Novosti

Pharmaceutical Industry – One of the Most Common Targets of Cybercriminals

Farma Mala

Farma Velika

According to statistics, cyberattacks on the pharmaceutical industry are becoming increasingly frequent and severe, involving data theft, ransomware (data lockouts), and other forms of cyber threats.

Did you know that a cyberattack on the American pharmaceutical company Cencora in February 2024 led to the exposure of more than ten other pharmaceutical firms that subsequently reported their own cyber incidents?

In just the past few years, pharmaceutical companies have been the target of numerous serious attacks, causing significant financial and reputational damage. Statistics show that attacks on the healthcare sector have increased by over 50% in the past three years, making this industry one of the top targets for cybercriminals. In fact, ransomware incidents in the first three quarters of 2024 have already surpassed the total number of attacks in all of 2023.

Cencora detected unauthorized activity in its systems on February 21 and confirmed that data had been exfiltrated. Although the company stated that the attack had not significantly affected its operations, 11 of Cencora’s partners, including major players such as Bayer, Novartis, and Regeneron, reported their own breaches. These companies issued data breach notifications indicating that the incident was caused by the attack on Cencora, highlighting the interconnected nature of data security in the pharmaceutical industry.

This wave of attacks demonstrates how a single cyber incident can have far-reaching consequences for many organizations and their clients.

In conclusion, protecting data and infrastructure is becoming essential to maintaining security and business continuity.

To defend against these threats, an effective solution is Halcyon anti-ransomware, which detects and blocks attacks before they cause harm. Halcyon offers advanced data protection, continuous analysis, and rapid recovery from attacks, enabling pharmaceutical companies to maintain data security and business operations. Implementing this solution helps reduce risk while ensuring regulatory compliance.

*Source: infosecurity-magazine.com