In the constantly evolving world of cyberattacks, the new holy grail is gaining access to credentials – which bad actors are accomplishing by identifying and targeting the most vulnerable parties, said our panelists in a recent discussion. “Everybody wants credentials.”
As CIOs face mounting pressures to deliver innovative solutions while ensuring data are secure, the best course of action is to form strategic partnerships with vendors, said Tressa Springmann and Julie Bonello during a recent panel discussion.
It’s no longer just one-time malicious links CISOs have to worry about; threat actors are chipping away at firewalls by “befriending targets” and obtaining “pieces of information that seem innocuous,” said Ryan Witt of Proofpoint during a recent panel discussion.
With phishing attacks becoming increasingly sophisticated, the smart approach is to focus not on prevention, but on identifying the most likely targets, putting controls in place, and offering continuous education, according to our cybersecurity experts.
The easiest route for cybercriminals in accessing patient data is through email, according to CISOs Chris Frenz and Steve Dunkle, who share tips on how to do that, and how to stay ahead of the next wave of threats.