Identity Threat Defense: Protect the Latest Perimeter Exploited by Cybercriminals
A Navigator whitepaper by Proofpoint
Threat actors are increasingly launching identity-based attacks to masquerade as legitimate users and target valuable healthcare IT resources. Many are going undetected until it is too late and the damage has already been done.
Introduction
Identity is not only the new perimeter to protect, but it is also becoming the new vulnerability that threat actors exploit to gain access to healthcare IT systems. Historically, security focused on blocking threat actors using technologies such as identity and access management (IAM) tools that provide single sign-on, multifactor authentication, and role-based access. Fast-forward to today. Cybercriminals are using sophisticated social engineering, phishing, smishing, and other exploits to steal credentials, which makes adopting identity threat defense (ITD) technology an imperative to make it harder for cybercriminals every step of the way should they breach the identity perimeter.
- Related Resources & News
- Health-ISAC Hacking Healthcare 10-15-2024
- Health-ISAC Welcomes Booz Allen Hamilton to the Ambassador Program
- Health-ISAC Hacking Healthcare 10-9-2024
- Monthly Newsletter – October 2024
- Health ISAC leads effort to transform SBOM information sharing under CISA-facilitated community work
- CyberEdBoard Insights: Phil Englert and Errol Weiss
- Health-ISAC Hacking Healthcare 9-10-2024
- Strengthening Healthcare Cybersecurity: Lessons from Recent Supplier Attacks
- Specialize in Securing Critical Infrastructure
- How AI is transforming cybersecurity, on defense and offense