Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

The Expanding COVID Attack Surface

How We Can Come Together to Defend Against Cyberattacks to Emerge Stronger

By Tom Patterson
data breach
May 28, 2020

COVID-19 is a killer virus, with deadly outcomes every day that are profoundly impacting lives, economies and futures. While the worst of the pandemic is well known, the response from the heroic healthcare workers, companies and industries is also getting attention. Healthcare workers are clearly noted as essential and critical. As a result, they are being celebrated with daily claps emanating from windows of the world. And these workers and organizations are being targeted by groups looking to profit from or undermine their good works.

Healthcare is a wide and diverse label, going beyond hospitals and giant pharma companies to include the doctors and nurses, first responders of every stripe, supply chains and cleaning staffs and caterers. This sector includes scientists working on a vaccine, mashups working on track and trace, startups working on testing technology and municipal testing programs for the masses. And every healthcare employee, volunteer, company, nonprofit and non-governmental or governmental organization is now a high-value target.

Since the pandemic hit, we have real evidence of cyber targeting of the healthcare sector. In these last few months, we’ve seen:

  • A Colorado hospital hit by ransomware
  • The FBI calling out an increase in nation-state hackers targeting U.S. medical research and healthcare organizations
  • The World Health Organization (WHO) experiencing a five-times increase in cyberattacks
  • The U.S. Department of Health and Human Services (HHS) facing a new wave of cyberattack attempts
  • Chinese company Huiying Medical breached in event for which attackers stole its COVID-related intellectual property including source code and valuable testing data
  • Ambry Genetics was successfully hacked, potentially exposing more than 200,000 patient medical records

Meanwhile, the pace of response by those racing to deliver helpful services to constituents is introducing errors that can be equally crippling. An example of this is the U.S. Small Business Administration (SBA) rushing to launch a web portal designed to help companies apply for their share of over a trillion dollars in COVID relief. However, a security mistake related to that effort exposed nearly 8,000 applications, which included personal, corporate and credit information. 

With trillions of dollars at stake and a geo-political push for supremacy of the post-COVID new normal, the attacks are increasingly well funded, well organized and well executed. Be they from foreign intelligence services or trans-national criminal gangs, these efforts are now targeting an expanded attack surface including employees working from home instead of from a secured office, a plethora of companies that only recently became top targets, an absence of a trusted supply chain and a time crunch that may cause a trade-off between security and timeliness. This combination has made for a dangerous scenario in our world today.

Given these realities, the healthcare sector and those that are healthcare-adjacent are advised to step up their defenses in at least three key areas. 

The first is in security awareness. Organizations should take the time to plug into some of the great advice that is being made available both from the government in the form of the Cyber and Infrastructure Security Agency (CISA) and the private sector in the form of the Health Information Sharing and Analysis Center (H-ISAC).  Helping staff understand their current threat environment as it relates to them, and providing actionable advice on recommended defenses, will go a long way in tightening our sector-wide defenses. This advice should be coming not only from security experts, but from healthcare leaders themselves, ranging from executives, administrators and top doctors that are influential in their environments. 

The second area of stepped up defense is a renewed focus on patient privacy. Typically systems are built and deployed to meet the privacy requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). While compliance is still important, the privacy bar should be raised to take into account a new normal that might involve testing an entire population, tracking and tracing citizens’ movements across time and sharing lists of patient results with a wide variety of partners which could include employers, neighbors, family and friends. These systems are being designed and tested right now, and must keep a strong focus on privacy well beyond simple compliance.

The third defensive area of focus must be a stronger network cyber defense. This is the time to embrace new thinking about cybersecurity. That includes concepts such as Zero Trust, architectures that are cloud-centric and mobile-driven, identity that leverages biometrics and FIDO2, networks that are software defined and defenses that are dynamic.

COVID-19 has reshaped our world, and the global healthcare sector is our first line of defense against this pandemic. It is the obligation of the rest of society – from governments to the security sector – to do what we can to protect them in our new normal. 

Defending well today and together will make it possible to emerge stronger tomorrow.

 

KEYWORDS: CISA coronavirus COVID-19 cyber security data breach internet security pandemic

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tom patterson headhsot

Tom Patterson is the Unisys Chief Trust Officer and a senior fellow at Auburn University’s McCrary Center for Cyber and Homeland Security. He brings more than 30 years of leading-edge security experience, expertise and innovation helping commercial and public sector clients tackle some of their most complex security challenges. Patterson has lectured on security at both the Wharton School and Cal Poly, frequently keynotes at corporate and government events, speaks at events from Davos to TedX and is a regular guest security analyst for media. Throughout his career, he has helped lead the drafting of the White House’s Cyber Moonshot report, secure projects as diverse as the launches of a space shuttle and aircraft carrier, and protect critical infrastructure from terrorists, organized criminals and foreign intelligence services, as well as secure high-profile programs at the United Nations and United Way.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hand in front of binary code

    Unveiling the power of external attack surface management

    See More
  • SEC_Web_5Minutes Mattson

    How organizations can defend against the increasing API attack surface

    See More
  • SEC1219-cybergap-Feat-slide1_900px

    New study shows exploitable attack surface within cloud services and remote healthcare

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing