CISO and board-facing content on auditable, policy-backed execution decisions. Pre-built evidence for NIST, SOC 2, HIPAA, FISMA, and customer or vendor reviews.

What Executive Order 14028 Gets Right on Cybersecurity

Where perfection is impossible, Executive Order 14028 offers progress

Though the internet’s rise to omnipresence brought about innovation and prosperity, it also became a vehicle for malicious attacks on our nation’s networks, infrastructures, and our most vulnerable populations. In today’s cyber threat landscape, no target is too small — or too big.

The Colonial Pipeline ransomware attack in 2021 made apparent the potential impact of just one cyberattack. President Biden signed Executive Order (EO) 14028 to bolster national cybersecurity standards in response to this incident — and the steep rise in cyberattacks preceding it.

Let’s face it: pinning down the perfect set of defensive standards is impossible. Malicious actors will constantly evolve and change tactics to evade our cyberdefenses. But EO 14028 gets a lot of things right when it comes to cybersecurity on a federal level. Let’s look at four ways it does this well.

1. EO 14028 Makes It Harder for Malicious Activity to Reach Federal Networks

Rather than leave federal systems open to malicious attacks, agencies are now required to operate on secure cloud services with zero-trust architecture. These requirements allow agencies to function with all the convenience and efficiency allotted by cloud services but with minimized human error that allows threat actors to breach them.

Users can only gain access to federal information through multifactor authentication (MFA), which adds several layers of protection to every set of credentials. Cybercriminals would not only need to infiltrate the correct devices, but infiltrate them at just the right time to fake their way into a federal system.

2. Higher Baseline Standards for Cybersecurity Software and Incident Responses Elevates Every Line of Defense

It’s become clear that, while every federal network is interconnected with dependencies (think communities, industries, and critical infrastructure and processes), its safeguards have not necessarily kept up with modern threats. This level of connectivity called for a serious re-examination of foundational cybersecurity standards for all federal agencies.

EO 14028 institutes higher security standards for the software every federal agency uses. Multiple agencies — including the National Institute of Standards and Technology (NIST) — now oversee initiatives to make computing environments safer. In accordance with EO 14028, NIST:

Incident response standards also received a much-needed upgrade. Federal departments and agencies now have standard playbooks for federal system breaches — which the Cybersecurity and Infrastructure Security Agency (CISA) has made publicly available for any organization to learn from. The playbooks cover everything, including:

  • What to do during a breach.

  • How to contain a threat.

  • The follow-up steps required post-incident.

3. Consistently Gathering Timely Post-Attack Information Is Key

Information around a cyberattack can leave a trail of digital crumbs leading to its source and (if we’re lucky) solutions. So the more we can gather as close to that source as possible, the better. That’s where the Federal Acquisition Regulation (FAR) and its closely linked supplement, the Defense Federal Acquisition Regulations Supplement (DFARS), come into play. Executive agencies like the DoD and NASA use FAR and DFARS to acquire supplies and services, including software.

EO 14028 calls for updates to FAR’s and DFARS’s language, requiring vendors to report incidents and share detailed and timely information about cyberattacks. Information on who was attacked, when, and how can be shared with fellow industry professionals and experts to build a solid, united front against threat actors.

4. Improved Communication and Connectivity Leads to Collaboration — and Better Chances of Detecting Malicious Activity

Adding to that united front, removing barriers to information sharing allows for more effective communication from many perspectives. So it’s to everyone’s advantage that EO 14028 encourages not only collaboration between federal agencies, but also federal agencies and organizations in the private sector. The Cybersecurity Safety Review Board, comprised of leaders from both worlds, was established under the executive order.

The board convenes after significant cyber incidents to share information, analyze what happened, and recommend ways to prevent or mitigate future attacks. In light of the attack on the Colonial Pipeline, their first meeting focused on remediating its cascade of industrial damage and addressing the vulnerabilities threat actors exploited — particularly in the log4j library.

Adaptability Wins the Race

While EO 14028 isn’t an instant fix, it lays solid groundwork for a higher standard of cybersecurity fundamentals at the federal level. Its primary directives leave room for — and even encourage — growth and flexibility in facing down cyber threats. Consistently improving proactive measures, keeping detailed records, and pushing for collaboration will help us, as a country, build upward from there.

5 HIPAA Cybersecurity Requirements for CISOs

HIPAA Compliance Pays Off

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established privacy standards in the U.S. to protect sensitive data, from your social security number to the exact date and time of your tonsillectomy. Today, lawmakers have developed new HIPAA cybersecurity requirements to protect patients from the ongoing threat of cyberattacks and curb the steep rise in information theft — and non-compliance comes with a hefty price tag.

What CISOs Need to Know about HIPAA Cybersecurity Requirements

A record-setting 1,862 data breaches were reported worldwide last year, up 68% from the previous year. So it’s no wonder companies are being held accountable for the data they collect and store. HIPAA compliance requires hospitals and healthcare organizations to adhere to a handful of different rules to protect sensitive patient information.

1. Privacy

Patients have the right to keep their protected health information (PHI) private. PHI can encompass a variety of information on sensitive topics like diagnoses, appointments, and procedures.

2. Security

Organizations must secure PHI from unauthorized use and distribution. Think insurance information, names, addresses, and the like.

3. Enforcement

Entities protecting PHI must enforce security protocols at all times and initiate investigations in the event of a data breach. The best way to demonstrate this is to create and follow data protection protocols — and keep impeccable records in the event of an attack.

4. Breach Notification

Entities must inform appropriate local and national authorities should a breach occur. Data breach reports must note who contacted whom and what information was shared.

5. Omnibus

The Omnibus Rule updated HIPAA with cybersecurity in mind (thanks to the HITECH Act). The rule clearly states that organizations are liable for their compliance with HIPAA (more below).

How to Meet HIPAA Compliance Requirements

With the addition of the HITECH Act to HIPAA, healthcare organizations need to be much more vigilant about maintaining their HIPAA compliance. There are several ways healthcare cybersecurity professionals can stay on top of meeting HIPAA requirements.

Compile a Comprehensive Risk Assessment

It pays to be prepared. Get started by combing through your company’s data collection, processing, and storage methods with your IT team to identify risk factors and exploitable gaps. Use the Office of Civil Rights (OCR) Audit Protocol designed for HIPAA compliance as your road map.

Address Risk Factors, and Amend Compliance Gaps

Having completed an audit, prioritize meeting HIPAA’s compliance criteria. Keep updated records on the measures you’re taking and the lengths you’re going to for improvement. In the event of a future cybersecurity breach, you may need to prove in writing that you made every effort possible to protect your data.

Once Everything is in Order, Develop a Process to Keep it That Way

Automated reporting will alert you to any deviations in compliance. Schedule regular training sessions with employees to keep everyone in the know about the latest requirements. Make it a habit to look for ways to improve your defenses, whether that means overhauling your process or just trying out new software. Stagnation is your enemy.

HIPAA Violations Levy Heavy Penalties

We know protecting your clients’ information is motivation enough to take cybersecurity seriously, but take a moment to consider how a data breach will affect your organization’s bottom line, especially if you’re out of compliance. Violations are broken down into tiers and, depending on how many records are at risk, the costs are staggering.

Below is a summary of what it could cost a business per record affected if found non-compliant.

Tier 1 Violation — Lack of Knowledge

An entity is reasonably HIPAA compliant. However, it was unaware of the violation and could not have easily avoided it.

Penalty: $100 – $50,000 per record

Tier 2 Violation — Reasonable Cause

An entity is not quite considered neglectful of HIPAA compliance.

Penalty: $1,000 – $50,000 per record

 

Tier 3 — Willful Neglect

An entity is found neglectful of HIPAA compliance; however, it corrects the violations within a stated time period.

Penalty: $10,000 – $50,000 per record.

 

Tier 4 — Willful Neglect (Not Corrected)

An entity is neglectful of HIPAA compliance and does not correct its violations.

Penalty: $50,000 per record, up to an annual maximum of $1.5 million.

Get to Work

Follow cutting-edge cybersecurity best practices to prevent data breaches and prepare for the worst-case scenarios. Not only does protecting your data pay off in reputation and preserve trust from your customers — it saves a bundle in legal expenses. If all of that has you sweating, make sure your organization is prepared with cyberattack simulations and cyber wargames to gain some peace of mind.

Want more information on healthcare cybersecurity? Check out these other helpful resources:

5 Banking Cybersecurity Mistakes We See Way Too Often

Even The Smallest Mistake Can Result in a Data Breach

Back in the day, a heavy-duty vault with a bullet-proof locking mechanism assembled by a world-renowned locksmith was enough to protect banks from Jesse James wannabes. Maybe a security guard stationed at the door, a little red button under the tellers’ counter triggering a silent alarm, cameras everywhere. But it’s 2022, and banks are facing escalating cyber threats that can sabotage business as usual in a matter of seconds.

At this point, nearly 80% of banking customers would prefer to manage their finances digitally from the comfort of their own couch than trudge to the nearest bank. While fancy vaults, security guards, and red-button alarms still have their place, cutting-edge cybersecurity solutions and groundbreaking technologies are stealing the show.

But despite massive investments in cybersecurity products and solutions, banks are still making basic mistakes — and losing millions of dollars to cybercriminals (and even more in reputation) on the reg.

5 Banking Cybersecurity Mistakes Banks Should Fix Right Now

Below are just a few of the cybersecurity mistakes we see banks making way too often.

1. Thinking Cybersecurity Is Just an IT Department Concern

You might think the first mistake on this list would live somewhere in the high-tech echelons, complete with jargon no mere mortal could wrap their head around. But no. First up is failing to create a culture of security that trains every employee in cybersecurity and zero-trust best practices.

Banks are 300 times more likely to face a cyberattack than any other type of institution. With the widespread nature and scale of today’s cyber threats, everyone in your bank needs to become a digital security guard. After all, anyone — from the CEO to the newest intern — could be the point of entry via a phishing email or malicious link.

How to fix it: Educate employees on cybersecurity best practices. Even small security measures — such as discouraging the reuse of passwords or sending sensitive information over vulnerable channels like email — go a long way to prevent a digital bank heist.

2. Forgetting That Customers Are Part of Your Cybersecurity Strategy

Similarly, consider customers a cybersecurity weak point. Just like employees, customers should receive some basic training around cybersecurity. Alongside mandatory multi-step authentication, facial recognition, encryption, and strong passwords, customers must be taught to play their part to keep their own data safe (and avoid clicking on that malicious link from their “bank manager”).

And if you haven’t upgraded your IT systems with basic security measures, your organization is at major risk of a cyberattack. Kristen Bolig, CEO of SecurityNerd, points out that many banks don’t offer customers the most basic security measures such as multi-step authentication on mobile apps. This is especially concerning since mobile apps are, as Bolig puts it, “somewhat easy points of entry for hackers.” She adds, “If a bank only requires the user to put in their password to log into the app, that’s not very difficult for hackers to figure out. Banks that have multi-step authentication and even allow for facial recognition are immediately more secure.”

How to fix it: Create customer-facing education around cybersecurity. You can do this through a newsletter, mobile app push notifications, or a digital security section in your FAQs. Encourage customers to scan their transactions regularly to check for suspicious activity, no matter how insignificant or harmless it may seem. And, if you haven’t already, enable security features such as multi-step authentication and regular password updates.

3. Using Subpar Encryption Methods

None of this education means anything if your employees and customers send information that’s not adequately encrypted.

Financial organizations regularly request sensitive information from customers (to verify identities, run credit checks, and grant loans, for example). Luckily, the Federal Financial Institutions Examination Council (FFIEC) creates, examines, and reports on standards and protocols. And the FTC’s Gramm-Leach-Bliley Act (GLBA) requires financial institutions to protect sensitive customer data and provide transparency around information sharing. To protect customers, regulations from the FFIEC and GLBA require financial institutions to encrypt:

  • Sensitive information (e.g. names, addresses, and Social Security numbers)

  • Transactional information (e.g. account numbers, loan balances, or purchase amounts)

  • Other personal information acquired to provide a financial service (e.g. credit scores or criminal records

Make sure you’re encrypting the information that needs to be encrypted: Bank-standard encryption is a 256-bit advanced encryption standard (AES). However, as Andrew Orr points out in an article for The Mac Observer, “You can use the strongest encryption algorithm in the world, but if you don’t use it correctly, it doesn’t matter if it’s 128[-bit] or 256[-bit].”

How to fix it: Conduct an audit around your encryption methods — but don’t stop there. Ensure your servers and machines are configured to process 256-bit AES to eliminate potential weak points.

4. Using Cybersecurity Protocols and Tools That Aren’t Built for Banks

While conducting a cybersecurity audit, whether you start with your encryption protocols or testing employees’ knowledge, use the FFIEC’s Cybersecurity Assessment Tool. To use it most effectively, make sure your practices align with basic cybersecurity requirements.

Perry Zheng, former software engineer and founder and CEO of real estate syndication platform Cash Flow Portal, says, “Most medium-sized banks fail to link their cybersecurity with cyber compliance.” If you’re following cybersecurity practices that don’t match your required compliance, “it can be difficult to respond to exams and audit requests.”

And if you do have to go through an audit, violations can be costly — especially if you don’t take corrective steps. You could incur fines from the NCUA, FRC, OCC, or FDIC. No matter which organization is coming after you, their fines can render your bank, well, bankrupt.

How to fix it: Leverage the information included in the FFIEC’s Cybersecurity Resource Guide for Financial Institutions to find both paid and free assessments and tools to evaluate your cybersecurity practices for compliance. Document your findings and make changes if you find weak points or violations. If a cyberattack does occur, you can use your records to show that you were following best practices for financial institutions — not just generic cybersecurity protocols.

5. Sacrificing Security for Cost

Cybersecurity is not a budget line item to second guess.

The sheer volume of cyberattacks on banks might drive you to hire third-party security providers. The pricing model for security packages often depends on the number of systems covered. To keep costs affordable, many vendors — and even banks — suggest covering only “critical” systems.

But for financial institutions processing thousands (or millions) of records containing sensitive data, every system is critical. Cybersecurity corners should not be cut, especially for organizations as highly targeted as financial institutions.

How to fix it: Whether you’re working with an in-house security team or a third-party vendor (or both), don’t let cybercriminals catch you exposed — make sure you’re covered everywhere. Has your cybersecurity spending actually decreased recently? Leaving a “non-critical” system unmonitored to cut costs could be just the open (vault) door a hacker is looking for.

Upgrade Your Bank’s Cybersecurity

Even the most sophisticated cybersecurity system needs a basic foundation to stand on. Educate customers and employees about the importance of cybersecurity and the consequences of cyberattacks. Anyone connected to a bank should be vigilant about preventing cyberattacks; people can be your greatest weakness or your greatest strength.

And then, make sure your products or solutions, partners, and processes follow the same cybersecurity standard as your organization. Every product or solution you use, vendor you partner with, and protocol you follow should comply with FFIEC standards. Whether you run a small local credit union or an international institution, you should always be on the lookout for cutting-edge tech and groundbreaking cybersecurity solutions that will reduce risk and mitigate damage.

Want to know more about guarding your bank against cybercrime? Check out some of our other resources:

WTF is Cryptojacking and Why Bank CISOs Should Care

Cryptocurrency Comes With a Whole New Headache for Banks

Cryptocurrency has risen from financial outlier to disruptor with trillions of dollars at stake. Speculation about its legitimacy and educated guesses on its longevity abound. At first, it sounded like a passing fad. But now, even banks are beginning to embrace it, despite its volatility. And it’s not just its volatile nature you should worry about these days. One of the biggest headaches — a crypto virus CISOs should keep a keen eye on — is cryptojacking.

What Is Cryptocurrency, Exactly?

You’ve probably already heard of the most famous cryptocurrencies: Bitcoin, Monero, Ethereum. However, the crypto market has grown exponentially since 2009, when it first hit the digital ether. There are now over 9,000 currencies to date. Banks are rushing to meet customer demand for digital shelving space to hold their crypto — but there’s still miles of legal tape to dispense before banks can plunge in.

Whatever gimmicky name has been slapped on it, all cryptocurrencies are virtual currencies secured by cryptography. In theory, this method of securing crypto makes these currencies impossible to counterfeit or double-spend. Think of it as a serial number system like the ones on dollar bills; only these markers have been etched into the currencies’ codes.

One glaring issue with cryptocurrencies — or huge benefit, depending on who you’re talking to — is that a central authority does not generally issue them. In other words, they aren’t managed by any official government, nor are they afforded the kind of tracking and other protections placed on federal currencies.

Instead, these currencies rely on blockchains, which are updated every time a transaction is made. These transactions are processed and validated by “miners,” who essentially verify “blocks” in the crypto ledger. Miners are often rewarded in cryptocurrency for their work.

What is Cryptojacking?

Cryptojacking is the unauthorized use of other people’s devices and resources to mine for cryptocurrency. Motivated to save money and make a profit, cybercriminals steal resources like electricity and high-powered computing hardware from unsuspecting victims by secretly hijacking their devices.

Imagine there’s a thief who steals an electric car each night when the owner is fast asleep — and then makes a healthy profit ridesharing before plugging the car back into its supercharger without the owner ever knowing.

In a similar manner, cryptojacking isn’t designed to damage the software or device in any way; just use its resources. And, because the only evidence that shows up in a cryptojacked device is a slight decrease in performance, the stealthy malware is difficult to detect.

How Does Cryptojacking Work?

Cryptojacking is far too easy to carry out in today’s cyber minefield — embedding a malicious link in an email or creating an online ad that loads on a victim’s browser will usually do the trick. All wannabe cryptojackers need to do is access a device — or in some cases, many devices — capable of performing the work. Then, the cryptojacker can use the device(s) to mine blocks for the currency’s blockchain and reap the rewards for themselves.

What Does This Mean for Bank CISOs?

Some banks have opted to accommodate cryptocurrency to remain relevant and competitive in this new financial cyberscape. However necessary, this accommodation comes with significant privacy risks.

Cybercriminals are known to hijack anything that helps reduce mining costs on their end — even enterprise-level cloud-based applications. If a bank uses a cloud-based service (which is difficult not to do these days), it’s susceptible to hijacking.

That bank’s customers would then be at risk for infection of malware. In one fell swoop, a hacker could access thousands of customers’ devices in a single day by infecting the bank’s login page with cryptojacking code.

What Can Bank CISOs Do to Guard Against Cryptojacking?

Watch for telltale signs of cryptojacking malware in your network and devices, preferably using an automated alert system where applicable, and plan ahead for dealing with cryptojackers.

  1. Know the warning signs. Watch for decreases in device performance, overheating, or increases in CPU and GPU usage.

  2. Leverage tools to help you keep an eye on things. Use automated alerts to catch any unwanted code pushed to internal and external websites — and stay updated on the latest cryptojacking trends.

  3. Take preventative measures.

Train and educate your staff on cybersecurity best practices, use anti-cryptomining extensions and ad blockers on your browsers, and disable JavaScript.

The digital threatscape’s reach is endless, forcing organizations to change and adapt constantly. New commodities like cryptocurrency, with roots in a decentralized economy, have quickly become a hacker’s cyberdream. Cybercriminals will exploit any weakness they find and use it for their own gain — and crypto is full of loopholes and opportunities. When it comes to cybercrime and digital self-defense, prevention and detection are critical to protecting your resources.

Want to know how you can guard against cybercrime? Check out some of our other resources:

Cyberattack Simulation Exercise for Banks

Make Sure You’re Prepared For Cyberattacks

Picture this: Your bank’s network slows to an uncharacteristic crawl, affecting both processing and productivity. Customers begin to lose their patience — and they aren’t too shy to let you know. Your IT team investigates and comes back with grim news: Your network is under attack.

What do you do?

If you can’t immediately answer this question, you’ve got a very big problem. Preparation is the key to winning any battle: Along with playing cyber wargames, running cyberattack simulations with your staff is critical to staying prepared.

Cyberattack Simulations For Banks

The following steps should be a part of every bank’s cybersecurity training and preparation:

1. Identify your strengths and weaknesses.

Though it’s intuitive — and necessary — to identify liabilities, it’s equally important to recognize the strengths of your security systems and your staff’s abilities. You may uncover unknown assets that can bolster the weaker areas — and develop strategies that play to those strengths.

2. Improve response time through training.

Train your whole team — not just IT personnel. The more knowledge each employee has about the telltale signs of a cyberattack, the more quickly they’ll be identified and contained. While practicing your responses, determine responsibilities; an incident response team works like a well-oiled machine when everyone knows their role.

3. Plan ahead for expenses and external assistance.

Who will you call if an attack exceeds your cybersecurity team’s skill set or bandwidth? How much do those services cost? Do your research ahead of time and keep the information readily available should you need it at a moment’s notice.

4. Identify internal risks and raise awareness.

Non-compliance with cybersecurity best practices puts your customers’ information at risk — and it could also cost you to mitigate the damage should an attacker successfully breach your customer data. Consider activities that make it easy for a malicious actor to get in, like using personal logins or unauthorized accessories on company devices. Make sure your employees all know what to do, as well as what not to do, and why.

5. Hope for the best; plan for the worst-case scenario.

Consider the varying degrees of attacks your bank might endure and the most effective response to each. Create an incident response and plan for the worst-case scenarios. Then, brainstorm how outcomes might be even worse than that.

6. Prepare your team with drills.

Test your knowledge with scenarios (more below), do your research, and work with your IT team to establish your incident response plans — and then drill! Practice these role-plays regularly — and continue to update information as the cybersecurity landscape evolves.

Cybercriminals will use all resources and assets at their disposal to break into your systems and networks. Get creative while evaluating your defenses and ask yourself: What other angles could a cybercriminal take to leverage vulnerabilities and gain unauthorized access to your bank’s systems and networks? Think like the enemy as you practice and prepare — and don’t stop until you find new ways to breach your defenses. You need to remain several steps ahead of your enemy to defend your business in today’s cyber minefield.

Knowing how you should respond to a cyberattack isn’t enough these days: It takes practice and research to establish an efficient and effective response. Take your security into your own hands and see how well you deal with the following scenarios. You may be surprised by the invisible tripwires and potholes that can lead to cybersecurity incidents that cost your bank millions of dollars — and damage your reputation.

Cyberattack Simulation Exercises

Introduce the scenarios below, and ask your team the following questions:

  • What are the first steps you must take to minimize damage?

  • Which authorities and individuals will you contact — and in what order?

  • How will you assess the damage?

  • How will you manage the fallout?

  • How can you prevent these scenarios from happening in the first place?

Scenario 1: Leave your personal logins at the door.

Bob left his phone in the car, but he needed to double-check the time of his doctor’s appointment, so he logged into his personal email from a work computer. The next day he logged in and found odd extensions on his files — and he was unable to open them. It turns out that cybercriminals used a MITM (man in the middle) attack to have Bob’s personal email credentials redirected. When Bob lets your tech team know about his problems, he mentions that he uses the same password for everything, including his login credentials at your company. In other words, the attacker can now access everything Bob had access to — and since Bob is a Senior Manager, he has access to some of your most sensitive data.

Scenario 2: The problem with home devices.

George received a call from his daughter’s preschool that she had a cough and a fever, so he had to leave work early to pick her up. He wanted to continue working on his project from home, so he made copies of his files on a flash drive to take with him. He completed his tasks on his personal computer at home, updated the files on the flash drive, and brought the drive into work the next day. Unfortunately, his home computer had been infected with malware, and now his work computer is compromised.

Scenario 3: It’s not you. It’s them.

Your bank’s Human Resources department uses a cloud-based online video platform to stream training videos for new hires. You just heard on the news that this provider was recently hacked, and malicious actors formjacked files that the HR department had been using.

Scenario 4: One simple mistake.

Diane followed every security protocol when she installed Outlook on her phone to access her work email at home. Like many people, she often purchases from large online retailers and frequently receives notifications in her personal email. One such notification popped up on her screen (apparently, there was an issue with a recent order). She opened the email from her lock screen and clicked on the link provided. Sadly, this was a phishing email sent to her work email. Her phone became infected with malware, which compromised her work email.

7 IoT Medical Devices That Are Hackable

Security Flaws in Patient Medical Devices Put Lives at Risk

Advances in the IoT medical devices market are rapidly innovating how we treat patients, often to a remarkable effect. Layering robotics with medicine and factoring the Internet of Things (IoT) into patient monitoring has opened up a new world for medical treatment, supporting remote patient care. The healthcare IoT market surged throughout the pandemic — and is expected to rise at a rate of 25.9% to $446.52 billion by 2028.

However, there’s a catch: Many IoT medical devices are hackable, and compromised devices can lead to catastrophic patient outcomes.

Escalating Cyber Risks: IoT Medical Devices Connected to Outdated Operating Systems

While advanced IoT devices change how patients receive care, recent history sheds light on escalating cyber risks. In 2017, WannaCry ransomware infiltrated outdated Windows systems, entering 70,000 devices across National Health Services hospitals in England and Scotland. Ambulances stalled, hospitals closed, and patient monitoring was disrupted, delaying care and threatening lives.

Lessons from history are often repeated — and sometimes escalated. Gartner predicts that by 2025 attacks on operational technology (OT) environments linked to medical IoT devices will be hacked and weaponized during cyberattacks with the intent to cause physical harm or even death — costing over $50 billion per year.

Just a Few Examples of Hackable IoT Medical Devices

Keeping a close eye on IoT medical devices and their cybersecurity risks is a matter of life or death.

Tread cautiously with these seven IoT medical devices:

1. Next-Generation Teleoperated Surgical Robots: The Raven II

In 2001, Professor Jacques Marescaux used telesurgery and robotics from his offices in New York to perform a cholecystectomy on a 68-year-old woman in France. Since then, experts in robotics and medicine have worked around the clock to make telesurgery a viable option for anyone.

While telesurgery and robotics are most often used while the surgeon is in the same room as the patient, operating over a secure hardwire, surgeons will eventually use them to intervene during situations that are unsafe for humans (like battle scenes, chemical fires, earthquake rescue missions, and pandemics). But there’s a catch: Treatment will likely occur over insecure networks — and cybercriminals can easily infiltrate them. During research at the University of Washington, The Raven II, a telesurgery robot, was easily hacked. Even a tiny interference could have deadly consequences in actual practice.

2. Infusion Pumps: The B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation

Imagine you’re lying in a hospital bed after surgery, blissfully unaware of your body’s distressed state thanks to the IV drip of painkillers. And then you suddenly wake up to excruciating pain because someone hacked into the network and shut off the infusion pump — or even worse, you don’t wake up at all because a hacker doubled the rate of flow.

Cybersecurity researchers revealed vulnerabilities that could lead to such an overdose when they hacked into the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation. Ironically, these IoT devices have a locked-down software design with thoughtful security features that are intended to keep patients safe from hackers. Researchers found an easy loophole: They hacked into the hospital’s network and exploited a common connectivity vulnerability, which allowed them to compromise the security of the B. Braun infusion pumps. “Successful exploitation of these vulnerabilities could allow a sophisticated attacker to compromise the security of the Space or compact plus communication devices, allowing an attacker to escalate privileges, view sensitive information, upload arbitrary files, and perform remote code execution,” announced B. Braun in a security statement.

3. Insulin Pumps: Medtronic and Johnson & Johnson

Medical device company Medtronic issued an urgent recall of their insulin pump controllers thanks to researcher Jay Radcliffe discovering connective vulnerabilities, potentially allowing an attacker to overdose the user. And it’s not the first time hackers have exploited vulnerabilities in Insulin Pumps: Back in 2016, Johnson & Johnson announced that one of its insulin pumps could be hacked, possibly overdosing the patients. The solution? Users were asked to disable a remote control feature, patch a vulnerability, and program the device using a maximum insulin release setting. (Now imagine your grandparent was using the insulin pump, and had to take each of those steps to stay safe.)

4. Imaging Devices: GE Imaging and Ultrasound Devices

According to the 2020 Unit 42 IoT Threat Report, a shocking 83% of hospital imaging devices run on unsupported operating systems — an easy entry point for malicious actors.

In 2020, researchers from CyberMDX found critical vulnerabilities attributed to default global credentials used in management software that affected over 100 radiology tools from GE (including molecular imaging devices, mammography devices, MRI machines, CT and PET Scans, advanced visualization, ultrasounds, and X-rays). “Successfully exploiting the vulnerability may expose sensitive data — such as protected health information (PHI) — or could allow the attacker to run arbitrary code,” researchers explained. And this could “impact the availability of the system and allow manipulation of PHI.”

5. Health Monitors: IntelliVue Information Center iX (PIIC iX) Developed by Philips

Several months ago, researchers at Nozomi Networks Labs discovered five new vulnerabilities in patient monitoring systems. Health monitors track a patient’s vitals and alert staff should anything go wrong — and these monitors are particularly vulnerable to attacks because they’re connected to the more extensive communications network and have large attack surfaces. A hacker could change settings, obscure the displayed data, or silence alarms, leaving patients in urgent need without help.

6. Digital Smart Pens

Doctors use digital smart pens to prescribe medications and then swiftly transmit them to pharmacies — along with a patient’s sensitive information, including their name, address, and health records. Security researcher Saurabh Harit of Spirent SecurityLabs revealed that it’s entirely possible to reverse-engineer the pen and uncover all that information. Even worse, a digital smart pen could serve as an entry point into a larger operating system — and cybercriminals could potentially access databases with patient records.

7. Implantable Cardiac Devices: Pacemakers

The U.S. Department of Homeland Security released a medical advisory statement exposing the vulnerabilities in several pacemaker models. Dick Cheney famously had his pacemaker modified back in 2007 to protect against a virtual assassination.

Hospital staff can protect themselves and their patients by following cybersecurity hygiene basics, keeping software and virus protection up-to-date, running vulnerability assessments and adopting zero-trust policies, modernizing legacy systems, training staff on cybersecurity best practices, and following the FDA’s Medical Device Safety Action Plan.

5 Ways Pharma Can Mitigate Third-Party Cyber Risks

Third-Party Vendors Are a Growing Cyber Risk for Pharma

Pharmaceutical companies regularly outsource critical business functions to third-party vendors. Outside companies are often responsible for research, product development and distribution, sales, and IT (to name a few) — and these third-party vendors pose an enormous cyber risk for pharma. Over half of all data breaches in 2021 were traced back to third-party vendors.

Pharmaceutical companies store valuable data on their networks, from patient information to sensitive data about patent filings. Attacking pharma through a third-party vendor — who has access to a company’s proprietary information and internal networks — is low-hanging fruit for cybercriminals looking for an easy payday. Even worse, the average cost to bring a new drug to market is roughly $1 billion. A cyber attack that delays the approval process — or puts approval at risk— can be enormously expensive.

Despite strict regulatory compliance requirements, a record number of pharmaceutical companies lost millions of dollars in data breaches last year. The average cost of a data breach in the pharmaceutical industry rose to $5.04 million in 2021 — nearly $1 million more than the average cost across all sectors.

Mitigate Third-Party Cyber Risks

Mega data breaches, supply chain attacks, and devastating ransomware regularly make the headlines, especially when the healthcare industry is under siege. By now, pharmaceutical security experts know many cybersecurity hygiene basics, like keeping software up to date, following zero-trust best practices, performing penetration tests, patching early and often, and educating employees, to name just a few.

But every pharmaceutical company should take additional steps to mitigate third-party risks and ensure a chain of trust with companies offering essential services in the supply chain. If an attack shuts down a critical system used in the approval process for a new drug, the financial consequences can be enormous. The best third-party vendors will take all necessary security measures to keep your company safe.

Here’s what you need to do to minimize risk:

1. Make a list of your vendors and update it regularly.

Keep a list of vendors — including the details of your business relationship and what data they access — complete with representatives’ names and contact information. This will make it easier to identify attacks (like phishing attempts disguised as your vendors or unauthorized data transfers). It will also help your IT team with investigations in the event of an attack.

2. Identify the risk factor for each third-party vendor.

Discuss the following topics with your vendors’ representatives to gauge their cybersecurity preparedness:

  • What cybersecurity measures are you taking? All pharmaceutical companies should be using encryption and 2FA, testing against potential attacks, employing least-privileged access, and performing routine employee awareness training and audits.

  • Do you use VPNs or desktop sharing tools? These tools pose potential security risks, creating vulnerabilities that cybercriminals can use to access your data.

  • Has your network been breached before? What was the outcome? It is important to know if a vendor has experienced numerous breaches.

3. Include cyber risk management in your contract.

Including cyber risk management in your contract may not prevent a breach, but it holds the vendor responsible for protecting your data — and encourages cybersecurity best practices.

4. Set up strong access control measures.

Pay close attention to the data you share with third parties — and limit access whenever possible. Enforce access reporting, auditing, and monitoring to keep all movement out in the open.

5. Create a clear incident response plan — and have your team role-play with realistic scenarios.

Your team’s first response to an incident shouldn’t be during the chaos of a devastating cyberattack. Identify exactly what your company will do in the event of a third-party data breach — and practice your response until you’ve covered all of your bases.

Pharmaceutical companies must stay vigilant and prepare for escalating cyber threats: It’s no longer a matter of “if” a company will be attacked, but “when.” Institute a third-party risk management plan, identify your weakest links, and safeguard your data today; it could save your company millions of dollars in the long run.

Formjacking Exposes Mortgage Lenders to Cyber Threats

Formjacking is malicious JavaScript code that steals digital information through online forms — and it’s wreaking havoc on mortgage lenders. Malicious software lurks in the background of compromised online forms waiting to steal credit card information, social security numbers, passwords, and other PII while innocent hopefuls sign up for an account or apply for a home loan.

Cybercriminals use formjacking to take advantage of trusting home buyers operating under the illusion of digital safety. Most prospective clients assume bankers and lenders place everyone’s information under a tight watch, trusting the mortgage lenders implicitly as they fill out web forms. They rarely stop to consider who else might be accessing them.

How Does Formjacking Work?

The method is simple and eerily effective: A cybercriminal slips malicious JavaScript code into a website’s back or front end, which sends copies of users’ input to them instantly. If their code seeps into the front end, malicious actors can add extra input fields to any form. They can request sensitive information like a social security number or bank account credentials. And, if they’re particularly hungry, they can track mouse clicks and IP addresses.

If that sounds bad, it only gets worse. It’s far too easy for these formjackers to go undetected for months or even years. They can set the script to activate at certain times of day to avoid a cybersecurity team’s working hours or split it into multiple files to make detection that much harder.

Mortgage Lenders: A Tempting Target

Mortgage lenders are a tempting target for their size, ubiquity, and access to sensitive information. What better way to demonstrate what formjacking can do than with the hackers who infiltrated hundreds of real estate websites with a single video?

Brightcove provides video streaming services to many well-known clients, including Sotheby’s International Realty. In January 2021, an attacker injected JavaScript codes into a video used in over 100 real estate websites run by Sotheby’s — which means that every time a user opened an infected page, the software would import the video. Then, the malicious code would become embedded in the website.

Sotheby’s was only recently able to end the attack campaign, meaning that for a year, their attacker hoarded clients’ names, email addresses, phone numbers, and credit card data.

The danger is not limited to clients either. Though news reports tend to highlight the damage to consumers, formjacking can just as easily steal internal information through company portals. If a cybercriminal managed to embed their code into an employee training video purchased from a mass retailer, for example, they wouldn’t need to wait long before taking a snapshot of an employee’s login credentials.

Formjacking is a growing trend — and it’s not going away anytime soon. Though it would be nice to believe that Brightcove’s breach was an anomaly, 4,800 websites are compromised with formjacking every month. Attackers especially enjoy targeting third-party tools because the average eCommerce website uses 40-60 of them, with the majority (68%) of those tools accessing form and input fields. Given the prevalence of these tools in modern business, anyone can be an easy target.

Protect Your Organization From Formjacking

Safeguarding your business from formjacking is becoming increasingly important, and there are steps you can take to minimize risk:

  1. Website admins should manage permissions with a zero-trust mentality: In other words, trust nobody — and limit access to those who need it to do their job.

  2. Most data breaches are a result of human error. Educate your staff about cybersecurity best practices.

  3. Require two-factor authentication (2FA) to verify form submissions on your website. While 2FA doesn’t stop formjacking itself, it can minimize damage by preventing an attacker from taking over a person’s accounts. The malicious actor must simultaneously compromise both devices customers use for authorization (not an easy feat). Attackers tend to look for easier prey.

  4. Detect unwanted changes to your environment with file integrity monitoring (FIM). You’ll be alerted to any changes made to files you’ve set it to monitor.

  5. Run penetration tests and vulnerability scans. No matter how confident you feel about your security, make it a habit to look for weaknesses and consider new ways to strengthen your cybersecurity framework.

  6. Run quality assurance tests on new updates. Make sure things are operating as you intend before launching something new, from back-end functionality to UI interactions.

It’s time to level up your security and stay multiple steps ahead of cybercriminals — it’s your job to protect your customers’ assets, and your own! Update your cybersecurity framework and audit your organization with meticulous detail because what you don’t know will hurt you.

 

Read More: What Is Malware — and Why You Should Give a Sh*t

$1,270,000: Why Hospitals Pay Millions to Recover From a Cyberattack | The Real Cost of Recovering From a Ransomware Attack

The Real Cost of Recovering From a Ransomware Attack

In a world where escalating ransomware threats make daily headlines, the stakes for hospitals are excruciatingly high. Losing money is one thing — losing a patient is another. A hospital CISO doesn’t have the luxury of negotiating with cybercriminals when patients’ lives are on the line.  

Paying the ransom itself comes with a hefty price tag — but remediation costs, including the cost of downtime, lost opportunities, data recovery, lawsuits, and loss of reputation, increase the bill tenfold. And it all adds up to an average of $1,270,000.

Hospitals Are at the Center of the Escalating Cyber Storm

The pandemic offered a perfect storm for cybercriminals — and hospitals paid the price. Cybercriminals brought in staggering amounts of cash by installing ransomware at overstretched hospitals, notoriously unprepared for escalating cybersecurity threats. Now, cyber gangs like FIN12 intentionally target vulnerabilities in the healthcare sector, looking for an easy payday. The increased risk to patients’ lives incentivizes hospitals to pay up, and cybercriminals know it.

When cybercriminals shut down networks, encrypt data, and threaten to shut down the facility’s utilities, the repercussions are complicated and costly. Precious commodities like patient information and lifesaving equipment are at risk. And when ransomware infiltrates a hospital’s lifesaving systems, there are no clear instructions for recovery. Even hardliner authorities (“We don’t negotiate with terrorists!”) recommend meeting ransom demands to save patients’ lives.

The Hidden Costs of Ransomware Attacks at Hospitals

The ransom paid — an average of $131,000 in the healthcare sector — is just a fraction of the $1,270,000 average recovery cost from a ransomware attack. Operational downtime, negative patient experience, loss of reputation, staff overtime, device costs, and network repairs make up the difference. Even if the attack is swift and the criminals withdraw quickly after paying the ransom, lost revenue adds up. NEO Urology in Ohio lost $30,000 to $50,000 every day for three days after paying a $75,000 ransom.

A worrying 54% of IT teams said that cyberattacks are too advanced to handle on their own. Outside agencies are often brought in to assist with data and device recovery (which can take years). When all is said and done, the bill can cost more than the ransom. It costs up to $2,000 on average to recover data from one hard drive. Consider how many hard drives are in a single hospital and what it would cost to bring them all back up to speed. Okay, you can spare yourself the mental math: It’s a lot. Don’t even try to think about the other, more complex medical devices similarly affected by network attacks — you’ll get a headache.

Payroll and education costs also add up. With networks offline, hospital staff must make handwritten records to maintain protocols, procedures, and schedules. Once systems are back online, those same records must be transcribed into the system to avoid leaving gaps in the facility’s history. These tedious tasks add a surprising amount of time to any healthcare worker’s shift, resulting in overtime and hazard pay. And let’s not forget the resources needed to train staff about cybersecurity best practices to avoid another attack.

$1,270,000 is a hefty price tag, but even so, it fails to include the costs of legal repercussions associated with a successful cyberattack.

Quality Rep Services, Inc. (QRS), a healthcare technology vendor in Knoxville, Tennessee, is facing a class action lawsuit for a data breach of 319,778 records. On the internal side of things, Community Medical Center (CMC) in Missoula, Montana, flirted with employee lawsuit material over payroll discrepancies. CMC suffered a cyberattack in late 2021, which affected payroll processing. In the interim, the medical center duplicated paychecks from December 3, 2021, prompting a letter from the Montana Nurses Association (MNA) urging CMC to pay nurses what they are owed.

Minimize Damage and Keep Your Data Safe

Until cyberattacks let up (which is more likely than seeing the dead rise from the grave but less likely than seeing a good Matrix sequel), these expenses aren’t going down. Remember, the best defense is not preventing attacks (they’re going to happen!), but preventing successful attacks by keeping backups of your important data secured off-network and minimizing the effects on patients. The less damage done, the less recovery is needed.

Should Hospitals Pay Off Cyber Terrorists?

What to Do After a Ransomware Attack

2020 and 2021 created a veritable gauntlet of misfortune for hospitals — overworked staff in overcrowded facilities working desperately to contain a highly contagious virus. Other viruses crept in, too: Ransomware infiltrated hospital networks across the U.S. in record numbers, profiting from internal chaos and adding havoc to already overtaxed systems. Even worse, cybercriminals show no signs of slowing down in 2022.

Operating at a Loss

Hospitals aren’t known for having robust cybersecurity defenses. They typically don’t have the budget, personnel, or bandwidth for modern security systems. But their internal systems are crucial to providing care: In a perfect world, they should experience 100% uptime — no system errors, no downtime — and be impenetrable. The risks are hard to overstate: Attackers with network access have the power to block access to vital patient data, disable life-saving alerts, trigger false alarms, halt procedures, and cause any number of otherwise avoidable disasters. Even a small network downtime is a crushing weight on already overburdened hospital staff.

Ransom: To Pay or Not to Pay

When it comes to the question of meeting the demands of ransomware, conventional wisdom lands on the side of “hard no”. Often, the argument is a variation of, “We shouldn’t negotiate with terrorists!” Most authorities, including the FBI, advise against paying a ransom. There is no guarantee that an attacker will keep their end of the bargain and return stolen data or give back system access. Some groups are also known to extort their victims for double or triple payments. But for hospitals, the stakes are undeniably higher than they are with a financial institution. Losing a client’s bank account credentials is one thing — losing a patient is another.

$50,000,000 Gone

In the fall of 2020, malware on an employee’s computer at the University of Vermont Medical Center (UVMC) led to a full-on cyber attack. The attackers included a file with information on how to contact them (a step UVMC opted not to take, assuming that further contact would only result in a ransom demand) in exchange for the tool to decrypt their infected files. The incident was estimated to have cost UVMC $50 million, mostly in lost revenue, and IT staff worked around the clock for a month to scrub their network systems. And this was a non-threatening attack, which only interfered with health records and payroll. Would it have been worthwhile to pay the ransom? Considering what’s at stake, what can a hospital do?

The Price of Paying

Over the last decade, some hospitals have opted to pay ransoms at an average of $131,000 in 2021. Obviously, this is much lower than the $50 million UVMC lost, but paying “reasonable” ransoms has led to another cost altogether: Now groups like FIN12 are attacking healthcare institutions more often, taking advantage of outdated security systems and threatening patients’ lives.

Though it may seem less costly and time-consuming on paper, giving in to an attacker’s demands is usually not the best method for dealing with ransomware. Authorities may advise a hospital to pay the ransom initially to spare patients at risk, but such a decision is not taken lightly and should not be made without guidance.

Ransomware Attack Next Steps

Step 1: Get help, fast, from an expert. Do not immediately pay the ransom or trust the cybercriminals.

Step 2: Isolate devices from the network, secure backups, and identify the source and goals of the attack to contain and minimize affected data.

Step 3: Report the attack to the FBI, state and local law enforcement, the Secret Service’s Electronic Crimes Task Force, the Internet Complaint Center, and the Federal Trade Commission. If your institution has cyber liability insurance, contact your insurance carrier.

Step 4: Though authorities may advise a hospital to pay the ransom to save a patient’s life, giving in to a cybercriminal’s demands does not guarantee decryption. Moreover, an attack’s success can lead to more incidents in the future. Follow your organization’s incident response plan — and weigh your options.

Be Proactive: Prepare For Future Attacks.

1. Always make backups of important documents, keep them off the network, and test your processes for restoring backups.

2. Assign staff to a cybersecurity response team.

3. Create and update an incident plan detailing what signs to watch for and how to react.

The Nauseating Truth About FIN12 for Hospital CISOs

FIN12’s Ruthless Tactics Put Lives at Risk

FIN12 is an aggressive, ransomware-focused cybercrime group that specializes in targeted attacks on the healthcare sector. While many cybercrime groups will avoid hospitals, nursing homes, and 911 services — FIN12 has no reluctance.

Since 2018, FIN12 has actively targeted a range of businesses — making the group one of the most notorious big game hunters in cybercrime. Nearly 20% of their victims are in healthcare; 85% are in North America; and all boast revenues of at least $300 million. With no sign of remorse or morals, FIN12 stands in stark contrast to other cybercriminals: DoppelPaymer and Maze claim that they provide free decryption keys if they accidentally target a vulnerable group. FIN12 deliberately seeks them out.

A New Challenge For Hospital CISOs

No sector is safe from this group’s reach (they have also attacked government websites, schools, universities, and local municipalities), but their ruthless tactics pose a huge threat to healthcare. CISOs have to strategize for FIN12’s attacks — especially if long-distance treatments like telesurgery become more prominent, which will raise the stakes astronomically.

FIN12’s Brutal Methods

FIN12’s single-minded focus on ransomware deployment sets them apart. Their methods are ruthless — and brutally quick. By developing close partnerships with other threat actors who have already gained access to a victim’s network, FIN12 can creep in undetected and quickly deploy debilitating ransomware. Then, when access is securely locked down, they request a single large payout in Bitcoin. Their time-to-ransom (TTR) is incredibly short — the attack and payout all occur in 2 to 3 days.

To make their attacks more complex, FIN12 often overlaps toolsets and services to include backdoors, droppers, and codesigning certificates. The rise of remote work and relaxed home cybersecurity has made it easier for them to access remote logins — paving the way for their attacks.

A Reason to Pay Ransom

FIN12 is in it for the money — not for the data. Since they solely encrypt or block access to data instead of exfiltrating it, there’s an incentive for hospitals to pay up, get systems running, and save lives. Without the threat of corrupted data or exposed personal identifiable information (PII), their victims have reason to believe that they won’t be extorted or left behind without restored access. Additionally, FIN12 has a reputation for taking payment and moving on — another reason used to justify random payments.

A Stronger Defense

Along with updating security processes, procedures, and systems — the no-brainer basics — educating healthcare personnel on cyber security best practices helps prevent attackers like FIN12 from gaining a foothold. In most cases, mismanaged credentials and privileges lead to a breach: Many successful attacks began with a mere phishing email.

Enacting safety standards such as prohibiting personal use of company devices, using multi-factor or adaptive authentication, and keeping OS and antivirus software up to date can go a long way in preventing threats from getting in.

Call the Feds! What Bank CISOs Need to Do After a Data Breach

Mitigate Damage: The 4 Critical Steps For a Bank CISO’s Response

Financial institutions are one of the most vulnerable targets for cyberattacks — and today’s Bonnies and Clydes are after more than just cash. Social security numbers, credit card accounts, and sensitive financial data are all up for grabs when a bank is breached, creating perfect conditions for costly and time-consuming cyber nightmares — for clients and institutions alike.

Having a playbook in place in the event of a breach can help your financial institution avoid costly fines, reputational damage, and future attacks. Below are four critical steps CISOs in financial institutions need to take after a data breach.

Step 1: Know the Rules

Under the Gramm-Leach-Bliley (GLB) Act, financial institutions are legally required to ensure that their client’s details are safe and confidential: They must have a written plan that outlines how they protect customer data; use service providers with security safeguards in place; train their employees on cyber security best practices; and work with law enforcement in the event of a breach.

Sounds simple enough, but each state has its own set of rules and regulations for working with local and federal law enforcement when sensitive data is compromised. CISOs need to make sure they understand the scope of their responsibilities — as well as their power of authority — and be fluent in local legal requirements when devising their company’s own plan.

Step 2: Contact the Proper Authorities

It might seem easier to quietly pay off cybercriminals rather than deal with an embarrassing public fallout and sky-high fines. While that may be true, it is a spectacularly bad idea. The best practice is to follow protocol and alert the authorities, immediately.

Not convinced? Let’s entertain the idea of an institution responding to ransomware by quietly slipping Bitcoins to cybercriminals as payment. Bypassing lengthy investigations and the disruption of daily activities — not to mention neatly sidestepping loss of trust from customers and clients if the attack is exposed — may sound appealing, but the fallout could be worse than the breach itself. There’s no guarantee that the attackers would hold true to their word and relinquish control, or that they wouldn’t abuse the data to which they’d gained access. There is also zero guarantee that the group wouldn’t make their actions known — either by simply announcing it or by broadcasting the very data they stole. Just ask Joe Sullivan, former CISO at Uber, who faced charges from the FBI after taking matters into his own hands and paying a ransom.

Step 3: Own Up and Alert Your Customers

The fear of shouldering the blame for a breach is understandable, especially when 23% of companies report executive firings following cyberattacks. Banks are burdened with safeguarding their customers’ finances and their personal identifiable information, making a breach a particularly nasty pill to swallow. However, a careful and methodical response can help to protect and retrieve clients’ information — and help institutions save face.

In April of 2021, the Bank of Oak Ridge in North Carolina reported a data breach affecting an undisclosed number of accounts. Social Security numbers, bank account numbers, and driver’s license numbers were exposed.

In response, the bank closed all five of its branches for two days while the FBI assisted with the investigation. When they determined who was likely affected, the bank alerted its customers and offered free identity protection. By reporting the incident quickly, following protocol, and communicating with transparency, the bank dodged legal fines — and remained in business.

Never heard of this incident? Exactly.

Step 4: Conduct a Critical Vulnerability Scan

Bad things happen to even the best IT teams, but there’s no excuse for being hacked or attacked in the same way twice. Below are high-level practices all organizations should adopt in the aftermath of — and well before — an attack.

  • Prioritize security from the top down. For security measures to be effective, executive level buy-in is a must. It’s on CISOs and other C-suite execs to make cybersecurity and awareness a core part of organizational culture.

  • Know your risk profile. Clearly identifying your industry’s attack vectors, gaming out different cyberattack scenarios, and being aligned on your organization’s most valuable assets — and how to protect them — is crucial to creating and executing effective cyber security initiatives.

  • Take threats seriously. Prepare for the worst. Seriously. (Read more: Why Executives Should Play Cyber War Games)

  • Enforce your policies. Security policies should be baked into day-to-day operations — and outlined in terms that all employees (not just tech geeks) can understand. Document everything, automate whenever possible, and keep things simple.

  • Back it up. Data loss can be a death blow to an organization — many never fully recover. Keep a copy of critical data in a secure offsite location and regularly test your backups.

  • Keep up with security patches. Sounds like a no-brainer, but regularly applying legitimate security patches to software and hardware systems is often overlooked. Are there examples where a security patch created a vulnerability? A couple. Are there examples where the lack of a patch created a huge problem? A couple thousand.

If a bank wants to mitigate the damages from a cyberattack and maintain its customers’ trust, the CISO should get to know the applicable local and federal laws, create a plan, and communicate any data breaches without fail. An attack is all but inevitable, but how an institution reacts determines whether it will recover and move on, or keep on taking hits even after the ransom is paid.