June 8, 2018 By Shane Schick 2 min read

Ever-increasing cybersecurity challenges have left nearly half of healthcare professionals dissatisfied with the steps taken to protect critical information and ward off threats after merging with or acquiring another firm, according to a recent research report.

In its “Reshaping Healthcare M&A” report, consulting firm West Monroe Partners examined a broad cross-section of issues, including deal drivers and getting more value from mergers and acquisitions (M&As) made within the sector. The impact of technology — particularly the challenges of cybersecurity — plays a huge role in conducting due diligence before any kind of purchase is made, the authors wrote.

Concern Around M&As on the Rise

According to the report, 49 percent of healthcare professionals expressed dissatisfaction related to cybersecurity due diligence. This is up sharply from the 16 percent who reported the same concerns in the firm’s 2017 “Software M&A Frenzy” study. The report speculated that this rise may be attributed to the increasingly specific laws and industry regulations in healthcare.

More than half of those surveyed (54 percent) said organizations they acquired lacked expertise in dealing with cybersecurity challenges. In addition, 48 percent expressed concerns about insider threats.

Cybersecurity Challenges Emerge Too Late

Part of the problem is that the details of an acquired firm’s data protection issues tend not to emerge until it’s too late. Fifty-eight percent of healthcare executives said they discovered such cybersecurity challenges after the M&A deal was already done. Some of the biggest surprises cited in the survey include lack of robust policies and procedures to address cybersecurity challenges (36 percent), lack of adequate infrastructure to ward off threats (30 percent), and lack of encryption on some devices (29 percent).

While concern about the potential for data breaches is high with healthcare M&As, the report suggested that scenarios in which one firm buys multiple small providers at once are particularly challenging. The firms included in these roll-ups may vary in terms of the quality of their IT systems and specific integration issues, necessitating further due diligence on the part of the purchasing organization.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today