients at the University of
determine if the person would be a good candidate for the Minnesota and Gillette Children’s Specialty Healthcare in
Assist, answer questions, gather information, and connect St. Paul, Minn.
with a patient’s care team.
We feel privileged to play a part in solving the enormous
Easing Disruptions in Social Connections and Care challenges brought on by COVID for those already
challenged by disabilities. We have witnessed a true
Research on the psychological impact of mass trauma (e.g., resilience in so many whom, in the face of adversity,
natural disasters, illness outbreaks) suggests that the demonstrate determination and hope for a better future that
pandemic might particularly harm the mental health of includes new technology to restore independence, which
marginalized populations who have less access to will have mental, physical, and social benefits.
socioeconomic resources and supportive social networks.
COVID gave many of us insight into what it feels like when
Social isolation and loneliness have also been associated a typical day is disrupted by severe limitations…just what
with increases in heart disease, dementia, and other health the disabled population lives with even without the
problems, according to the Na onal Academies of Science, presence of a pandemic. COVID opened our minds and our
Engineering, and Medicine. hearts even further to keep innovating solutions

22| July 2021|www.insightscare.com


SUBSCRIBE
TODAY
Never Miss An Issue
Stay in touch.
Subscribe to Insightscare Get Insightssuccess
Magazine in print, & digital on www.insightscare.com

www.insightscare.com

Check should be drawn in favor of :


INSIGHTS SUCCESS MEDIA TECH LLC
Spearheading the Cybersecurity Revolution

W e live in a world that is driven by data. cybersecurity niche.


Leveraging this data for deriving beneficial ISA Cybersecurity is proud to be Canada's leading
outcomes is an empowering approach – and cybersecurity-focused company, with nearly three decades
equally vulnerable when in the wrong hands. of experience delivering cybersecurity services. We bring in
real-world implementations of technology that are essential
The discipline of cybersecurity caters to the latter part. Data for customer success and that maximize the return on
and privacy protection is prioritized when cybersecurity cybersecurity investment. We offer the perfect combination
solutions are implemented. of large-firm expertise and small-firm flexibility for our
services. Our corporate vision is straightforward: to help
Companies operating in the cybersecurity sector are create a world in which everyone is safe from cyber threats.
ceaselessly striving to deliver innovative and
comprehensive solutions with the motive of aiding Tell us more about your products and services which
organizations to be less concerned about the security of make your company stand out from the competition?
their data. ISA Cybersecurity is one prominent name We have a comprehensive cybersecurity practice embracing
among leading cybersecurity companies catering to the advisory and assessment services; architecture design and
healthcare sector. implementation services; digital forensics/incident response
services; and an impressive range of hosted and managed
ISA Cybersecurity has been recognized by IDC as a ‘Major services. But, I think a key differentiator is that we truly
Player’ in the Canadian security space. In a recent customer strive to make it easy to do business with us.
satisfaction survey conducted by IDC, the company was
ranked #1 for ‘Highly Responsive Staff’, and #2 overall We understand that every customer has their own threat
among security service providers in the Canadian market. landscape, their own unique circumstances, their own
The company is also proud to have preferred partner status budgetary constraints, and so on. So, we work with our
with over 30 of the leading cybersecurity vendors in the customers to understand and define their requirements, then
world. partner with them to deliver cybersecurity services on a
project basis, short-term, long-term – whatever is the best
In the following interview, Kevin Dawson, the President fit for them.
& CEO of ISA Cybersecurity shares valuable insights
about the cybersecurity industry and how ISA is planning to What is your opinion on the impact of the current
lead the game in 2021. pandemic on the global cybersecurity space, and what
challenges did you face during the initial phase of the
Here are the interview highlights of ISA cybersecurity: pandemic?
The COVID-19 pandemic definitely raised the global
Please brief our audience about ISA Cybersecurity, its profile of cybersecurity. Threat actors saw opportunities to
mission, and the key aspects of its stronghold within the exploit security gaps created by the rush to support

24 | July 2021 | www.insightcare.com


10 Best Cyber Security Companies in Healthcare For 2021

distributed remote workforces. Phishing scams and


ransomware attacks reached all-time highs as criminals
sought to capitalize on the fear and uncertainty that many of
us were feeling.

The number of reported breaches over the last year and a


half has been staggering, and no one was immune – SMBs
were frequent targets, but high-profile and global
companies suffered disruption and data loss as well. And, as
we’ve seen, healthcare has been one of the most frequently
attacked sectors, with dozens of breaches reported just in
Canada and the United States alone.

From our perspective, ISA Cybersecurity was very well-


positioned to withstand the sudden lockdown. As a
technology company and specialists in cybersecurity, we
already had a mature and well-tested distributed workforce
structure in place – our operations were fully remote within
hours of the first stay-at-home orders, and service levels to
our customers were maintained without incident.

With continuous development in technologies such as AI


and big data, what is your prediction about the future of
the cybersecurity space pertaining to the healthcare
services niche?
Healthcare is one of the most frequently targeted industries
for hackers. Hospitals provide an essential service,
Kevin Dawson therefore, in the minds of the criminals, they are more
willing to pay ransoms. Time and budget pressures often
President & CEO
make it challenging for healthcare facilities to stay up to
date with patching and staff training, creating potential
exposures. And complex IT networks and hard-to-manage


IoT device networks are increasingly commonplace. Given
this risk landscape, sophisticated threat intelligence and
advanced threat detection – powered by the latest in AI and

ISA Cybersecurity
machine learning – will become even more critical tools for
the healthcare sector.

has been recognized Threat actors are becoming increasingly sophisticated and
persistent in their attacks, so healthcare needs to be more

by IDC as a ‘Major Player’


proactive in defending against both known and unknown
threats and be prepared to recognize and block unauthorized
activity patterns should they occur. Emerging cybersecurity

in the Canadian technologies can help, since more traditional defenses


cannot keep up.

security space. As an established leader, what would be your advice to
the budding entrepreneurs and enthusiasts aspiring to
venture into the cybersecurity industry?

25 | July 2021 | www.insightcare.com


It is no secret that there’s a shortage of cybersecurity talent We are also very excited about the launch of a new
out there today. I encourage anyone interested in pursuing a cybersecurity service practice in fall of 2021. While I’m not
career in this field to get involved. ISA Cybersecurity has at liberty to discuss the details just yet, I encourage readers
forged strong ties with several Canadian post-secondary to bookmark our website at www.isacybersecurity.com and
educational institutions over the years, providing financial subscribe to our CyberCast newsletter for the latest
support and mentorship for tomorrow’s cybersecurity developments as they are announced.
specialists.
About Kevin Dawson
We are also passionate about encouraging more women to Kevin has nearly 30 years’ experience in the IT industry
pursue careers in cybersecurity. I believe there is always and is a recognized expert in the cybersecurity field. In
room for new ideas and new ways of thinking – we need addition to leading ISA Cybersecurity, Kevin is actively
strength in numbers and diversity to win the battle against involved in the academic community, advocating for
cyber threats. cybersecurity education at the post-secondary level in
Canada.
How do you envision scaling your company’s operations
and offerings in 2021? He serves as an advisor to two Canadian universities,
Our cloud solutions are already highly available and almost providing mentorship around cybersecurity and program
limitlessly scalable. We hired several additional staff development. Kevin is an active member of several
members in 2020, and the headcount growth this year has advisory boards for industry-leading cybersecurity vendors,
been strong as well. As our client base has expanded, we a frequent speaker and facilitator for cybersecurity-focused
are making sure that we are fully staffed to continue to events, and a regular contributor of security articles and
provide top-flight cybersecurity services and support. thought leadership on LinkedIn.

26 | July 2021 | www.insightcare.com


#Self_Secure

Password Protection:
things you

5 shouldn’t
do with your
Passwords I n the internet age, almost all of our
essential tasks are conducted
online – whether work-related or
something personal. We create
accounts on the internet for different
sites and are asked to create strong
passwords everywhere. But what is the
purpose of a password, let alone a
strong one?

Passwords or passphrases help act as


the first line of defense against any
kind of unauthorized user trying to
infiltrate into your personal and
confidential information. With the
growing internet world, phishing or
hacking attacks have become more
common, and having a strong
password helps one stay safe from any
such attacks that try to get access to
your private information.

28 | July 2021 | www.insightcare.com


29 | July 2021 | www.insightcare.com
Following are the top five things you Don’t share your password with your passwords too often. As stated by
shouldn’t do with your passwords to people – People often end up telling or a study conducted by the Federal Trade
stay safe: sharing their password with people Commission, people who change their
they trust, which can sometimes prove password regularly make it 48% easier
Don’t write your password down to be a serious blunder they make with for them to get exposed to hacking.
anywhere – This is one of the worst their password. Changing passwords too often will
mistakes one can make with handling result in you creating uncomplicated
their password. There is no use in One can never know if another person passwords that are easy to guess.
creating a strong password if you’re has malicious intentions in their mind.
writing it down somewhere, especially Keeping your password secretive is a Practicing these don’ts of creating and
if you’ve written down your password very important step in ensuring good managing passwords will help you
in a place easily accessible to people. password protection. When you alone ensure great security against phishing
Writing your password down in your know your password, you don’t have to or hacking attacks. Another tip to help
diary, notebook, or someplace visible worry about other people leaking that you ensure good security on the
to other people can cost you your information anywhere. internet is to create a strong recovery
privacy and security. question if you forget your password
Don’t use personal information and have to recover it by answering a
A better alternative to writing your while setting your password – Using personal question that only you know
password down somewhere is getting a your personal information while setting an answer to.
password manager, which stores and your password makes it easy for people
locks all your passwords under a single to guess your passphrase. People often Having a weak recovery question will
Master Password. Popular password use information like their birth date, render the strongest of passwords
managers like KeePass and Kaspersky the name of their loved ones, or useless as a potential hacker or relative
Password manager help you create information similar to this kind to can easily guess it and hack into your
dozens of unique and strong passwords create their password. account. Keeping a check on all these
using only one Master Password that factors will help you with the highest
you need to remember ensuring better Using information like that makes it possible protection of your sensitive
protection against potential hackers. simple for a potential hacker to hack information.
into your account and get access to
Don’t use the same password over your private or personal information. - Trishika R.
multiple websites – It’s hard to Try to use unique symbols and random
remember all the unique passwords alphabets and numbers to make your
one creates to log in to multiple password super secure from being
websites. Hence, people end up doing guessed.
the easy thing: setting the same
password for multiple websites. This is Don’t keep the same password for
again a grave error that one makes with longer – Changing your passwords
managing their password. once in a while to a unique and strong
one ensures utmost security against
In case a hacker cracks down on even having your accounts hacked. This
your strong password on a particular might seem like a mundane task to do,
website, he now has access to all the but practicing this method is one of the
important websites that you logged proven ways to keep safe from
into, revealing all your confidential potential cyberpunks.
information due to the websites sharing
the same password set by you. It is Revise and look through the passwords
crucial to have a unique and strong you haven’t changed in years and
password for every website that you update them to a unique passphrase.
visit to ensure maximum security. That being mentioned, don’t change

30 | July 2021 | www.insightcare.com


SafeBreach
Maximize Security Control Effectiveness. Reduce the Attack Surface.

W hile technology has simplified our lives, it has


also created new problems with threats to our
data, privacy, and business operations.

During the initial phase of COVID-19 pandemic, the world


controls continuously – changes the mindset of defenders to
offensive and proactive, and the end result is that we help to
build a safer world.

Tell us more about your products and services which


saw the best and worst of technology. The unprecedented make your company stand out from the competition?
speed of developing effective COVID vaccines was enabled SafeBreach is the world’s most widely used continuous
by breakthroughs in biotech, but hackers exploited the tech security validation platform in enterprise companies. The
infrastructure to attack the global vaccine supply chain and company's patented platform empowers CISOs and their
more. teams to validate security controls, maximize effectiveness
of those controls, and drive down risk.
The pandemic casts a sharp light on the need for robust
cybersecurity in healthcare. SafeBreach is the top SafeBreach provides a ‘hacker’s view’ of an enterprise’s
cybersecurity solution provider that delivers a 'hacker's security posture by continuously validating security
view' of an enterprise's security posture for total and controls. It presents and dynamically updates findings in
continuous security assessment, validation, and to help customized dashboards to enable stakeholders to focus with
prioritize and remediate based on where the biggest risk is precision on the biggest risks to the organization.
to the business.
SafeBreach automatically and safely executes thousands of
SafeBreach, under the leadership of its co-founders Guy attack methods to validate the network, endpoint, cloud,
Bejerano, CEO, and Itzik Kotler, CTO, has successfully container, and email security controls against its Hacker’s
stepped up with a groundbreaking platform that empowers PlaybookTM, the world’s largest collection of attack data
businesses to fully utilize their security technologies by broken down by methods, tactics, and threat actors. Data
minimizing the technological risks. Major healthcare from SafeBreach validations can improve SOC team
providers are using SafeBreach’s patented breach-and- responses and empower management teams to better
attack simulation platform to reduce their attack surface and manage risk and invest resources.
business risk.
SafeBreach is recognized by Frost & Sullivan as the Leader
The following interview covers the genesis of SafeBreach in the Breach and Attack Simulation Market in 2021. See
and how the company has progressively advanced its the Frost Radar/Quadrant published in 2021.
capacity to help customers secure their business operations.

Please brief our audience about your company, its


mission, and the key aspects of its stronghold in the
cybersecurity niche.
SafeBreach’s mission is to change the way that industry
deals with security and risk and enable companies to use the
security technologies they have invested in, to their fullest
capability. By validating those technologies against attacks,
from the known to the latest emerging threats, businesses
continuously drive risk down. The core function that
SafeBreach delivers is security control validation.

When companies know which security controls actually


work in their environment, they can invest for real impact,
and protect more. They can quantify risks to the business
and drive a security strategy aligned with the company's
business growth. What SafeBreach does – validate security

32| July 2021|www.insightscare.com


ABOUT THE LEADERS

Guy Bejerano, CEO Itzik Kotler, CTO

Guy Bejerano is co-founder and CEO of Itzik Kotler is CTO and Co-Founder of
SafeBreach, a pioneer in the emerging SafeBreach. Itzik has more than a decade of
category of continuous security validation. experience researching and working in the
Before SafeBreach, Guy was CSO of computer security space. He is a recognized
LivePerson, leading the security of one of the industry speaker, having spoken at DEFCON,
world's largest cloud platforms and providing Black Hat USA, Hack In The Box, RSA Europe,
security for more than 1 billion web visits CCC, and H2HC. Before founding SafeBreach,
across the internet each month. Guy has Itzik served as CTO at Security Art, an
more than 24 years of deep domain expertise information security consulting firm, and
in operational, application, and network before that he was SOC Team Leader at
security, specializing in building security Radware (NASDQ: RDWR).
programs for global companies and cloud
services, including the Information Security
branch and red-team operations of the Israeli
Air Force.

“ SafeBreach's mission is to change the way the


industry deals with security and risk and enable
companies to use the security technologies they have “
invested to the fullest.

33| July 2021|www.insightscare.com


10 Best Cyber Security Companies in Healthcare For 2021

Following are the most impactful capabilities that enable CISOs and SafeBreach Platform
differentiators of the SafeBreach security teams to be more strategic Customer Success Account Managers
platform in addressing customer every day, while pushing a transition to as a single point of contact
needs. more offensive security, versus SafeBreach Customer Success
Fulfills Operational Needs defensive and reactive. Managers team consists of Customer
Ÿ SafeBreach generates insights Ÿ Optimizing risk and value in a Success Account Managers (CSAM)
automatically to ensure business context. who focus on business outcome and
remediation, at scale, of the highest Ÿ Help the CISO to quantify risk. relationship management of customers
priority gaps. The platform Ÿ Support priority and investment and Technical Customer Success
correlates data-driven results from decisions in a business context. Managers (TCSM) who focus on
testing security controls against Ÿ Identify risk to revenue with the delivering technical deliverables for
numerous attack scenarios to security posture of revenue- each use case along with technical
automatically identify the highest generating business units. support. Each customer is assigned a
priority security gaps, so that teams Ÿ Communicate to the board with CSAM and TCSM with CSAM being a
can focus on the most impactful clear KPIs to show security single point of interface.
remediation efforts. program effectiveness in
systematically reducing risk. SafeBreach Customer Success Account
Ÿ Integration with SOAR platforms Ÿ Determine and justify spend on Managers (CSAM) along with
for automated remediation of security tools, based on outcome- Technical Customer Success Manager
security gaps. Tight integration driven metrics. (TCSM) assigned for each customer
with Cortex XSOAR now fully perform key functions for each
automates fast-changing IOCs such SafeBreach Labs - and 24-hour SLA customer such as use case workshops,
as hashes, IPs, and domains that on new US CERT alerts deployment of the SafeBreach platform
have been proven to breach Our research teams are dedicated to in the Customer Environment,
enterprise companies. Ensures maintaining the SafeBreach platform at Technical Support, and Proactive
security controls are updated maximum potential. They achieve this Customer Success Management with
quickly and effectively while by arming the platform with the business review and ROI assessments
orchestrating the behavioral industry leading SafeBreach Hacker’s with a single point of contact for all
indicators so your security team is Playbook of attack methods, which our post-sales needs of the customers.
aligned to defend the business. researchers work constantly to expand
and strengthen. Deployment/Professional Services
Ÿ Prioritization of vulnerability After a formal post-sale kick-off
patching based on the likelihood of SafeBreach Labs externally monitors meeting, assigned Customer Success
exploitability, impact on critical the hacker underground, sources Account Managers and Technical
assets, and external access. intelligence feeds, and collaborates Customer Success Managers for each
with external security research teams. customer account follow a structured
Ÿ Scale and maturity. We are dedicated to providing the process and engagement model to
latest attack methods to our customers work with the customer’s security
Progress from Operational to and we uphold a 24-hour SLA on teams, SOC, and CISO office bearers
Strategic adding attacks identified from US Cert to explore and review all use cases of
Ÿ 24-hour SLA for emerging threats Alerts. the customers, scope the deployment of
to deliver organizational security the SafeBreach Platform, provide
posture for imminent threats. SafeBreach Labs researchers also technical consulting, project
Ÿ Prioritization of security gaps in the continuously identify new attack management to roll out in multiple
context of the threats they methods before hackers discover them phases, provide training for all
represent. as a part of our research and customer team members and help
Ÿ Security posture assessment based development effort to simulate the customers operationalize the
on the MITRE ATT&CK hacker. This research is shared with the SafeBreach Platform.
framework to allow for a uniform security community at leading
and contextualized security conferences such as Black Hat, RSA, 24/7 Technical Support
program management around and DEFCON. SafeBreach Labs also The Customer Success Team
MITRE ATT&CK including the contributes techniques to the MITRE (Technical Customer Success
new MITRE v9 techniques. ATT&CK framework. Managers) is also responsible for
technical support of customers 24x7
Strategic Customer Success Team Designed to helping customers get their support
SafeBreach provides unique Help Customers Operationalize the issues addressed in a timely and

34| July 2021|www.insightscare.com


Rewards
and
efficient manner. Instead of a tiered model with potential Recognitions
time delays, customers have a single point of contact
through their assigned Customer Success Manager.

Complementing the assigned Technical Customer Success SafeBreach and its team have been able to win recognition
Managers, customers also are assigned a personalized and awards, including from industry-shaping entities like
support engineer who has full knowledge of the customer
Forbes, Frost & Sullivan, Gartner, CNBC, Dark Reading,
environment. This significantly speeds up resolution of
issues and dispenses with the friction and time delay of and CRN, among others.
triaging support calls. Ÿ Frost Radar 2021: Global Leader in Breach and
Continuous Product Engagement Attack Simulation Market
Our Customer Success Team acts as a bridge between Ÿ Frost & Sullivan: 2021 Company of the Year in
customers and the SafeBreach product management team to Breach and Attack Simulation
conduct various product beta programs helping early Ÿ Globee Global Excellence -- Cyber Security - for BAS
vetting and adoption of new features. Each CS team 2021
member relays key product feedback from their customers
Ÿ Forbes, 2020 - The 20 Best Cybersecurity Startups
to the product team as they come, documenting each of the
requests and tracking them until the feedback is addressed To Watch In 2020.
or new features are shipped to respective customers. The Ÿ Calcalist - 2020 The 50 Most Promising
CS Team also facilitates periodic roadmap sessions, and Cybersecurity Startups in Israel
walks customers through new features. Ÿ Hot 150 Cyber Security Companies 2020
Ÿ TAG Cyber - Distinguished Vendor 2020 (50 chosen
What is your opinion on the impact of the current
from 1700)
pandemic on the global cybersecurity space, and what
challenges did you face during the initial phase of the Ÿ CRN - 2019 Emerging Vendors to Know in 2019
pandemic? Ÿ CRN - Top Cybersecurity Startups
Companies needed to do more with less to protect against Ÿ CNBC Upstart 100 – 2018
the existing and new types of threats. Attackers were Ÿ Gartner Cool Vendor 2017
exploiting the pandemic targeting the healthcare industry Ÿ Dark Readings' Best of Blackhat Awards 2016
and the COVID-19 vaccine supply chain.
Finalist
SafeBreach experienced a significant widening in demand Ÿ RSA Sandbox Finalist 2016
for its platform from financial services to healthcare, Ÿ Network World Hot Security Companies to Watch in
manufacturing, technology, utilities, transportation, 2016
government, retail, and other industries. Ÿ SINET 2016 Innovator
Ÿ CRN Tech Innovators 2016
Using SafeBreach, security professionals can validate and
maximize the effectiveness of the controls they already
have. With SafeBreach they prioritize which security gaps
need to be fixed first. The sequence of remediation is based
on the greatest impact to the business. Security As an established leader, what would be your advice to
professionals using SafeBreach can guide their the budding entrepreneurs and enthusiasts aspiring to
organizations on where to prioritize new investments to venture into the cybersecurity industry?
lower cyber risk overall. Dream big, don't be afraid to take on a big problem, of
which there are many in the cybersecurity industry, and
With continuous development in technologies such as AI commit yourself to solving it.
and big data, what is your prediction about the future of
the cybersecurity space pertaining to healthcare How do you envision scaling your company's operations
services? and offerings in 2021?
AI and big data are valuable technologies that are becoming In 2021, we have accelerated product development, and
pervasive, and they will change healthcare as well as other expanded channel partnerships in North American and
domain problems. Having said that, they are not immune to around the world. We will continue to expand our presence
security attacks whether it's on the infrastructure or the in EMEA and APAC markets this year and next.
actual implementation and that's something to keep in mind.

35| July 2021|www.insightscare.com

You might also like