Stop Them: Combating Identity Attacks on Your Health System

Safeguarding health systems against cyberattacks is a round-the-clock responsibility. 75% of all detections are malware-free activities and involve identity techniques, as analyzed by our CrowdStrike Overwatch team. What this means is most adversaries are not “breaking in” but are “logging in” oftentimes without being detected by stealing credentials and bypassing unmanaged endpoints to execute an attack.

Listen to this on-demand session where CrowdStrike healthcare executive strategists, Todd Felker and Wael Younan, discuss ways to prevent your health system from identity-related attacks. Together, they explore how cross-domain visibility and enforcement can enable security teams to detect lateral movement, gain comprehensive insight into attack paths, and identify malicious activity.

Key takeaways:

  • How adversaries are using identity attacks and their impact to healthcare
  • Use of Remote Monitoring and Management (RMM) tools and social engineering tactics
  • Understanding of Access Brokers and their involvement in identity attacks
  • Key solutions to identify sophisticated adversary access methods to help prevent and protect against them

Tech Hub

  • OS icon
  • deployment icon
  • installation icon

For technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Hub.

Visit Tech Hub