Identity Threat Defense: Protect the Latest Perimeter Exploited by Cybercriminals
A Navigator whitepaper by Proofpoint
Threat actors are increasingly launching identity-based attacks to masquerade as legitimate users and target valuable healthcare IT resources. Many are going undetected until it is too late and the damage has already been done.
Introduction
Identity is not only the new perimeter to protect, but it is also becoming the new vulnerability that threat actors exploit to gain access to healthcare IT systems. Historically, security focused on blocking threat actors using technologies such as identity and access management (IAM) tools that provide single sign-on, multifactor authentication, and role-based access. Fast-forward to today. Cybercriminals are using sophisticated social engineering, phishing, smishing, and other exploits to steal credentials, which makes adopting identity threat defense (ITD) technology an imperative to make it harder for cybercriminals every step of the way should they breach the identity perimeter.
- Related Resources & News
- Potential Terror Threat Targeted at Health Sector – AHA & Health-ISAC Joint Threat Bulletin
- New Cybersecurity Policies Could Protect Patient Health Data
- CyberWire Podcast: PHP flaw sparks global attack wave
- Health-ISAC Hacking Healthcare 3-14-2025
- HSCC Aiming to Identify Healthcare Workflow Chokepoints
- New Healthcare Security Benchmark Highlights Key Investment Priorities and Risks
- Are Efforts to Help Secure Rural Hospitals Doing Any Good?
- CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts
- 2024 Health-ISAC Discussion Based Exercise Series After-Action Report
- Cobalt Strike takedown effort cuts cracked versions by 80%