Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

The Expanding COVID Attack Surface

How We Can Come Together to Defend Against Cyberattacks to Emerge Stronger

By Tom Patterson
data breach
May 28, 2020

COVID-19 is a killer virus, with deadly outcomes every day that are profoundly impacting lives, economies and futures. While the worst of the pandemic is well known, the response from the heroic healthcare workers, companies and industries is also getting attention. Healthcare workers are clearly noted as essential and critical. As a result, they are being celebrated with daily claps emanating from windows of the world. And these workers and organizations are being targeted by groups looking to profit from or undermine their good works.

Healthcare is a wide and diverse label, going beyond hospitals and giant pharma companies to include the doctors and nurses, first responders of every stripe, supply chains and cleaning staffs and caterers. This sector includes scientists working on a vaccine, mashups working on track and trace, startups working on testing technology and municipal testing programs for the masses. And every healthcare employee, volunteer, company, nonprofit and non-governmental or governmental organization is now a high-value target.

Since the pandemic hit, we have real evidence of cyber targeting of the healthcare sector. In these last few months, we’ve seen:

  • A Colorado hospital hit by ransomware
  • The FBI calling out an increase in nation-state hackers targeting U.S. medical research and healthcare organizations
  • The World Health Organization (WHO) experiencing a five-times increase in cyberattacks
  • The U.S. Department of Health and Human Services (HHS) facing a new wave of cyberattack attempts
  • Chinese company Huiying Medical breached in event for which attackers stole its COVID-related intellectual property including source code and valuable testing data
  • Ambry Genetics was successfully hacked, potentially exposing more than 200,000 patient medical records

Meanwhile, the pace of response by those racing to deliver helpful services to constituents is introducing errors that can be equally crippling. An example of this is the U.S. Small Business Administration (SBA) rushing to launch a web portal designed to help companies apply for their share of over a trillion dollars in COVID relief. However, a security mistake related to that effort exposed nearly 8,000 applications, which included personal, corporate and credit information. 

With trillions of dollars at stake and a geo-political push for supremacy of the post-COVID new normal, the attacks are increasingly well funded, well organized and well executed. Be they from foreign intelligence services or trans-national criminal gangs, these efforts are now targeting an expanded attack surface including employees working from home instead of from a secured office, a plethora of companies that only recently became top targets, an absence of a trusted supply chain and a time crunch that may cause a trade-off between security and timeliness. This combination has made for a dangerous scenario in our world today.

Given these realities, the healthcare sector and those that are healthcare-adjacent are advised to step up their defenses in at least three key areas. 

The first is in security awareness. Organizations should take the time to plug into some of the great advice that is being made available both from the government in the form of the Cyber and Infrastructure Security Agency (CISA) and the private sector in the form of the Health Information Sharing and Analysis Center (H-ISAC).  Helping staff understand their current threat environment as it relates to them, and providing actionable advice on recommended defenses, will go a long way in tightening our sector-wide defenses. This advice should be coming not only from security experts, but from healthcare leaders themselves, ranging from executives, administrators and top doctors that are influential in their environments. 

The second area of stepped up defense is a renewed focus on patient privacy. Typically systems are built and deployed to meet the privacy requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). While compliance is still important, the privacy bar should be raised to take into account a new normal that might involve testing an entire population, tracking and tracing citizens’ movements across time and sharing lists of patient results with a wide variety of partners which could include employers, neighbors, family and friends. These systems are being designed and tested right now, and must keep a strong focus on privacy well beyond simple compliance.

The third defensive area of focus must be a stronger network cyber defense. This is the time to embrace new thinking about cybersecurity. That includes concepts such as Zero Trust, architectures that are cloud-centric and mobile-driven, identity that leverages biometrics and FIDO2, networks that are software defined and defenses that are dynamic.

COVID-19 has reshaped our world, and the global healthcare sector is our first line of defense against this pandemic. It is the obligation of the rest of society – from governments to the security sector – to do what we can to protect them in our new normal. 

Defending well today and together will make it possible to emerge stronger tomorrow.

 

KEYWORDS: CISA coronavirus COVID-19 cyber security data breach internet security pandemic

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tom patterson headhsot

Tom Patterson is the Unisys Chief Trust Officer and a senior fellow at Auburn University’s McCrary Center for Cyber and Homeland Security. He brings more than 30 years of leading-edge security experience, expertise and innovation helping commercial and public sector clients tackle some of their most complex security challenges. Patterson has lectured on security at both the Wharton School and Cal Poly, frequently keynotes at corporate and government events, speaks at events from Davos to TedX and is a regular guest security analyst for media. Throughout his career, he has helped lead the drafting of the White House’s Cyber Moonshot report, secure projects as diverse as the launches of a space shuttle and aircraft carrier, and protect critical infrastructure from terrorists, organized criminals and foreign intelligence services, as well as secure high-profile programs at the United Nations and United Way.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1219-cybergap-Feat-slide1_900px

    New study shows exploitable attack surface within cloud services and remote healthcare

    See More
  • It's Time to Change Your Perception of the Cybersecurity Professional

    Attack surface management is critical but few organizations do it well

    See More
  • computer

    How to mitigate critical cyber risks in a post-COVID-19 environment

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!