Identity Threat Defense: Protect the Latest Perimeter Exploited by Cybercriminals
A Navigator whitepaper by Proofpoint
Threat actors are increasingly launching identity-based attacks to masquerade as legitimate users and target valuable healthcare IT resources. Many are going undetected until it is too late and the damage has already been done.
Introduction
Identity is not only the new perimeter to protect, but it is also becoming the new vulnerability that threat actors exploit to gain access to healthcare IT systems. Historically, security focused on blocking threat actors using technologies such as identity and access management (IAM) tools that provide single sign-on, multifactor authentication, and role-based access. Fast-forward to today. Cybercriminals are using sophisticated social engineering, phishing, smishing, and other exploits to steal credentials, which makes adopting identity threat defense (ITD) technology an imperative to make it harder for cybercriminals every step of the way should they breach the identity perimeter.
- Related Resources & News
- Healthcare Heartbeat 2024 Q4
- Health-ISAC Hacking Healthcare 2-19-2025
- Podcast: Reflecting on the Change Healthcare cyberattack
- Senate Confirms Trump Pick RFK Jr. to Lead HHS
- The Alarming Backdoor Hiding in 2 Chinese Patient Monitors
- Health-ISAC 2025 Health Sector Cyber Threat Landscape
- How Health Systems Manage Security in the Cloud
- Change Healthcare Attack a Wake-up Call for the Industry
- Five High-Impact Cyberattacks Healthcare Industry Should Avoid in 2025
- Health-ISAC Hacking Healthcare 2-11-2025