Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Healthcare. Show all posts

Tribal Health Clinics in California Report Patient Data Exposure

 


Patients receiving care at several tribal healthcare clinics in California have been warned that a cyber incident led to the exposure of both personal identification details and private medical information. The clinics are operated by a regional health organization that runs multiple facilities across the Sierra Foothills and primarily serves American Indian communities in that area.

A ransomware group known as Rhysida has publicly claimed responsibility for a cyberattack that took place in November 2025 and affected the MACT Health Board. The organization manages several clinics in the Sierra Foothills region of California that provide healthcare services to Indigenous populations living in nearby communities.

In January, the MACT Health Board informed an unspecified number of patients that their information had been involved in a data breach. The organization stated that the compromised data included several categories of sensitive personal information. This exposed data may include patients’ full names and government-issued Social Security numbers. In addition to identity information, highly confidential medical details were affected. These medical records can include information about treating doctors, medical diagnoses, insurance coverage details, prescribed medications, laboratory and diagnostic test results, stored medical images, and documentation related to ongoing care and treatment.

The cyber incident caused operational disruptions across MACT clinic systems starting on November 20, 2025. During this period, essential digital services became unavailable, including phone communication systems, platforms used to process prescription requests, and scheduling tools used to manage patient appointments. Telephone services were brought back online by December 1. However, as of January 22, some specialized imaging-related services were still not functioning normally, indicating that certain technical systems had not yet fully recovered.

Rhysida later added the MACT Health Board to its online data leak platform and demanded payment in cryptocurrency. The amount requested was eight units of digital currency, which was valued at approximately six hundred sixty-two thousand dollars at the time the demand was reported. To support its claim of responsibility, the group released sample files online, stating that the materials were taken from MACT’s systems. The files shared publicly reportedly included scans of passports and other internal documents.

The MACT Health Board has not confirmed that Rhysida’s claims are accurate. There is also no independent verification that the files published by the group genuinely originated from MACT’s internal systems. At this time, it remains unclear how many individuals received breach notifications, what method was used by the attackers to access MACT’s network, or whether any ransom payment was made. The organization declined to provide further information when questioned.

In its written notification to affected individuals, MACT stated that it experienced an incident that disrupted its information technology operations. The organization reported that an internal investigation found that unauthorized access occurred to certain files stored on its systems during a defined time window between November 12 and November 20, 2025.

The health organization is offering eligible individuals complimentary identity monitoring services. These services are intended to help patients detect possible misuse of personal or financial information following the exposure of sensitive records.

Rhysida is a cybercriminal group that first became active in public reporting in May 2023. The group deploys ransomware designed to both extract sensitive data from victim organizations and prevent access to internal systems by encrypting files. After carrying out an attack, the group demands payment in exchange for deleting stolen data and providing decryption tools that allow victims to regain access to locked systems. Rhysida operates under a ransomware-as-a-service model, in which external partners pay to use its malware and technical infrastructure to carry out attacks and collect ransom payments.

The group has claimed responsibility for more than one hundred confirmed ransomware incidents, along with additional claims that have not been publicly acknowledged by affected organizations. On average, the group’s ransom demands amount to several hundred thousand dollars per incident.

A significant portion of Rhysida’s confirmed attacks have targeted hospitals, clinics, and other healthcare providers. These healthcare-related incidents have resulted in the exposure of millions of sensitive records. Past cases linked to the group include attacks on healthcare organizations in multiple U.S. states, with ransom demands ranging from over one million dollars to several million dollars. In at least one case, the group claimed to have sold stolen data after a breach.

Researchers tracking cybersecurity incidents have recorded more than one hundred confirmed ransomware attacks on hospitals, clinics, and other healthcare providers across the United States in 2025 alone. These attacks collectively led to the exposure of nearly nine million patient records. In a separate incident reported during the same week, another healthcare organization confirmed a 2025 breach that was claimed by a different ransomware group, which demanded a six-figure ransom payment.

Ransomware attacks against healthcare organizations often involve both data theft and system disruption. Such incidents can disable critical medical systems, interfere with patient care, and create risks to patient safety and privacy. When hospitals and clinics lose access to digital systems, staff may be forced to rely on manual processes, delay or cancel appointments, and redirect patients to other facilities until systems are restored. These disruptions can increase operational strain and place patients and healthcare workers at heightened risk.

The MACT Health Board is named after the five California counties it serves: Mariposa, Amador, Alpine, Calaveras, and Tuolumne. The organization operates approximately a dozen healthcare facilities that primarily serve American Indian communities in the region. These clinics provide a range of services, including general medical care, dental treatment, behavioral health support, vision and eye care, and chiropractic services.


Conduent Healthcare Data Breach Exposes 10.5 Million Patient Records in Massive 2025 Cyber Incident

 

In what may become the largest healthcare breach of 2025, Conduent Business Solutions LLC disclosed a cyberattack that compromised the data of over 10.5 million patients. The breach, first discovered in January, affected major clients including Blue Cross Blue Shield of Montana and Humana, among others. Although the incident has not yet appeared on the U.S. Department of Health and Human Services’ HIPAA breach reporting website, Conduent confirmed the scale of the exposure in filings with federal regulators. 

The company reported to the U.S. Securities and Exchange Commission in April that a “threat actor” gained unauthorized access to a portion of its network on January 13. The breach caused operational disruptions for several days, though systems were reportedly restored quickly. Conduent said the attack led to data exfiltration involving files connected to a limited number of its clients. Upon further forensic analysis, cybersecurity experts confirmed that these files contained sensitive personal and health information of millions of individuals. 

Affected data included patient names, treatment details, insurance information, and billing records. The company’s notification letters sent to Humana and Blue Cross customers revealed that the breach stemmed from Conduent’s third-party mailroom and printing services unit. Despite the massive scale, Conduent maintains that there is no evidence the stolen data has appeared on the dark web. 

Montana regulators recently launched an investigation into the breach, questioning why Blue Cross Blue Shield of Montana took nearly ten months to notify affected individuals. Conduent, which provides business and government support services across 22 countries, reported approximately $25 million in direct response costs related to the incident during the second quarter of 2024. The company also confirmed that it holds cyber insurance coverage and has notified federal law enforcement. 

The Conduent breach underscores the growing risk of third-party vendor incidents in the healthcare sector. Experts note that even ancillary service providers like mailroom or billing vendors handle vast amounts of protected health information, making them prime targets for cybercriminals. Regulatory attorney Rachel Rose emphasized that all forms of protected health information (PHI)—digital or paper—fall under HIPAA’s privacy and security rules, requiring strict administrative and technical safeguards. 

Security consultant Wendell Bobst noted that healthcare organizations must improve vendor risk management programs by implementing continuous monitoring and stronger contractual protections. He recommended requiring certifications like HITRUST or FedRAMP for high-risk vendors and enforcing audit rights and breach response obligations. 

The incident follows last year’s record-breaking Change Healthcare ransomware attack, which exposed data from 193 million patients. While smaller in comparison, Conduent’s 10.5 million affected individuals highlight how interconnected the healthcare ecosystem has become—and how each vendor link in that chain poses a potential cybersecurity risk. As experts warn, healthcare organizations must tighten vendor oversight, ensure data minimization practices, and develop robust incident response playbooks to prevent the next large-scale PHI breach.

Healthcare, Banking and Industry in India Struggle Amid Rising Cyber Attacks

 


The Indian economy today stands at a crossroads of a profound digital transformation, in which technology has seamlessly woven its way into the fabric of everyday life, in both cities and remote villages. Smartphones and internet connectivity are transforming the way people live, work and transact around the country.

UPI powered digital banking, e-commerce, and the widespread shift toward remote work have all contributed to the rapid evolution of the country into a digital first economy. However, behind the impressive progress made in the past few years, there is a darker reality: cyberattacks that threaten to undermine the very foundations of this transformation. In the healthcare, banking, and industrial sectors, as digital tools become increasingly commonplace, they are also facing unprecedented security challenges. 

As a consequence, the healthcare industry, as well as its associated industries, has emerged as one of the most vulnerable frontlines in the world, with numerous high-profile cyber incidents demonstrating how a cyber incident can threaten the safety of patients, disrupt crucial services, and undermine public trust. 

A chief information security officer (CISO) is responsible for safeguarding critical systems and sensitive data, even though they must deal with legacy infrastructure, shortages of workforce, and rapidly evolving threats all while struggling to protect their critical systems and sensitive data. 

Despite the benefits of artificial intelligence as a means of alleviating operational burdens, it also brings with it complex security demands, which makes cyber leaders a priority to ensure resilience in the future. In a rapidly emerging world filled with increasing risks, cybersecurity is no longer an optional skill but rather a necessity—a crucial tool for professionals, organisations, and citizens alike as India advances in its digital revolution. 

India's critical sectors are experiencing a surge in cyberattacks, with an average of 4.1 million attacks occurring in the financial services industry, insurance industry, banking industry, and healthcare industry between January and June 2025. In spite of the fact that India remained the primary target, countries such as the United States, France, Singapore and Germany all contributed to this wave of malicious activities. 

A wide range of vulnerabilities, ranging from system flaws to employee accounts, were exploited, testing the resilience of digital infrastructure. Insurers, which depend heavily on consumer data, have experienced threefold increases in the number of vulnerabilities exploited, as well as 350 per cent increases in distributed denial-of-service (DDoS) attacks. 

It has emerged that Application Programming Interfaces (APIs), often overlooked yet central to digital ecosystems, have become a major weak point, with targeted attacks soaring by 126 per cent and DDoS attacks soaring by 3per cent. Even though supply chains and production systems are increasingly vulnerable, the manufacturing and industrial sectors have been hit hard. 

Overall breaches increased by 31 per cent, including a staggering increase of 427 per cent in DDoS attacks, highlighting the need to protect these systems. There was also an increase of 46 per cent in employee-focused attacks and 17 per cent in politically motivated disruptions, and that resulted in increased DDoS activity of 1 per cent during peak operations during the financial year. 

Even though smaller businesses often have limited resources, they have not been spared—attacks against their websites have gone up by 202 per cent, while cloud-based intrusions have increased seventy-fourfold during this period. There has been a surge in attacks on the healthcare sector, which have risen by 247 per cent, posing a grave threat to patient data and life-critical hospital services. 

Despite being viewed as low-hanging fruit for cybercriminals, retail and e-commerce platforms experienced 42 per cent higher DDoS attacks, along with an increase in credential theft and fraudulent card transactions. Cybercrime has the potential to significantly impact national security as well as economic stability in the near future as a result of this massive increase in attacks. 

The cybercrime specialist Professor Triveni Singh, who is also a former IPS officer, said that artificial intelligence and advanced detection systems have prevented more than 4.26 billion attempted breaches worldwide by preventing them from being attempted. 

As India's digital economy accelerates, it requires stronger technologies, skilled professionals, continuous monitoring, and robust policies strengthened by international cooperation as well as stronger technology. 

A major component of the Indian cyber landscape has emerged as a complex and vulnerable healthcare sector. Hospitals and medical groups operate in high-stakes environments, which can be very difficult for anyone to deal with. 

Even a few minutes of system downtime could mean the difference between life and death for the patient. In light of this, ransomware groups have targeted them as prime targets, exploiting the urgency of care to extract money from patients. 

A growing number of medical Internet of Things (MIoT) devices, including heart monitors, infusion pumps, and many other devices that interact with the internet, has led to a widening of attack surfaces in recent years. In spite of the promises of these technologies, their historically weak security makes them more appealing to threat actors that are powered by artificial intelligence, raising the possibility of patient data being stolen or even being interfered with directly. 

As telehealth has increased in popularity, the risks have increased further, as both patients and providers are at risk of being attacked via the internet, which can harvest sensitive information from patients. It is important to note that India's healthcare sector continues to struggle with legacy systems, financial constraints, and a shortage of cybersecurity experts, which leaves small and mid-sized institutions particularly vulnerable, despite the country's progress in digitisation. 

Despite the fragmentation of national regulations, frameworks like the Information Technology Act, SPDI Rules, and the Digital Personal Data Protection Act have only limited coverage, and there are still many gaps to fill in systemic coverage, according to industry bodies such as the Data Security Council of India and the Healthcare Information and Management Systems Society (HIMSS). 

One real-world example of this problem can be found in August last year, when an artificial intelligence-driven ransomware attack crippled a healthcare provider specialising in artificial intelligence, making the urgency of the issue clear. The malware was triggered by a phishing email, and after a few minutes, it had encrypted electronic patient records, billing systems, and admissions, forcing surgeries to be delayed and critical procedures rerouted. 

However, even though the organisation did not pay the ransom and instead cooperated with law enforcement, there was a severe fallout from the incident: patient trust was shattered, data was compromised, and the incident highlighted India's healthcare cybersecurity posture as being extremely fragile. 

It is becoming increasingly apparent that cyber threats are evolving at an alarming rate, posing an increasing threat to individuals as well as organisations. In the era where millions of devices are connected to the internet, attackers have access to a larger pool of entry points, so they can exploit weaknesses across both personal and corporate networks more easily. 

A report from Seqrite, which tracked over eight million endpoints, revealed that millions of malware infections were detected in just a matter of seconds, demonstrating how large the problem is. It has become increasingly common for cybercriminals to take advantage of the surge in digital services, whether it is small businesses' adoption of online platforms or individuals sharing their personal information on social media. 

For instance, a newly established organisation without adequate security can become a target for ransomware or phishing attacks, while an individual who shares too much information online may be unwittingly vulnerable to identity theft because of it. It has been warned that as technology adoption grows, so will the sophistication of threats, requiring stronger security strategies across every sector. 

The digital expansion of India is undeniably one of the world’s largest markets, but it is also accompanied by many vulnerabilities, making awareness and resilience crucial for long-term growth. India is speeding ahead on the digital journey, but it must maintain a balance between innovation and resiliency to achieve long-term growth. 

No sector is immune to the impact of cyberattacks, as evidenced by the increasingly widespread attacks affecting industries such as healthcare, banking, and small businesses, all of which are rising at an alarming rate. 

The price of inaction will only increase over time. It is still important to keep in mind that technology is only one factor of cybersecurity - creating a culture of cyber awareness, strengthening digital hygiene, and hiring skilled talent will prove to be just as important as deploying advanced firewalls and artificial intelligence services. 

For organisations with limited resources, policymakers, regulators, and industry leaders must work in tandem in order to develop a comprehensive framework aimed at enforcing data protection as well as incentivising proactive security measures. In order to effectively combat cybercrime, it is vital that we foster international collaboration. Cybercrime transcends national boundaries, which requires collective intelligence to combat.

Individuals are advised to protect their personal information, to exercise caution online, and to update their digital practices in order to combat the threat at the grassroots level. In addition to protecting India's critical infrastructure, India will also inspire global confidence that it can lead a secure, technology-driven future as long as it combines security with the very foundations of its digital revolution.

2 Doctors in Hong Kong Arrested for Leaking Patient Data


Two doctors at a Hong Kong public hospital were arrested on charges of accessing computers with dishonest or criminal intent, allegedly involved in a data leak. According to police superintendent Wong Yick-lung, a 57-year-old consultant and a 35-year-old associate consultant from Tseung Kwan O Hospital were arrested in Ho Man Tin and Fo Tan, respectively.

Officers seized computers and other records; the pair is in police custody. On Sunday, the hospital stated the alleged leak, but the exact details were not disclosed at that time. The hospital’s chief executive, Dr. Kenny Yuen Ka-ye, said that the data of a few patients had been given to a third party. An internal complaint a month ago prompted the investigation. 

According to Dr Ka-ye, the hospital found at least one doctor who accessed the patient’s personal data without permission. The hospital believes the documents containing information about other patients might have also been exposed to the third party. Police said experts are working to find out more details concerning the number of patients impacted by the incident.

While the investigation is ongoing, the consultant Dr has given his resignation, while the associate consultant has been suspended. At the time of writing this story, the motivation behind the attack is not known. According to Yuen, every doctor has access to the clinical management system that has patient information, but the use is only permitted under a strict “need-to-know” for research purposes or as part of the medical team taking care of a patient. 

The investigation revealed that the two doctors didn’t fit into either category, which was a violation. According to SCMP’s conversation with a source, the portal reported that the two doctors (both members of the surgery department)  sent details of a female pancreatic cancer patient who died after a surgical operation. 

The pair illegally accessed the info and sent it to the family, asking them to file a complaint against the doctor who did the operation. This was done to show the doctor’s alleged incompetence.

The hospital has sent the case to the Office of the Privacy Commissioner for Personal Data, and has also reported the incident to the police and the Medical Council.

Hospital Notifies victims of a one-year old data breach, personal details stolen

Hospital Notifies victims of a one-year old data breach, personal details stolen

Hospital informs victims about data breach after a year

Wayne Memorial Hospital in the US has informed its 163,440 people about a year old data breach in May 2024 that exposed details such as: names, social security numbers, user IDs, and passwords, financial account numbers, credit and debit card numbers, expiration dates, and CVV codes, medical history, diagnoses, treatments, prescriptions, lab test results and images, health insurance, Medicare, and Medicaid numbers, healthcare provider numbers, state-issued ID numbers, and dates of birth. 

Initially, the hospital informed only 2,500 people about the attack in August 2024. Ransomware group Monti took responsibility for the attack and warned that it would leak the data by July 8, 2024.

Ransom and payment

Wayne Memorial Hospital, however, has not confirmed Monti’s claim. As of now, it is not known if the hospital paid a ransom, what amount Monti demanded, or why the hospital took more than a year to inform victims, or how the threat actors compromised the hospital infrastructure. 

According to the notice sent to victims, “On June 3, 2024, WMH detected a ransomware event, whereby an unauthorized third party gained access to WMH’s network, encrypted some of WMH’s data, and left a ransom note on WMH’s network.” The forensic investigation by WMH found evidence of unauthorized access to a few WMH systems between “May 30, 2024, and June 3, 2024.”

The hospital has offered victims a one-year free credit monitoring and fraud assistance via CyberScout. The deadline to apply is three months from the date of the notice letter.

What is the Monti group?

Monti is a ransomware gang that shares similarities with the Conti group. It was responsible for the first breach in February 2023. The group, however, has been working since June 2022. Monti is infamous for abusing software bugs like Log4Shell. Monti encrypts target systems and steals data as well. This pushes victims to pay ransom money in exchange for deleting stolen data and restoring the systems.

To date, Monti has claimed responsibility for 16 attacks. Out of these, two attacks hit healthcare providers. 

Monti attacks on health care providers

In April 2023, Avezzano Sulmona L’Aquila (Italy) reported a ransomware attack that resulted in large-scale disruption for a month. Monti asked for $3 million ransom for the 500 GB of stolen data. ASL denies payment of the ransom. 

Excelsior Othopedics informed 394,752 people about a June 2024 data compromise

Over 624,000 Impacted in Major Healthcare Data Breach: SSNs, Financial Data, and Identity Theft Risks

 


A massive healthcare data breach has exposed the sensitive information of more than 624,000 individuals, putting Social Security numbers, financial details, and account credentials at risk.

The breach targeted Healthcare Services Group Inc. (HSGI), a Pennsylvania-based company that manages dining, housekeeping, and laundry services for hospitals across 48 U.S. states. According to BleepingComputer, HSGI has begun notifying impacted individuals through official letters.

Hackers infiltrated HSGI’s network in late September 2024, but the intrusion wasn’t discovered until October 7, 2024. An investigation revealed that a wide range of personal data may have been compromised, including:
  • Full names
  • Social Security numbers
  • Driver’s license and state ID numbers
  • Financial account details
  • Login credentials

The type of data exposed varies for each victim. Some may only have had their names leaked, while others also had SSNs and financial data exposed.

If you receive a data breach notification letter from HSGI, it will outline exactly what information of yours was exposed. The company is offering affected individuals free identity theft protection services from Experian, though the coverage period (12 months vs. 24 months) has not been confirmed.

Even though there’s no evidence yet of misuse of stolen data, experts warn that hackers could use the information for phishing attacks, fraud, or identity theft. Victims are urged to:
  • Monitor bank and credit card accounts closely
  • Watch for suspicious emails or texts
  • Avoid clicking unknown links or downloading attachments
  • Use trusted antivirus software on all devices

The healthcare industry has become a prime target for cybercriminals due to the high value of medical and financial records. Analysts believe this will not be the last attack of its kind, as similar breaches have been reported throughout the past year.

While individuals cannot control a company’s cybersecurity, they can take proactive measures once a breach occurs. As experts warn: You may not stop the breach, but you can protect yourself from becoming the next victim of identity fraud.

Cyberattack on New York Business Council Exposes Thousands to Risk



The Business Council of New York State (BCNYS), an influential body representing businesses and professional groups, has confirmed that a recent cyberattack compromised the personal information of more than 47,000 people.

In a report submitted to the Office of the Maine Attorney General, the Council disclosed that attackers accessed a wide range of sensitive data. The files included basic identifiers such as names and dates of birth, along with highly confidential records like Social Security numbers, state-issued IDs, and taxpayer identification numbers. Financial data was also exposed, including bank account details, payment card numbers, PINs, expiration dates, and even electronic signatures.

What makes this breach particularly concerning is the theft of medical records. The stolen information included healthcare providers’ names, diagnostic details, treatment histories, prescription data, and insurance documents, material that is often harder to replace or protect than financial information.

Investigators believe the attack took place in late February 2025, but the Council only uncovered it months later in August. The delay meant that for several months, criminals could have had access to the stolen records without detection. So far, officials have not confirmed any cases of identity theft linked to this incident. However, security experts note that breaches of this scale often have long-term consequences, as stolen data may circulate for years before being used.


Why it matters

The mix of financial, medical, and personal details gives criminals a powerful toolkit. With such data, they can open fraudulent credit lines, make unauthorized purchases, or submit false tax returns. Medical information raises another layer of danger — allowing fraudsters to access health services or prescriptions under someone else’s identity, potentially leaving victims to untangle costly disputes with insurers and providers.


Protective steps for those affected

1. Secure credit and banking accounts: Victims are advised to place fraud alerts or credit freezes with major credit bureaus, closely watch account activity, and notify banks of potential exposure.

2. Strengthen account security: Change passwords, use multifactor authentication wherever possible, and avoid reusing old login details.

3. Guard against tax fraud: Apply for an IRS Identity Protection PIN, which blocks others from filing tax returns in your name.

4. Monitor medical use: Review insurance and healthcare statements for unfamiliar claims or treatments, and flag suspicious activity immediately.


While BCNYS has offered free credit monitoring to those affected, the larger lesson extends far beyond this single breach. For organizations, it is a reminder that delayed detection amplifies the damage of any cyberattack. For individuals, it shows how deeply personal data, financial and medical can be intertwined in ways that make recovery especially difficult.

Cybersecurity experts warn that these breaches are no longer isolated events but part of a larger pattern where institutions become targets precisely because they store such valuable data. The question is no longer if data will be stolen, but how quickly victims can respond and how effectively organizations can limit the fallout.



Don’t Wait for a Cyberattack to Find Out You’re Not Ready

 



In today’s digital age, any company that uses the internet is at risk of being targeted by cybercriminals. While outdated software and unpatched systems are often blamed for these risks, a less obvious but equally serious problem is the false belief that buying security tools automatically means a company is well-protected.

Many businesses think they’re cyber resilient simply because they’ve invested in security tools or passed an audit. But overconfidence without real testing can create blind spots leaving companies exposed to attacks that could lead to data loss, financial damage, or reputational harm.


Confidence vs. Reality

Recent years have seen a rise in cyberattacks, especially in sectors like finance, healthcare, and manufacturing. These industries are prime targets because they handle valuable and sensitive information. A report by Bain & Company found that while 43% of business leaders felt confident in their cybersecurity efforts, only 24% were actually following industry best practices.

Why this mismatch? It often comes down to outdated evaluation methods, overreliance on tools, poor communication between technical teams and leadership, and a natural human tendency to feel “safe” once something has been checked off a list.


Warning Signs of Overconfidence

Here are five red flags that a company may be overestimating its cybersecurity readiness:

1. No Real-World Testing - If an organization has never run a simulated attack, like a red team exercise or breach test, it may not know where its weaknesses are.

2. Rare or Outdated Risk Reviews - Cyber risks change constantly. Companies that rely on yearly or outdated assessments may be missing new threats.

3. Mistaking Compliance for Security - Following regulations is important, but it doesn’t mean a system is secure. Compliance is only a baseline.

4. No Stress Test for Recovery Plans - Businesses need to test their recovery strategies under pressure. If these plans haven’t been tested, they may fail when it matters most.

5. Thinking Cybersecurity Is Only an IT Job - True resilience requires coordination across departments. If only IT is involved, the response to an incident will likely be incomplete.


Building Stronger Defenses

To improve cyber resilience, companies should:

• Test and monitor security systems regularly, not just once.

• Train employees to recognize threats like phishing, which remains a common cause of breaches.

• Link cybersecurity to overall business planning, so that recovery strategies are realistic and fast.

• Work with outside experts when needed to identify hidden vulnerabilities and improve defenses.


If a company hasn’t tested its cybersecurity defenses in the past six months, it likely isn’t as prepared as it thinks. Confidence alone won’t stop a cyberattack but real testing and ongoing improvement can.