Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Looking ahead to 2021– Healthcare security predictions for the upcoming year

By Jonathan Langer
healthcare responsive default
January 22, 2021

This past year was a turbulent one across all industries and sectors. From the opening days of the virus, to the shutdowns that followed and now this half open / half closed environment we’re operating in, the only constant has been that we don’t know what tomorrow will bring. To put it mildly, this uncertainty has placed leaders and staff in increasingly difficult situations, as COVID-19 and its associated concerns have caused some industries to grind to a halt, while others have been forced to continuously adapt to stay afloat.

In the midst of this confusion, we’ve continued to witness significant changes in the processes and operations that companies traditionally rely on to conduct business – with a majority of organizations relying on remote work to safely continue operations. Considering this, it’s no wonder that attackers have realized that there is a significant incentive to take advantage of already vulnerable personnel, and further, the confusion and panic that workers are rightfully experiencing during the pandemic.

But just as these harmful attacks have grown, so have efficiencies and positive developments in areas elsewhere. It’s not all Fear Uncertainty Doubt (FUD) – rather, we’re also seeing old inefficient processes thrown out, while advancements in the way we work together have leap frogged months and even years in some instances. Like all things in life, it’s this mix of good and bad that I predict we'll continue to witness in 2021, with particular attention paid to the following themes related to healthcare and cybersecurity.

 

COVID-19 related cyberattacks continue well into 2021

As the recent Ryuk attacks have shown, cyberattackers are intent on preying on organizations during this moment of vulnerability. This month alone, we saw a suspected state-sponsored attack against the COVID-19 vaccine supply chain, while cyberattacks in general have steadily risen to never before seen levels.

Looking to the months ahead, this trend of coronavirus cyberattacks will only accelerate as we move into the next phase of recovery. Ransomware attacks, in particular, will remain at a high level and organizations must invest in employee awareness training and technological solutions to defend against these threats. Hospitals will continue to be targeted at a high rate, especially when one considers the stress and duress that frontline workers are placed under on a daily basis, as well as the opportunity to target the administrative staff and leaders supporting these individuals.

As a countermeasure, organizations should turn to solutions like zero trust and continuous authentication to overcome these challenges and protect their workers from attacks based on human-nature. For healthcare in particular, organizations must put in place processes like network segmentation to secure their IoT and general medical devices, as these endpoints represent a significant access point for nefarious actors to penetrate a network, hijack critical processes and overall, disrupt the life-saving care needed to content with this pandemic.
 

Organizations contend with the device goldrush

While the rapid growth of the IoT has been underway and predicted to explode for years, the past nine months saw a true expansion of devices connecting to organizations’ networks. As the trend of remote care continues in 2021, so will the number of IoT devices connecting to an organization’s network from a variety of secure and unsecure locations. In healthcare, this trend is one that’s particularly timely, as the distancing restrictions have caused all non-essential care to be replaced by telehealth and remote patient monitoring solutions, all of which rely on a variety of devices and the transmission of critical data to complete.

We’ll continue to see the adoption of IoT devices to provide care as well as the creation and adoption of the necessary security protocols to protect these devices. This includes laptops, cellular phones, tablets, and a range of remote patient monitoring devices – everything from an Apple Watch to a device used to treat chronic disease. As the medical IoT becomes wider and more connected, hospitals will not only have to secure these endpoints, but also devise the best ways to manage patient information and use it to inform care and treatment processes. The upcoming year should be quite influential as organizations look to shore up their networks while refining processes and ensuring that all endpoints used for care are accounted for and protected against outside intrusion.
 

Budgets will continue to be squeezed by coronavirus fall

The financial impact of COVID-19 has been widely reported, and while the promise of a new vaccine seems poised to bring much needed relief, it could be quite some time before we witness a true turnaround in budgets and profitability. In heavily impacted industries – such as healthcare – the urgent need to reallocate resources has squeezed already razor-thin budgets, while leadership and staff have been asked to do more with less.

Unfortunately, this is a trend that doesn’t seem likely to turnaround in the upcoming months, with much of the country still operating in a reduced capacity. For healthcare, a primary cause of this windfall has been the reduction in elective surgeries, due to millions of American workers losing their health insurance as a result of unemployment. Additionally, many hospitals have voluntarily canceled these surgeries to clear bed space and free up staff to prepare for COVID-19 patients. It’s likely that elective surgeries and other revenue generating activities will remain affected through the first quarter of 2021. These organizations are now tasked with incorporating solutions that will not only enable them to deliver more effective care but do so in a way that is efficient and budget-friendly.

Thankfully, new advancements in information technology are providing some relief from both a security and operations standpoint. New industry partnerships and developments mean that an increasing number of solutions offer multiple benefits, such as the ability to not only locate and secure devices, but also use their insights to streamline operations and bolster patient care. Whether it’s assessing the availability of ventilators in a frontline hospital or creating a staffing model based on demonstrable productivity, it’s these types of malleable solutions that will help organizations to remain nimble and functional while endeavoring to keep costs low.

KEYWORDS: cyber security healthcare security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jonathan langer 1

Jonathan Langer is CEO and cofounder of Medigate. He leads the vision and strategic direction for the company. He brings nearly two decades of cybersecurity experience to Medigate. Formerly a leader in the Israeli Defense Intelligence Corps, Jonathan commanded a team of technical analysts focused on the research of cyber-related domains.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    Four healthcare security lessons learned during the initial COVID-19 surge

    See More
  • biometrics facial recognition

    AI and biometrics in 2021: Predictions, trends, and insights for what might lie ahead

    See More
  • Privacy

    Privacy in 2020 and what to expect for the year ahead

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing