Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity NewsHospitals & Medical Centers

Attacks on VPNs and health industry headline 2021’s biggest cyber risks

By Amit Bareket
healthcare
January 7, 2021

The COVID-19 pandemic shocked the world and changed how businesses operate overnight, both internally and in their interactions with customers. The event forced major changes that weren’t expected to occur for five to ten years, accelerating digital initiatives worldwide at a pace fast enough to unexpectedly break things.

As more organizations implemented collaboration tools and moved their infrastructures, networks, and applications away from on-premises environments and into the cloud, everything became more accessible to users, and in many cases, attackers. Hackers will continue to take advantage of our work environments and the trends advancing them in 2021, but some targets stick out more than others.

As we look ahead to 2021 and to defending against an ever-evolving variety of exploits and attacks, it’s important to consider the cybersecurity attack vectors that will be most prevalent in the upcoming year.

 

Healthcare Continues to Be an Attractive Target

Even with COVID-19 vaccines on the way, attackers will continue to try to steal and exploit resources from vaccine research centers. As hospitals and medical centers will be offering the vaccine, they also continue to be a favorite target of cybercriminals. From the theft of intellectual property and ransomware attacks to common phishing attacks, healthcare will be a premium target in 2021.

Hackers will capitalize on the COVID-19 pandemic to trick or scare people into providing access to their data, and therefore their organizations’ networks and resources as well. Over the past year, hackers have increased their rate of attacks significantly, disguising themselves over email as health authorities and luring people into clicking malicious links.

Worse still, despite the many deaths since COVID-19 first emerged, cyberattackers are not afraid to endanger patients in need of emergency medical treatment. In early September, attackers exploited a hospital in Germany that was forced to shut down essential equipment. This resulted in what many people are saying is the first death by cyberattack. The tragic event proves hackers have no boundaries for who and what they will target, and it highlights that ransomware is quickly becoming more dangerous to people and critical resources.

I expect that hospitals and COVID-19 vaccine research centers will continue to be top targets for hackers in 2021 — at least until they’re no longer able to exploit the pandemic psychologically. It’s unclear if attacks on the healthcare industry will become commonplace, but with every new attack, it matters less and less. A solution for healthcare data and system defense will no doubt be a priority for companies in the security sector in the coming years.

 

VPN Exploits Also on the Rise

In 2020, remote access became the biggest workplace trend. Now with millions of people still working from home, VPN usage is at an all-time high. While VPNs allow organizations to provide remote access, cybercriminals have also caught on. Hackers are on alert and have devised new ways to exploit users and their organizations through virtual networks.

In 2021, we will continue to see a boom in attacks on VPNs, as legacy iterations and products are now more easily breached. While hackers love the challenge and reward of exploiting new technologies, VPNs in many cases offer a familiar way to subvert common cyber precautions. Too often, VPN vendors are guilty of neglecting to patch vulnerabilities within their technology. Data-sensitive industries such as financial services, government, and healthcare are common users of VPNs and without patching discipline, they’re providing an open door for attackers to gain entrance to the networks.

Over the past months, we have also seen rising VPN exploits due to stolen credentials and another dangerous reality: misconfigured clients. These are difficult to detect but are common pitfalls — especially as companies’ clouds become more complex and span more resources. This isn’t new: Over the years, hackers have been exploiting VPNs as the cloud becomes ubiquitous, but now with everyone working remotely these issues touch millions of users and their data in one go.

 

2020 Attacks Inform 2021 Defenses

To defend against these attacks and bring the most vulnerable attack vectors out of hackers’ reach, companies will need more sophisticated network access management. All it takes for hackers to exploit an entire organization is to find the employee with the most access and the least security hygiene. More organizations are waking up to this reality and adopting VPN alternatives, like Zero Trust Network Access, which go beyond one-size-fits all access rules and provide greater network segmentation. This shift will only accelerate in 2021.

Remote work has made it easier for hackers to gain access and move laterally within an organization's local and cloud resources as well. Accordingly, the importance of vulnerability tracking in the VPN or remote access environment cannot be overstated when heading into 2021. Organizations that solely rely on VPNs for remote corporate network access, rather than more holistic services that include a SIEM alerting tool or cloud firewall, are opening themselves up to a potential VPN-enabled breach.

2020 was a difficult and challenging year for cybersecurity from many different perspectives, and in 2021 we will experience an uptick in evolving threats. But with modern, remote-ready security solutions and technologies in place, the world will become more secure one step at a time.

KEYWORDS: cyber security healthcare security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amit Bareket is CEO of Perimeter 81. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    How CISOs can stay one step ahead of 2023’s risks, threats and attacks

    See More
  • Strong Cybersecurity: The Critical Role of Lifecycle Management - Security Magazine

    Protecting VPNs from DDoS Attacks in the Age of Remote Work

    See More
  • hacker-attack-breach-freepik.jpg

    Banking industry sees 1318% increase in ransomware attacks in 2021

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing