Maximum Cruising Pleasure: New Azimut 68

Edited by Shereen Shabnam

Azimut 68, the latest model in the Azimut Yachts Flybridge collection, is a yacht designed around the owner. It offers a choice of three interiors layouts for different onboard lifestyles. proposing three different interior layouts designed for different lifestyles on board. Thanks to the combination of carbon fiber and optimized hull that allows reduced consumption, sustainability is also a significant aspect.

The new model of the Flybridge collection is designed in collaboration with Alberto Mancini for the exteriors and Achille Salvagni for the interiors. Thanks to the shipyard’s in-depth knowledge of the market and owners from all over the world, Azimut Yachts designed a 21 meters yacht that adapts to the desires of contemporary owners who increasingly insists on bespoke solutions even for smaller boats. 

The interiors were designed to produce maximum stylistic harmony, in which every single detail, from the ambience as a whole down to the smallest furnishing accessories is contrived by the same hand to arrive at an absolute project in the truest sense of the term.

An important feature of the interiors is the spaciousness of the night area, configured to offer four cabins and three bathrooms of decidedly generous dimensions (high ceilings, roomy wardrobes and long beds). The fourth cabin even has L-shaped beds and capacious wardrobes, significantly increasing the level of comfort.

The first layout has an elegant lounge at the entrance to the Main Deck, with a galley off to one side, closed off by a solution that combines ribbing and plexiglass. This “Lanterna” configuration gives the galley privacy but allows light to flow throughout the space, creating a large and light-filled ambience.

For owners seeking a more convivial layout, the version with an open-style galley is ideal. Eliminating the sliding door opens up the view astern, as the galley connects directly to the dining area which, as in the Lanterna layout, can also be turned into a second lounge area.

The galley is in the stern to facilitate direct flow between interior and exterior, while the living area is set apart towards the bow. The option with the galley near the entrance is perfect for serving both exterior and interior dining areas, encouraging conviviality. 

The stand-out feature in the 68’s interiors, lastly, is the refined owner’s suite, characterised by a natural and unaffected sense of luxury and an atmosphere of wellbeing that is close to the modern concept of wellness. The part of the bathroom with the sink is open-style in fact, in direct communication with the suite and reminiscent of the serenely relaxed atmosphere of a refined modern spa.

The suite has a large bed designed to look like it is suspended in mid-air, like the drawer units, and a wardrobe with floor-to-ceiling doors. Here too, Salvagni has preferred materials and lines that exude natural elegance, not least thanks to the muted, matt colours.

Whatever the configuration chosen, there will always be an additional lounge setting over and above the conventional sofa area: a multi-purpose area in the middle of the Main Deck that can serve as a space for lunch, for conversation or reading, or even a small screening room.

Exterior designer Alberto Mancini works surfaces using a modern language, also adopted in car design to guide the evolution of the Flybridge collection and point up the distinctive features of Azimut Yachts with ever sharper cleanness of line.

Azimut 68 features various solutions identified by Azimut Yachts’ Innovation Lab as part of its ECS – Enhanced Cruising Solutions programme, such as the Joystick Driving System, the Garmin Control Monitoring System, and active trim control.

Extensive use of carbon fiber in the new 68’s topside (superstructure, hard top and part of the deck) lowers the center of gravity, for impeccable cruising considering the generous spaces offered by the yacht.

The high efficiency hull is paired with the ideal propulsion system, comprising two Volvo IPS 1350 engines delivering a top speed of 32 knots. The new Azimut 68 is therefore light, silent and easy to manoeuvre.

This project is a new step forward in Azimut Yachts’ drive to build lighter vessels with more space onboard, but without making any sacrifices in terms of their excellent consumption levels, stability and manoeuvrability.

#Azimut68 #Azimut  #Yacht #globaltrendmonitor #VIPmarineLife #PrivateBoat  #life_on_water #travel #explorer #Shereen_Shabnam #mydubai #JournalistUAE #megayachts

Traditional culinary experiences: Turkish Village Restaurant

Shereen Shabnam

Recently we ventured to the Award-winning Turkish Village Restaurant to sample their diverse range of unique authentic culinary experiences that included especially curated dishes blending authentic Turkish ingredients and flavors, complete with the much-loved art of Turkish hospitality.

We discovered that the restaurant offers so much more than just good food as we entered the Jumeirah branch of the restaurant. Starting from a retail experience to a selection of delectable food with seasonal flavours and impeccable presentation, we tried different inspiring food concepts, and each was a fun and social culinary experience best enjoyed in a group.

The Turkish Village Restaurant has a capacity for large events that can accommodate over 500 guests over three levels and can curate menus that can be custom made to suit any corporate or family event. When I visited with family, we opted for the a la carte menu as we wanted to try different dishes and each one was better than the next. My favourite was a metre long ‘pide’ or pastry which came with interesting fillings of meat and cheese fresh from the oven.

More recently we ventured with there with a group of friends and tried the Turkish mangal or barbecue that includes staple starters with meat marinated with spices overnight. We selected tender marinated chicken, succulent lamb, beef, kebabs and sausages and prepared the meal together at grill tables that come equipped with a private charcoal barbeque and a custom-made extractor.

The mangal meal was served with salads, fresh bread out of the oven, sauces, cold starters and water or ayran. The Mangal experience can be enjoyed for lunch and dinner at AED 50/- per person that includes charcoal, water, ayran, salad and cold starters on the table while the chicken and meat can be availed from the in-house butcher starting at AED 110/- per kg to share.

We then ended the meal on a sweet note with traditional Turkish sweets that include kunafa, baklava stuffed with cream and pistachios and the creamiest rice pudding in the city. This was the best Turkish culinary experience we have had in Dubai as it offers an authentic dining experience at par with what we normally find in Istanbul or other parts of Turkey.

Before leaving the restaurant, we stopped at the gourmet grocer named Bakkal (Meaning Grocery store in Turkish) on the ground floor for retail therapy. Bakkal features a diverse range of fresh, dried and frozen goods imported from Turkey every week and is a dream store for party lovers looking to get ready snacks that can be prepared easily for large families and intimate parties.

The three level Turkish Village Restaurant is located strategically in Jumeirah 1 (across La Mer, next to Spinneys and the Jumeirah Grand Mosque). It offers a laid-back memorable and interactive dining experience, within a warm and welcoming ambience and is also a one-stop shop for artisanal Turkish products. We left with bags full of Turkish delights and naturally, I got some extra desserts to enjoy at home later.

#TurkishVillageRestaurant #TurkishFood #Mangal #Bakkal #Braai #FoodReview #GlobalTrendMonitor #mydubai #magazine #uae #media

Luxury Island Getaway: Atmosphere Kanifushi

Shereen Shabnam

Escaping to a secluded Island to escape the pandemic is on the mind of many and we recently discovered the perfect luxury retreat at Atmosphere Kanifushi where private island laid back life meets award winning mouth-watering culinary adventures and spa indulgence.

We arrived at the pristine Kanifushi resort after an exhilarating 35-minute seaplane ride from Malé. welcomed by musicians on the island that is blanketed by dense tropical vegetation and blessed with vibrant, natural coral reefs.

Situated amidst the azure ocean with stand-alone beach and water villas spread along the 2 kilometres long island, we enjoyed impeccable service and elegant living spaces with picture-perfect surrounding ocean and serene sunsets.

At Atmosphere Kanifushi, the convergence of cotton candy clouds in the day, fiery orange skies in the evenings and turquoise waters during boat rides imbed an image that will be forever seared in our memories.

The five-star resort offers an all-inclusive luxury package, an extensive range of restaurants and bars plus a choice of excursions, sunset fishing, snorkelling and discounts on spa treatments and diving. Atmosphere Kanifushi has some of the best diving in the Maldives. The resort is five-star luxury all the way.

Dining at the Atmosphere Kanifushi is a delight as the resort has Maldives first top-quality vegetarian restaurant and a great all-day restaurant offering sumptuous ‘all you can eat’ buffet-style selection of Asian, European, and Maldivian favourites, live cooking stations, theme nights, and grills. Guests can also enjoy Selection of snacks during the day and a la carte fine dining experiences.

Activities at Atmosphere Kanifushi include sunset fishing, boat excursions, water sports with Dive and Sail, complimentary snorkelling equipment for every guest during the stay, snorkelling excursions and much more. There is a fully equipped gym with flood lit tennis and a children’s centre.

The rooms at Atmosphere Kanifushi come with stunning views. The water villas stretch along the crystal-clear lagoon, perfect for a romantic getaway. The outdoor deck comes with comfortable sun loungers and features a wooden ladder leading to the marine life-rich lagoon for a dip in or a swim anytime.

The sunset beach villas offer a secluded sanctuary where one can soak in the pleasures of island living in a private garden complete with lush tropical shrubs, soft sand beneath your feet, and an inviting private pool. There are also over water villas with a pool offering ultimate overwater luxury. The rooms have a luxurious bathroom and world-class amenities designed to indulge all senses.

The Kanifushi Grand one-bedroom villas have sweeping oceanfront views with a fabulous poolside setup, an airy, luxurious bathroom with a deep alfresco bathtub for an indulgent experience.

The two-bedroom sunset family beach bungalows have two interconnected rooms with a combination of indoor and outdoor spaces making it the best private villa in Maldives. With easy access to the kid’s club, sports complex, and the main restaurant, these villas are perfect for experiencing all the activities that the resort offers.

The Kanifushi Residence is a dream family hideaway, complete with a living cum dining room with a pantry, an entertainment room with two bedrooms and an attached nanny’s bedroom. This sprawling residence with extra privacy is ideal for large families, groups who want to share a common space, and multi-generational travellers.

Atmosphere Kanifushi serenades you with white, sandy beaches, swaying palm trees, and lush tropical gardens. We definitely felt the staff were the resorts best asset at Atmosphere Kanifushi as they offer impeccable service for blissful relaxing experiences and by going that extra mile for guest comfort and convenience.

#AtmosphereKanifushi #Kanifushi #Maldives  #visitmaldives #Hotel #Holiday #Destination #Beach #Staycation #travel #Island #tropical #Getaway #globaltrendmonitor #magazine #mydubai #lifestyle

Turkish Mangal Meets South African Braai

Explore traditional BBQ experiences at Turkish Village Restaurant

One of the most socially interactive culinary experiences the world over is having a barbecue with friends and family and this concept is most popular in South Africa, where a ‘Braai’ or barbecue can be a weekly experience.

In Dubai, the best on table barbecue experience comes in the form of the Turkish Mangal at the award-winning Turkish Village Restaurant where chefs use premium meat, authentic Turkish ingredients and flavors and like the South African Braai, the meat is cooked over sizzling hot coals to bring out the best flavours in the meat.

The atmosphere surrounding a Turkish mangal experience and a Braai is one full of enjoyment and common on weekends, birthdays, national holidays, graduations and on any occasion to celebrate with family and friends.

At Turkish Village Restaurant, diners select premium meat cuts and marinated meat from the restaurant’s in-house butcher to enjoy a feast at grill tables that come equipped with a private charcoal barbeque and a custom-made extractor. The choice of meat includes marinated chicken, kebabs, lamb chops, sausages and beef cubes for guests to prepare the meal together with friends and family.

The Mangal or Braai experience is ideal for gatherings during lunch and dinner at AED 50/- per person that includes charcoal, water, ayran, salads and cold starters on the table while the chicken and meat can be availed starting  at AED 110/- per kg to share. The meal is also served with fresh bread out of the oven, a selection of sauces and water or ayran.

Diners can end the meal on a sweet note with traditional Turkish sweets that include kunafa, milk infused tres-leche cakes, baklava stuffed with cream and pistachios as well as the creamiest baked rice pudding in the city.

The three level Turkish Village Restaurant is located strategically in Jumeirah 1 (across La Mer, next to Spinneys and the Jumeirah Grand Mosque), and in Dubai Festival City Mall promenade overlooking the fountains. It offers a laid-back memorable and interactive dining experience, within a warm and welcoming ambience. It is also a one-stop shop for artisanal Turkish products.

For bookings please call +97143449955 or send to reservations@turkishvillagedubai.com

BR 01 CYBER SKULL SAPPHIRE

Bell & Ross sometimes  enjoys abandoning its usual themes of aviation and the military. In 2009, the watchmaker became one of the first to create a skull watch. Since then, the BR 01 Skull family has grown to include ten members which are greatly sought after by collectors.

In 2020, the avant-garde Cyber Skull revisited this iconic series.  Its faceted design represented a leap into the future.  And it was a resounding success.

The latest  Cyber Skull Sapphire  is a completely translucent, full sapphire  version. This technical material fires this icon of the watchmaking world into the realm of transparency and wealth.

NUMEROUS VERSIONS

In 2009,  Bell & Ross became one of the first watchmakers to create a skull watch.  The BR01 Skull includes  a skull and crossbones  in the company’s  iconic “circle in a square” case. It was an immediate success.

Bell & Ross then launched other versions.

– In 2016, the Burning Skull introduced  more volume to the skull surrounded  by flames. This provided the whole with a 3D aspect.

– In 2018, the Laughing Skull incorporated an automaton movement. The jaw moves when winding the crown so that the skull seems to be laughing. Spooky!

– 2020 saw a major break! The new Cyber Skull inaugurated a spectacular black ceramic case with truncated corners and a “pixelated” skull. This avant-garde  design fired this watch into the realm of ultra-modernity. It would go on to enjoy great success.

– In 2021, the Cyber Skull Sapphire  Only Watch  21 adorned the case with sapphire crystal. With its orange-coloured skull, this unique model was sold at the Only Watch  charity auction.  The hammer  finally fell at a price of 220,000 euros, twice its top estimated value. A genuine success!

– The latest Cyber Skull Sapphire  is the “general public” version of this exceptional watch. It reproduces the full sapphire case. However, the faceted skull is transparent on this version. It is a limited version of 10 items. Already a sure value for collectors.

NUMEROUS INSPIRATIONS

The design of this new Cyber Skull Sapphire  breaks  with the other skull watches  in the neo-vintage style. The sharp edges of the case play with the light, with the multiple facets  multiplying the perspectives and reflections.

It draws on several sources of inspiration:

– Avant-garde: it pays homage to the ultra-modern world of informatics and virtual technology. The faceted, pixelated design is a tip of the hat to the digital arts.

– Origami: its angular design is reminiscent of the ancestral

Japanese art of paper folding, transposed into the future.

– Military: the case is shaped like the fuselage of an American F117 stealth bomber. This faceted design allows it to vanish from radar screens. All eyes, however, are on the Cyber Skull Sapphire.

THE TRANSPARENCY   OF SAPPHIRE

The BR 01 Cyber  Skull Sapphire is a UFO of the  watchmaking world. The base is a Cyber Skull, which has nevertheless been developed entirely in colourless sapphire crystal. It plays the transparency card to the full, including in the translucent rubber strap.

The skull and crossbones are captured between two sapphire crystals, so that they appear to be floating in the air.

Initially, the sapphire is a precious block of very hard glass. A material  that is very difficult to shape.  The slightest  error means starting all over again.

THE MOVEMENT

The  BR 01 Cyber Skull Sapphire  combines design  and watchmaking  excellence. This high-end watch boasts a BR-CAL.209 automaton  movement. Specifically developed for the watch, this manual-wind skeleton calibre is almost invisible. It takes the form of the skull. The skeleton  form reveals some of the interesting technical parts, including the cogs, balance and more.

The plate and bridges follow the outline of the skull before extending below the crossbones. The spring balance placed at “twelve o’clock” symbolises the brain in this skull which is very much alive.

Are You Prepared for More OT Threats?

By Rick Peters, CISO Operational Technology, Fortinet

For years, Operational Technology (OT) systems have been working to control everything from factories to transportation networks to utilities. The reality is most citizens don’t think about these systems until there’s a problem. That’s why the the attack against Colonial Pipeline in May 2021 was so startling. The attack on a segment of the enterprise transcended IT and resulted in a temporary but severe disruption of the OT based fuel supplies and led the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) to issue an advisory urging critical infrastructure (CI) asset owners and operators to take on a heightened state of awareness.

Unfortunately, the attack against Colonial Pipeline isn’t the first or last time an adversarial cyberattack on an OT target will make headlines. Malicious cyberattacks are likely to increase given the opportunities for mission impact, social anxiety, and profit that disrupting systems and stealing intellectual property from OT and IT systems represent. If there’s any silver lining to this high-profile attack it’s that it has put a renewed focus on securing critical OT assets.

OT cyber events also have demonstrated the consequence of failing to invest and commit proportionally to a cybersecurity strategy. For years OT system owners relied on the “air gap” that separated OT systems from IT to protect them. But as more and more OT organizations digitally connect OT infrastructure such as supervisory control and data acquisition (SCADA) systems with IT networks, the resulting evaporation of the air gap has dramatically increased the level of risk. Given this situation, it’s not a surprise that in the “2021 State of Operational Technology and Cybersecurity Report” 9 out of 10 OT organizations experienced at least one intrusion in the past year and 63% had three or more intrusions.

To protect cyber physical assets, OT organizations need to commit toa proactive cybersecurity strategy, paying particular attention to visibility, control, and behavior analysis. It’s critical to protect every point of connection to the outside world to proactively safeguard OT.

OT Is No Longer a Niche Exploit

In the past, exploits against SCADA or industrial control systems (ICS) were viewed as an infrequent subset of highly structured and often nation-state sponsored targeted attacks. But the OT market is expected to continue to grow through 2027 at a CAGR of 6.40%. Relying on obscurity as a defense strategy doesn’t work anymore; it’s practically an invitation to cybercriminals to penetrate and ultimately compromise OT systems. Although IT-related exploits are still more prevalent, according to the Global Threat Landscape Report from FortiGuard Labs, a growing number of  exploits are targeting OT. The long-held perception that ICS exploits are an obscure niche of the cyber threat landscape is simply no longer the case.

Why Now?

In the past, OT attacks were the domain of specialized threat actors who knew how to exploit ICS and SCADA systems. But now, many of those tools are now being packaged as attack kits on the dark web, so they are available to a much broader set of less technical attackers. The motivations behind the attacks range from gaining a profit through extortion, stealing intellectual property, to simply testing infrastructure resilience. The attacks offer a side benefit in that they create a climate of uncertainty and can force actions by executives in the government and commercial sector. The headlines generated from a successful attack on OT infrastructure only serve to amplify these effects. Attacks on large enterprise businesses in energy and manufacturing and even smaller more discrete intrusions at the municipal utilities level are all newsworthy. The alarming cybersecurity news in 2021 reinforces the fact that OT infrastructures require attention to reduce the attack vectors, tactics, and techniques that focus on industrial environments.

The Need for Better Visibility

The rapid expansion in the threat landscape and the increase in attacks demonstrate the increased need for integration between enterprise solutions and operational infrastructure. In most cases, security considerations need to extend to on-premise systems and extend to the Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices. It’s also important to have an infrastructure control strategy that restricts and contains suspicious activity and behavior. At a minimum, organizations should implement zero-trust network access (ZTNA), which limits user or device access to only those resources required to perform a specific role or function. ZTNA also strictly limits the range and level of engagement, which serves to restrict activity if a system is compromised. 

OT organizations that put comprehensive security policies in place give themselves an advantage over threat actors and can limit the impact of a breach. OT infrastructure is no longer benefiting from obscurity and the adoption of near-universal convergence of IT and OT networks implies traditionally isolated environments are no longer safe. Organizations must take proactive steps to harden OT environments, including integrating tools and practices designed to protect, detect, and respond to threats in real-time. Although attacks are inevitable, they don’t have to be successful.

Help AG Named Platinum Partner by Trend Micro

The partnership will enable Help AG customers to avail of Trend Micro’s security capabilities without sending their data to the cloud, alleviating concerns regarding data privacy.

Help AG, the cybersecurity arm of Etisalat Digital, today announced its Platinum Level partnership with Trend Micro, a global leader in enterprise data security and cybersecurity solutions. The partnership will enable Help AG customers in the United Arab Emirates and Saudi Arabia to avail of Trend Micro’s security capabilities without sending their data to the cloud, alleviating concerns regarding data privacy.

This collaboration allows Help AG to service clients that may be reluctant to transfer sensitive endpoint data to the cloud environments of cybersecurity providers. When utilizing Endpoint Detection and Response services, the client needs to provide complete and accurate endpoint data in order for the service provider to be able to detect threats and attacks. This can be problematic if an organization’s users engage in confidential activities or access confidential websites.

Help AG’s partnership with Trend Micro addresses these challenges by delivering security services and capabilities without needing clients to send their data to a cloud-based environment. Due to the unique data model it has in place, Trend Micro is one of the few vendors of its calibre to offer this option, answering the needs of a niche segment of customers with specific data privacy concerns.

Commenting on the partnership, Stephan Berner, Chief Executive Officer at Help AG, said: “Trend Micro offers solutions that cater to our customers who are sensitive about utilizing cloud for some or all of their security services. Joining forces with Trend Micro enables us to address their concerns by delivering robust capabilities in an environment that is suitable for their data privacy preferences and needs.”

Berner added: “It is an honor to be named a Platinum Partner of Trend Micro, a highly respected leader in the cybersecurity space with a long history and rich legacy. Trend Micro has been extremely consistent in providing world-class products and solutions that address the security needs of organizations, and our customers will benefit immensely from having access to their portfolio.”

“Our partners are at the heart of our mission to make this world a secured place for exchanging information digitally,” said Dr. Moataz Bin Ali, Vice President and Managing Director, Middle East and North Africa for Trend Micro. “We are excited about our collaboration with Help AG that will empower its customers with robust security capabilities to protect their data, adhering to their privacy and compliance needs. Together, we will help regional organizations reimagine cybersecurity,” he added.

Now available to Help AG customers, the Trend Micro portfolio includes products and solutions related to Detection and Response, Network Security, User Protection, Cloud Security, Internet of Things Security, Enterprise Ransomware Protection, and Regulatory Compliance, among other areas within cybersecurity that are relevant to organizations today.

AnadoluJet is starting its Sharjah – Istanbul flights

AnadoluJet, the brand of Turkish Airlines, is starting Sharjah – Istanbul flights. For the launch, the flag carrier brand will set the prices of tickets starting at 755 AED for round trips from Sharjah.

Starting on 15 December 2021, AnadoluJet will operate reciprocal flights four days (Monday, Tuesday, Wednesday and Sunday) a week between Sharjah and Istanbul Sabiha Gökçen. Flights will depart from Sharjah International Airport, flights will depart at 01:20, from Istanbul Sabiha Gökçen Airport at 20:15 on Mondays, Wednesdays, Sundays and at 20:20 on Tuesdays in local time.

AnadoluJet guests will have the option of making changes to their tickets until (including) 31 May 2022 if purchased before (including) 31 March 2022. For more information, you can visit http://www.anadolujet.com website and learn about the details of your options on cancellation, refunds and changes on the “Flexible Ticket Rights” page.

AnadoluJet ensures that all hygiene precautions are always taken at the highest standards in order to provide a healthy and safe travel experience for its passengers and flight crew. For detailed information, you can visit our website at www.anadolujet.com/en/corporate/news-and-annoucements/guidelines-for-safe-travel.

Invixium Integrates Biometric Solutions with AEOS by Nedap

Invixium Integrates Touchless Face Recognition and Multi-Factor Biometric Solutions with AEOS Access Control

Invixium, a premier manufacturer of innovative touchless biometrics, has integrated its portfolio of modern solutions with AEOS by Nedap, a leading provider of access control solutions. This integration between AEOS and IXM WEB, Invixium’s enterprise-grade software solution, streamlines the process of setting up and using Invixium biometric systems with AEOS. AEOS users can now seamlessly deploy Invixium touchless biometrics, such as face recognition via IXM TITAN, as well as the rest of Invixium’s world-class biometric portfolio.

This integration is powered by IXM Link, a licensed software feature for IXM WEB that allows for one- or two-way database-to-database synchronization between IXM WEB and AEOS. Database synchronization ensures easy setup, installation, and use of Invixium biometric solutions for AEOS users. Administrators can effortlessly enroll biometric data to cardholders (securely stored in IXM WEB) which are continuously synchronized with AEOS. In addition, Device Integration Protocol (DIP) has been implemented to allow AEOS to control the verification process.

“Integrating leading security solutions, such as touchless face recognition, with AEOS has enabled Nedap to remain at the forefront of COVID-19 response,” said Susanne Adriaanse, Managing Director at Nedap Security Management. “Invixium’s innovative technologies like face recognition, mask detection, and touchless thermal screening make them a partner that closely aligns with our strategy to provide a wide range high-level solutions to modern security problems.”

“Expanding our reach through technology integrations is vital to our strategy,” said Shiraz Kapadia, CEO & President at Invixium. “This integration simplifies installation and management while reducing costs for businesses that are looking for unified end-to-end security systems. We look forward to addressing the needs of AEOS users with our unique solutions.”

A Cybersecurity Diagnosis for the Healthcare Sector with Breach-Likelihood

By: Saket Modi, Co-Founder and CEO at Safe Security

For more than the past decade, healthcare has been the biggest target of data breaches. The total average cost has increased to $9.23 million in 2021 from $7.13 million the previous year, demonstrating a 29.5% rise. Cyberattacks in healthcare are unfortunately not limited to their financial, regulatory, and reputational impact since they have a direct consequence on lives. An Alabama-based resident claimed negligent homicide for the death of her infant because the hospital’s fetal monitors were inaccessible as a result of a ransomware attack, leaving its systems locked for eight days. For instance, if a hacker tampers with CT or MRI scans, it could also lead to incorrect medical procedures/surgeries, incomplete diagnoses, and reduced emergency or urgent care.

In such a scenario, the healthcare sector needs to quickly improve its cyber risk management. This is possible only if they move away from the traditional reactive and point-in-time approach in cybersecurity to adopt a predictive and measurable method instead. Adopting a proactive strategy includes knowing the organization’s breach-likelihood in real-time and its financial impact on the organization.

The current state of cybersecurity in healthcare:

The NotPetya attack happened five years ago. Since then, has much changed in the healthcare sector? The cost of ransomware alone has grown by 1094% since 2015. However, there are three key areas where this sector falls short:

  1. Accidental and/or malicious insider threats: The HIMSS Cybersecurity survey 2020 states that 89% of initial compromise in hospitals is still through emails and more than half (57%) of the cyberattacks in healthcare begin via trusted insiders.
  2. Third-party are unsecured often with unrestricted access: Over 1600 insurers at an average share PHI with hospitals. Hospitals also deal with a large number of medical devices suppliers, vendors for equipment, medication, repairs, and more, each third party is likely to be an entry point.
  3. Medical device security: There will be ~50 billion medical devices by 2028, with 15 – 20 IoMT in each hospital room, creating a vast digital attack surface. Interestingly, while one aspect is digitizing faster than it can be secured, 83% of medical imaging devices are still legacy systems too old to receive software updates.
  4. The lack of a designated security team: 87% of healthcare IT security leaders work without the right personnel, and three in four hospitals are operating without a designated security leader.

Can predictive analytics in cybersecurity help the healthcare sector?

Financial services organizations predict the likelihood of loans being repaid using the financial history of the applicant, their previous loans, salary/income, and credit score. Similarly, OTT platforms use predictive analytics and algorithms to improve their suggestions. The medical fraternity too relies on prediction models to improve diagnostics, identify risk groups, and improve patient care. Why not use the same analytical approach to predict the possibility of a breach rather than detecting cyberattacks after they happen and reacting to them? The use of predictive technology and models such as the Bayesian Network to predict cyber breaches makes this possible.

Enterprise cyber risk is a product of the probability of a breach happening and its business consequence. This probability is termed the “breach-likelihood” of the organization and can be calculated at the most granular level. Starting from the breach-likelihood of each medical device in every room, department-wise employee threats, to vendors or suppliers of equipment and pharmaceuticals, Electronic Medical Records directory on the cloud and the security posture of each cloud asset – the possibilities are endless. Each prediction makes the organization that much more prepared to predict and therefore mitigate breaches. Once an organization knows what to expect, it can focus energies on fixing what really matters rather than carrying out ad-hoc activities which only add to a sense of security rather than real cybersecurity.

How does breach-likelihood help the healthcare sector?

Breach likelihood in the healthcare sector can be a gamechanger in giving the visibility that is missing today. Similar to doctors arriving at a diagnosis after carrying out due diligence, sieving noise from actual symptoms, and aggregating all relevant information to a central database, cyber risk quantification can segregate information from noise.

As healthcare organizations ramp up cybersecurity infrastructure, they need to remember that all cybersecurity services, products and processes implemented in their cyber risk ecosystem need to communicate with each other. In a scenario where tens of cybersecurity services and tools are performing well in silos, but together fail to generate a comprehensive and prioritized solution, breach-likelihood is can create one score to drive cybersecurity strategy.