Navigating Healthcare through Today’s Cybersecurity Landscape

By Colin Konschak, CEO, Divurgent
Shane Danaher, COO, Divurgent
Gavin Tong, Associate Managing Partner, Gevity


Nearly every day we hear on the news and in social media about some type of cybersecurity issue. Terms once arcane to the public—malware, viruses, hacking, computer breaches, ransomware, to name a few—are now understood on some level by most everyone who uses a computer, whatever their line of work. However, for leaders responsible for providing effective cybersecurity in every business sector, general awareness is not nearly enough. They need to appreciate the level of potential threat and its implications not only for their organizations but for the future and perhaps even the lives of everyone their organization’s touch.

These days, IT security professionals are not facing small-time hackers probing for a hole in a firewall to commit a prank or steal a few passwords or account numbers. In the cybersecurity landscape of today, they are up against highly skilled professionals that include criminals, terrorists, and spies, often with significant funding from criminal syndicates and even governments. The cybersecurity environment of today is no longer about hacking—it is about warfare.

On March 15, 2018, the United States announced it would impose long-delayed sanctions on Russian individuals and entities for cyber-meddling in the U.S. 2016 elections, along with other major cyberattacks. During that announcement a startling new disclosure was made: Russians had been caught recently attempting to penetrate portions of the U.S. energy grid. While it is not clear how widespread the attempt was, it shows how seriously we need to take cybersecurity. Major shutdowns in the U.S. energy grid perpetrated with the help of a hostile country would be an unprecedented act of war and have the potential to be deadlier than any other wartime act or terrorist action the world has ever seen.

Download the full white paper – Navigating Healthcare Through Today’s Cybersecurity Landscape.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.