The hardest hit companies include those in the pharmaceutical and biotech industry. According to the report, £9.2 billion has been lost through intellectual property (IP) theft, £7.6 billion to industrial espionage and £2.2 billion from extortion.
Cyberterrorism Threats: Is the US Healthcare System Safe?
Department of Defense and military cyber security organizations, such as the Center for Asymmetric Warfare, are beginning to express concern that the ease with which a hospital's internet security can be breached will create an inviting 'soft target' for cyberterrorists. Nearly every domestic emergency scenario requires the seamless response of the local hospital, and the myriad number of organizations that swirl around it. A hospital whose response during a time of crisis is compromised by crippled communications, non-functioning medical equipment or disabled HVAC systems would create an unforeseen chaos...which is the desired outcome of an asymmetric cyber attack.
The ComSec Healthcare "Assurance Option Plan" for the C-suite Executive and Corporate Legal CounselComplementing the existing suite of Cyber TSCM Counterespionage services, the ComSec Healthcare Assurance Option provides corporate counsels and chief executives with a complete preemptive Cyber Technical Surveillance Counter Measures (Cyber TSCM) compliance audit program. ComSec Healthcare's goal is to equip corporate counsels and chief executives with the knowledge and tools required to institute counterespionage compliance plan to preempt potential internal and external illegal eavesdropping and technical security threats. The plan provides a comprehensive evaluation of business practices resulting in corporate espionage vulnerabilities and identifies a strategy to preempt future illegal eavesdropping attempts. The plan also educates and equips C-suite executives with valuable information on emerging corporate threats and new spying devices, as well as existing and evolving eavesdropping techniques. Ultimately, the plan equips corporate counsels and chief executives with the knowledge and information needed to protect their valuable corporate proprietary, competition sensitive and trade secret information,