Go offline with the Player FM app!
Current Trends in Impersonation Attacks and What to Do
Manage episode 478440335 series 3255313
In this interview, we discuss the current state of cybersecurity in health care with a specific focus on impersonation attacks, featuring Ryan Witt, Vice President, Industry Solutions at Proofpoint and Erik Decker, Vice President & Chief Information Security Officer at Intermountain Health.Witt shares many of the learnings from Proofpoint's healthcare customer advisory board where they learn about industry challenges and discuss solutions. He said that attackers particularly seek entry points through IT help desks, which the attackers contact while impersonating some doctor or other staff member. They can learn a lot about the person they're impersonating on the web or from less legitimate sources and answer a lot of the typical questions IT staff ask to validate a caller.Witt recommends looking through the organization chart to look for people that might be low-level and often forgotten, but who have access to sensitive information or systems and might be targetted or impersonated by attackers.Learn more about Proofpoint: https://www.proofpoint.com/usLearn more about Intermountain Health: https://intermountainhealthcare.org/Health IT Community: https://www.healthcareittoday.com/
702 episodes
Manage episode 478440335 series 3255313
In this interview, we discuss the current state of cybersecurity in health care with a specific focus on impersonation attacks, featuring Ryan Witt, Vice President, Industry Solutions at Proofpoint and Erik Decker, Vice President & Chief Information Security Officer at Intermountain Health.Witt shares many of the learnings from Proofpoint's healthcare customer advisory board where they learn about industry challenges and discuss solutions. He said that attackers particularly seek entry points through IT help desks, which the attackers contact while impersonating some doctor or other staff member. They can learn a lot about the person they're impersonating on the web or from less legitimate sources and answer a lot of the typical questions IT staff ask to validate a caller.Witt recommends looking through the organization chart to look for people that might be low-level and often forgotten, but who have access to sensitive information or systems and might be targetted or impersonated by attackers.Learn more about Proofpoint: https://www.proofpoint.com/usLearn more about Intermountain Health: https://intermountainhealthcare.org/Health IT Community: https://www.healthcareittoday.com/
702 episodes
همه قسمت ها
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.