14.3.22

True or false? How to spot - and stop – fake news?

 


By Tony Anscombe   

How can you tell fact from fiction and avoid falling for and s^reading falsehoods about the war in Ukraine

The Russian invasion of Ukraine has led to a torrent of fake news, misinformation and disinformation being spread on social media. The fabricated, manipulated and otherwise false and misleading content and narratives reach a global audience and disseminate potentially dangerous falsehoods about the very real horrors of the war.

The baseless claims range from images, social media posts and entire news stories about celebrities supposedly fighting in the war to old and unrelated footage that purports to pertain to the conflict, all the way to images “proving” that the war itself is a hoax.

How can you tell fact from fiction and ensure you don’t, albeit inadvertently, disseminate fake news about the war?

Watch the video to learn:

·                What are some of the many misleading news stories and falsehoods that are related to the war and circulate on social media?

·                What kinds of narratives do these fabrications push?

·                How can you recognize misleading information when you see it?

·                When can a healthy dose of scepticism about what you read or watch, especially on social media, help?

·                What to do if you’re in doubt about the veracity of an image or news article?

·                How can you ultimately help curb the spread of fake news? 

Full article:

https://www.welivesecurity.com/2022/03/10/true-false-spot-stop-fake-news/?utm_source=feedburner&utm_medium=email

 

 

Securing healthcare: an IT health check on the state of the sector

 

No sector or organisation is immune to rapidly escalating threats, but when it comes to healthcare, the stakes couldn’t be higher.




By Phil Muncaster

Even prior to Russia’s invasion of Ukraine, there was considerable fear that military escalation would bleed (further) into cyberspace and be followed by a rash of impactful digital assaults with international implications. Organizations worldwide have, therefore, been urged to batten down the cybersecurity hatches and prepare for and respond to highly disruptive cyberattacks, whether intentional or accidental.

One sector where the stakes couldn’t be higher is healthcare. Digital threats facing the sector and, indeed, the critical infrastructure as a whole have been escalating for years, and the Russian invasion of Ukraine has further increased the threat level. In response, the US Department of Health and Human Services, for example, has issued an alert for the sector, singling out HermeticWiper, a new data wiper discovered by ESET researchers, as an example of an acute risk.

Obviously, hospitals and other healthcare providers in Europe should also be aware of the risks, having been an increasingly popular target for bad actors in recent years. EU cybersecurity agency ENISA reported a few months ago that attacks on the sector rose by almost 50% year-on-year in 2020.

There’s far more than just money at stake: a 2019 study claimed that even data breaches can increase the 30-day mortality rate for heart attack victims. Indeed, while a now-infamous ransomware incident in Germany is not thought to have directly caused the death of a patient, it was one of the potent harbingers of the potential real-world impact of virtual attacks, when life-saving systems are taken offline.

As European healthcare organizations (HCOs) continue to digitalize in response to the pressures of COVID-19, an increasingly remote workforce and an ageing population, these risks will only grow. But by building cyber-resilience through improved IT hygiene and other best practices, and enhancing incident detection and response, there is a way forward for the sector.

Why healthcare is exposed to cyberattacks

The healthcare sector represents a major segment of critical national infrastructure (CNI) across Europe. According to the most recent estimates it employs nearly 15 million people, or 7% of the working population. Healthcare is also unique in the breadth of challenges it faces, making it arguably more exposed to cyber-threats than other sectors. These include:;


·          IT skills shortages, which are industry wide, but HCOs often can’t compete with the higher salaries offered in other sectors.

·          COVID-19, which has put unprecedented pressure on staff, including IT security teams.

·          Remote working, which can open HCOs up to risks presented by distracted workers, unsecured endpoints and vulnerable/misconfigured remote access infrastructure.

·          Old IT infrastructure

·          Vast amounts of personal data and a high burden to meet regulatory demands.

·          Tool sprawl, which can overwhelm threat response teams with alerts.

·          Cloud adoption, which may increase the attack surface. Many HCOs don’t have the in-house skills to securely manage and configure these environments and/or misunderstand their shared responsibility for security.

·          Complexity of IT systems adopted over a long period of time.

·          Connected devices, which include many legacy operational technology (OT) devices in hospitals, such as MRI scanners and X-ray machines. With connectivity comes the risk of remote attacks, and many such devices are too mission critical to take offline to patch, or else are past their support deadline.

·          IoT devices, which are increasingly popular for things like dispensing medication and monitoring patients’ vital signs. Many are left unpatched and protected with only their factory default passwords, leaving them exposed to attacks.

·          Professional cybercriminals who increasingly see HCOs as an easy target, as they struggle with high patient numbers from COVID-19. Patient data, which can include highly sensitive information and financial details, is a lucrative commodity on the cybercrime underground. And ransomware is more likely to force a payment as hospitals can’t afford to be offline for long. Research hospitals may also store highly sensitive IP on forthcoming treatments.

Full article:


https://www.welivesecurity.com/2022/03/09/securing-healthcare-it-health-check-state-sector/?utm_source=feedburner&utm_medium=email