Web Analytics

December 2024 Cybersecurity Roundup

Healthcare Data Breaches Hit Record High with 170M Americans Affected in 2024

Healthcare providers faced unprecedented cybersecurity challenges in 2024, with data breaches exposing medical and personal information of over 170 million Americans. Small healthcare providers are struggling to meet proposed new federal cybersecurity regulations due to resource constraints, even as they face daily cyber threats. U.S. regulators and lawmakers are planning stricter cybersecurity rules for 2025 to protect hospitals from attacks, though concerns about compliance costs remain high among smaller facilities. 

SSL.com Actionable Insights and Tips: 

With a record 170 million patient records exposed in 2024, the urgent need for stringent data protection practices is underscored, including: 

  • Deploying a method that continuously checks digital health platforms for exploitable flaws and automatically flags urgent issues, reducing the chance of breaches stemming from overlooked vulnerabilities. 
  • Enforcing strict control over administrator permissions on medical systems, limiting the impact of compromised accounts and curtailing the broad access attackers might gain. 
  • Storing and transmitting patient data in an encrypted state, ensuring that any intercepted or exfiltrated information remains indecipherable to unauthorized parties. 

By adopting these proactive steps, healthcare organizations of all sizes can position themselves to meet stricter regulations in 2025 while safeguarding sensitive patient information.

US Treasury Breach by Chinese Hackers Exposes Unclassified Documents

The US Treasury Department disclosed that Chinese state-sponsored hackers breached their systems in December 2024 by exploiting vulnerabilities in BeyondTrust’s remote tech support software, gaining access to “certain unclassified documents.” The attackers stole an authentication key to bypass system defenses and access Treasury workstations, though the compromised BeyondTrust service has since been taken offline. The incident, which is being investigated by the FBI, CISA, and the intelligence community, comes amid a broader Chinese espionage campaign that has already compromised nine US telecoms companies through the hacking group known as Salt Typhoon.

SSL.com Actionable Insights and Tips: 

The recent US Treasury breach demonstrates the critical need for robust authentication mechanisms to safeguard sensitive information from advanced persistent threats. To mitigate such risks, organizations should implement the following targeted security enhancements: 

  • Utilize client certificate authentication to ensure that access to critical systems is granted only to verified users. This method significantly reduces the risk of unauthorized access due to stolen or weak credentials. 
  • Implement strict access control policies that enforce least privilege, ensuring that individuals have access only to the data and systems necessary for their roles. This limits the potential damage in the event of account compromise. 
  • Regularly audit and update access permissions and security measures to address new vulnerabilities and ensure compliance with the latest security standards. 

SSL.com’s Client Authentication Certificates provide a robust layer of security by requiring cryptographic proof of identity, offering a more secure alternative to password-only authentication. These certificates can be seamlessly integrated into Single Sign-On systems, enhancing both security and user convenience.

Enhance Security, Verify Access  

Secure Access

Krispy Kreme Stock Drops 2% Following Cyber Attack 

Krispy Kreme reported a significant IT systems breach discovered on November 29, 2024, which is materially impacting its business operations. The doughnut company’s stock declined 2% as it works with cybersecurity experts to investigate and contain the unauthorized system activity. The company warned that business disruptions are expected to continue until recovery efforts are completed.

SSL.com Actionable Insights and Tips:  

In the wake of Krispy Kreme’s recent cyber attack—which has hampered digital sales and triggered significant recovery costs—organizations must harden their online platforms to prevent similar disruptions. 

  • Implement continuous scanning that uncovers hidden flaws in e-commerce sites, ensuring malicious scripts cannot disrupt orders or capture sensitive customer details. 
  • Encrypt transaction data at every stage, so compromised information remains unreadable to attackers and limits financial damage. 
  • Monitor network traffic flows in real time to block suspicious connections targeting point-of-sale and online ordering systems, preventing extended downtime that leads to lost revenue.

Chinese Hackers Infiltrated US Telcos, Breaching Privacy of Millions

As stated earlier, nine US telecommunications providers were compromised by Chinese state-sponsored hacking group Salt Typhoon, giving attackers broad access to geolocate millions of Americans and record phone calls at will. The hackers specifically targeted the Washington D.C. area, conducting surveillance on approximately 100 individuals’ communications for potential government targets of interest. While major telcos like AT&T and Lumen claim to have removed the attackers, deputy national security adviser Anne Neuberger has called for mandatory cybersecurity practices and new FCC security requirements to prevent future breaches.

SSL.com Actionable Insights and Tips:  

  • The sweeping cybersecurity breach orchestrated by the Salt Typhoon hacking group against US telecommunication providers underscores the critical need for fortified authentication measures and enhanced monitoring: 

    • Segment networks to contain attackers and limit their access, even if they manage to compromise an account. This prevents broad, unrestricted access across an organization’s infrastructure. 
    • Enhance monitoring of network traffic and system activities to quickly detect and respond to unusual patterns that could indicate an intrusion. Continuous surveillance is key to catching breaches early. 
    • Regularly review and update security protocols and infrastructure based on the latest threat intelligence and best practices to stay ahead of potential vulnerabilities. 

    SSL.com’s Client Authentication certificates provide a powerful tool in the arsenal against cyber espionage by ensuring that only authenticated users can access critical systems.

Secure Your Network, Protect Your Data

Implement Now

SSL.com Announcements

SSL.com to Deprecate Domain Contact-Based Email Domain Control Validation on December 2, 2024

Starting December 2, 2024, SSL.com will discontinue the WHOIS-based email DCV method for SSL/TLS certificates due to security vulnerabilities. Researchers revealed flaws in the WHOIS system that allowed potential issuance of counterfeit certificates. Check out our dedicated article for more information. 

 

New Features of SSL.com’s eSigner CKA: Simplified and Secure Document Signing

SSL.com’s eSigner Cloud Key Adapter (CKA) can now be used to apply digital signatures for Microsoft Office 365 files and PDFs, acting as a virtual USB token to simplify the signing process. By seamlessly loading digital certificates into the Windows certificate store, users can sign documents in Microsoft programs or Adobe Acrobat Reader with ease. This cost-effective, user-friendly solution enhances security, compliance, and efficiency for handling sensitive information. 

Contact sales@ssl.com for more information on document signing with eSigner CKA.

We’d love your feedback

Take our survey and let us know your thoughts on your recent purchase.