<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VMware Industry Solutions</title>
	<atom:link href="https://blogs.vmware.com/industry-solutions/feed/" rel="self" type="application/rss+xml" />
	<link>https://blogs.vmware.com/industry-solutions</link>
	<description>Solutions for Industry Verticals</description>
	<lastBuildDate>Fri, 27 Oct 2023 18:53:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.2</generator>
	<item>
		<title>Navigating the Storm: Alaska&#8217;s Cloud Migration Journey</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/10/27/navigating-the-storm-alaskas-cloud-migration-journey/</link>
		
		<dc:creator><![CDATA[Marina Chamberlain]]></dc:creator>
		<pubDate>Fri, 27 Oct 2023 18:53:06 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[VMware Cloud]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[Government IT]]></category>
		<category><![CDATA[multi-cloud]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3836</guid>

					<description><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div>Imagine fishing in a remote location in Alaska when a crisis occurs. You’re caught in the middle of a storm, so the chances of someone coming to your rescue are slim to none. Now you are faced with having to find a solution on your own because failure is not an option.   This mindset of “a &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/10/27/navigating-the-storm-alaskas-cloud-migration-journey/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/02/020323_VMware-Smarter-federal-security_1280x720_B.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>Imagine fishing in a remote location in Alaska when a crisis occurs. You’re caught in the middle of a storm, so the chances of someone coming to your rescue are slim to none. Now you are faced with having to find a solution on your own because failure is not an option.  </p>



<p>This mindset of “a hundred reasons to fail, but no excuses” is crucial to surviving our imaginary fishing scenario. It was also the driving force behind the State of Alaska’s rapid cloud migration effort.</p>



<p>The project was funded in July 2022 by Alaska Governor Mike Dunleavy, with the primary objective to reduce the risks associated with on-premise services. All executive branch servers were assessed, and everything that could technically migrate was moved with as minimal impact as possible to the application support teams. </p>



<p>In the first phase of the<s>ir</s> migration, the State of Alaska chose to migrate the servers in their Anchorage data centers since that’s where they had the majority of their inventory and where they wouldn’t have to deal with limited bandwidth challenges. During this phase, 65% of servers were migrated or shut down, 7% underwent standard migration, and 15% were pushed to the second phase due to compliance, contractual or technical prerequisites. All servers were migrated on schedule with minimal app disruption and within budget.</p>



<p>Deputy CIO for the State of Alaska, Niel Smith, joined us at VMware Explore Las Vegas to share the story of Alaska’s success and how other states navigating similar cloud migrations can implement lessons learned.</p>



<p><strong>Reeling in success with the captain’s support</strong></p>



<p>According to Niel, the secret ingredient to the state of&nbsp;Alaska’s successful migration was not the technical bits — it was the executive support.&nbsp;</p>



<p>Every organization wants to take on more projects than their resources allow. That’s why it’s essential to have an effective leader who can determine&nbsp;strategic priority, as lack of executive support is one of the primary reasons for project failures.&nbsp;</p>



<p>“If somebody says, ‘We don’t have enough resources,’ I will challenge you. If you had nothing else to do and you took all of your people and worked on one thing, like COVID taught us, you have hundreds of resources. It’s a matter of setting priority,” Niel said.</p>



<p>In order to actually achieve the strategic goal, leaders need to allow their teams to say no to other projects so they can stay focused on the biggest priority. In this case, the governor sent a memo to senior state leadership saying that participation was not optional. A second memo followed, stating no more on-premise IT hardware would be purchased in the State of Alaska. That kind of leadership and focus lead to high participation rates. </p>



<p><strong>Casting away latency concerns&nbsp;</strong></p>



<p>Something that frequently comes up with migrations is latency concerns. While a valid concern, it shouldn’t be an issue with the right cloud migration approach.</p>



<p>The distance between Anchorage, Alaska, and the Azure server in western California is a whopping 2,400 miles. Despite the distance, they can send data in less than 100 milliseconds from their primary data center to a primary cloud location. Simply put, the data transfers are fast, and the system is working well. </p>



<p>“Let me tell you, there are people in Alaska who think that we are so big and so remote and so special that we defy the laws of physics and the speed of light,” Niel said. </p>



<p>Through trial and error, one thing Niel learned is not to put a web server in the cloud and leave the database on-premise. A person sitting on-premise with a workstation accessing the front-end web server is no different than someone sitting on their tablet, browsing a web page that&#8217;s hosted halfway around the world. 99% of the time, it&#8217;s going to work.</p>



<p><strong>Hook, line, and partner: Avoiding impact together&nbsp;</strong></p>



<p>Avoiding impact to applications during migration is challenging, but that’s where working with a partner like VMware can help.</p>



<p>The <a href="https://www.vmware.com/cloud-solutions/azure.html">Azure VMware solution</a> allows IT teams to accelerate cloud migration by running VMware infrastructure software as a native Azure service on bare-metal hosts in Azure data centers. It allows users to maintain operational consistency of existing VMware investments while leveraging the scale and performance of Azure. </p>



<p>For this project, Niel decided to stand up VMware&nbsp;in their Azure data center because of its ability to stretch subnets between locations without breaking sessions. And in an effort to save time, Niel’s team chose their partner before the money was even available to them. This saved them months of delay.&nbsp;</p>



<p><strong>Navigational insights&nbsp;</strong></p>



<p>As with any successful project, Niel and his team walked away with several key learnings:&nbsp;</p>



<ul>
<li>Implement a communications plan&nbsp;
<ul>
<li>Something that surprised Niel was the need for a solid communications plan. It turned out that the hardest part wasn’t the tech, it was getting project buy-in. Niel learned very quickly that having the governor’s mandate did not mean that everybody was going to be onboard with the plan. FUD (Fear, Uncertainty, and Doubt) occurs every time a new project kicks off, and that can stop a project just as fast as a broken circuit. Make sure you are thinking through an appropriate communications plan to get all of your key players and stakeholders onboard, try to ease their concerns, and be ready to answer their anticipated questions.&nbsp;</li>
</ul>
</li>



<li>Compliance checklist&nbsp;
<ul>
<li>Compliance is essential and should never be treated as an afterthought. Trying to figure out the compliance requirements as you go will slow down the migration process. To ensure a speedy migration, create a checklist ahead of time. What do you need to do to be compliant with the IRS? HIPPA? Having a list from the start will keep things running smoothly.</li>
</ul>
</li>



<li>Immutable backups&nbsp;
<ul>
<li>An unplanned business continuity benefit of moving to the cloud was the availability of immutable storage backup solutions.&nbsp;Research shows that people come into your network when it’s compromised and are in there approximately six months before your payload gets triggered. So, it’s good to have immutable backup copies for at least six or more months. It may cost more, but it’s going to be worth it for critical public service applications.&nbsp;</li>
</ul>
</li>



<li>Customer-managed encryption keys&nbsp;
<ul>
<li>To meet compliance requirements in cloud facilities, use customer-managed encryption keys to isolate data from the cloud service provider’s infrastructure for more security. These keys encrypt the storage at rest and encrypt the application in transit. So it doesn&#8217;t matter where those applications are sitting — if you are in the data center supporting it, to you everything is encrypted. Both the IRS and the FBI are already leaning down that road for customer-managed keys.</li>
</ul>
</li>
</ul>



<p>Not only does cloud migration modernize technology, but employees learn a lot in the process.  Once you’ve crossed over the hurdle of migrating to the cloud, you’ll have greater visibility into your environment, and future modernization will only become easier down the road. Simply put, the hard work is done. </p>



<p>Interested in learning more? Watch the full on-demand session recording from VMware Explore Las Vegas <a href="https://www.vmware.com/explore/video-library/video-landing.html?sessionid=1681510816264001LPv0&amp;videoId=6335571459112">here</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>VMware Explore 2023: Modernizing The Public Sector With Multi-Cloud Solutions</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/10/12/vmware-explore-2023-modernizing-the-public-sector-with-multi-cloud-solutions/</link>
		
		<dc:creator><![CDATA[VMware Industry News]]></dc:creator>
		<pubDate>Thu, 12 Oct 2023 22:36:08 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[Government IT]]></category>
		<category><![CDATA[multi-cloud]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3830</guid>

					<description><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div>This August, we had another fantastic run at VMWare Explore in Las Vegas, our yearly rendezvous for tech aficionados where we dive deep into the multi-cloud universe and examine what new products and exciting upgrades we’ve made to our extensive catalog of top-tier multi-cloud solutions. (If you missed this year’s event, be sure to save &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/10/12/vmware-explore-2023-modernizing-the-public-sector-with-multi-cloud-solutions/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/10/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_B.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>This August, we had another fantastic run at<a href="https://www.vmware.com/explore.html"> VMWare Explore in Las Vegas</a>, our yearly rendezvous for tech aficionados where we dive deep into the multi-cloud universe and examine what new products and exciting upgrades we’ve made to our extensive catalog of top-tier multi-cloud solutions. (If you missed this year’s event, be sure to save the date for <a href="https://www.vmware.com/explore/us.html">VMware Explore Las Vegas 2024</a>.)&nbsp;</p>



<p>We had the privilege of hearing from customers across the public sector in a series of industry sessions and workshops. Each panelist shared their experiences in harnessing VMware&#8217;s capabilities to enhance operational efficiency within their respective domains, ultimately centering around one crucial question:&nbsp;</p>



<h3 class="wp-block-heading has-text-align-center" id="h-how-can-public-sector-organizations-leverage-multi-cloud-and-ai-solutions-to-drive-greater-performance-and-better-outcomes"><em><strong>How can public sector organizations leverage multi-cloud and AI solutions to drive greater performance</strong> <strong>and better outcomes?</strong></em></h3>



<p></p>



<h4 class="wp-block-heading" id="h-the-state-of-it-in-today-s-public-sector">The State Of IT In Today’s Public Sector</h4>



<p>Government organizations aren&#8217;t necessarily known for their technical chops. But thanks to a steady increase in public sector innovation, that perception is gradually changing. Today, roughly 95% of public sector IT leaders we surveyed indicated that they’re focused on building a multi-cloud environment, and that figure is showing steady signs of increasing.</p>



<p>Still, digital transformation in the public sector proves sluggish. Among other challenges, organizations in the early stages of cloud adoption and development frequently experience what we like to call<strong> </strong><em>cloud chaos</em>: the frenzied, &#8220;cloud-first&#8221; approach to migration that results in inefficiencies.&nbsp;</p>



<p>Our panelists underscored their pivot from cloud chaos to <em>cloud smart, a </em>strategic shift towards intelligent workload placement while considering factors like cost and performance, locality, and latency. VMware solutions emerged as key drivers in this pivot, enabling operational efficiencies and lowering costs.</p>



<p>Moreover, each panel guest delivered rich insights into how multi-cloud solutions help public sector clients serve their constituents more impactfully. Here, we’ll explore four key takeaways from the session: the modernization and migration of applications to the cloud, the development of mission-critical applications, lessons learned along the way, and a sneak peek into the future of artificial intelligence within multi-cloud environments.</p>



<h4 class="wp-block-heading" id="h-migrating-modernizing-applications">Migrating &amp; Modernizing Applications</h4>



<p>We began our panel discussions with Neil Smith, Deputy Chief Information Officer of the State of Alaska, and Matt Van Syckle, the State of Montana’s Chief Technology Officer. Both explored how they’ve used VMware solutions to migrate applications to a multi-cloud environment while bolstering overall resilience and security.&nbsp;</p>



<p>In response to the pandemic, the State of Alaska initiated a rapid cloud migration project in July of 2022. The goal was to reduce on-premises risk to critical services. The state had previously attempted cloud migrations with mixed results, but the availability of <a href="https://azure.microsoft.com/en-us/products/azure-vmware">Azure VMware</a> solutions played a crucial role in streamlining the migration process. As a result, the IT department was able to migrate 65% of its servers in only 10 months.&nbsp;</p>



<p>The State of Montana was an early adopter of automation and operations solutions, particularly <a href="https://www.vmware.com/products/aria.html">ARIA automation</a>, a unified management solution for VMware cloud and multi-cloud environments. Today, the state leverages VMware Cloud on AWS for disaster recovery and to establish pre-approved locations for workload placement, making it easier to move compute and storage while adhering to compliance standards.</p>



<h4 class="wp-block-heading" id="h-building-mission-critical-applications"><strong>Building Mission-Critical Applications&nbsp;</strong></h4>



<p>Organizations like the Marine Corps and the Department of Corrections make high-stakes decisions every day. They need technology that’s as robust as they are to support their operations.&nbsp;</p>



<p>That’s what Jeffery Funk, our next panel guest and Program Director for the California Department of Corrections and Rehabilitation, is responsible for building. Leveraging <a href="https://tanzu.vmware.com/tanzu/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=amer_gp-b&amp;utm_content=g2_t023&amp;utm_term=tanzu&amp;_bt=530802797948&amp;_bk=tanzu&amp;_bm=e&amp;_bn=g&amp;_bg=119184092313&amp;gad=1&amp;gclid=CjwKCAjwgsqoBhBNEiwAwe5w068y5S2A5vxH1F0zCWoHXwq_U9bMF37hGyQ7q60NZVDZJZmFvQ06ZRoCpMoQAvD_BwE">VMware Tanzu</a>, Funk accelerated the development of an unprecedented mobile application for parole operations in four short months. The app’s success led to a statewide rollout, transforming parole operations altogether—especially considering the absence of mobile device management and limited infrastructure at the outset.&nbsp;</p>



<p>We also heard from Charlie Bahk, the Director of the Marine Corps Software Factory. Initially, the Marine Corps recognized the need to modernize its operations to adapt to the evolving threat landscape, transitioning from conflicts against non-peer adversaries to the challenges posed by more advanced peer adversaries. VMware&#8217;s technology and collaboration with industry partners enable the Marine Corps to accelerate software development projects in response. The Marine Corps are actively developing software solutions to address tactical challenges, such as maximizing commercial radar assets for intelligence purposes and improving logistics sustainment through innovative applications like QR code technology for unmanned aerial assets.&nbsp;</p>



<h4 class="wp-block-heading" id="h-journey-to-the-cloud-lessons-learned"><strong>Journey To The Cloud: Lessons Learned&nbsp;</strong></h4>



<p>Our panelists highlighted the importance of cultural buy-in and mandates for adopting multi-cloud technologies in the public sector.</p>



<ul>
<li>Clear mandates from leadership can drive cultural change and adoption of new technologies. And while mandates can drive change, it&#8217;s essential to balance them with education and support to ensure that individuals and departments understand the reasons behind the changes and how to navigate them effectively.</li>



<li>Moreover, working in tandem with VMware underscored a key insight: ​there’s no need to reinvent the wheel. Collaborating with organizations or individuals with expertise in the field can significantly accelerate software development efforts, which is what we always strive to accomplish for our customers.</li>



<li>Finally, success breeds success. Achieving early wins—like the rapid deployment of mobile applications—can change perceptions and lead to increased support for further initiatives. Nobody will argue with results, and demonstrating results early on can aid organizations in receiving collective buy-in from key stakeholders.</li>
</ul>



<h4 class="wp-block-heading" id="h-last-words-public-sector-perspectives-on-ai"><strong>Last Words: Public Sector Perspectives on AI&nbsp;</strong></h4>



<p>There’s no doubt that multi-cloud management operations will be enabled by smart new uses of artificial intelligence and machine learning. In fact, it’s already occurring: leveraging novel uses of traditional VM platforms, organizations like the U.S. Navy are creating digital twins to improve the accuracy of ballistic missile targeting systems like Aegis.</p>



<p>The Aegis Combat System, which includes the AN/SPY-1 radar, can track and engage multiple targets simultaneously. Training the virtual system with AI and machine learning has made the physical system remarkably capable of acquiring, tracking, and targeting incoming missiles with greater precision.<br>This certainly won’t be the last we’ll see of AI in the public sector. The future is here, and we&#8217;re proud to help our customers foster innovation for a modern, technology-driven public sector that is prepared to meet the challenges of tomorrow. <a href="https://www.vmware.com/company/contact.html">Get in touch</a> with our experts to learn how we can help your organization pioneer the future of public sector excellence.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware Risk Reduction Approaches for Healthcare</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/09/20/ransomware-risk-reduction-approaches-for-healthcare/</link>
		
		<dc:creator><![CDATA[Soma Kancherla]]></dc:creator>
		<pubDate>Wed, 20 Sep 2023 18:19:50 +0000</pubDate>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HealthcareIT]]></category>
		<category><![CDATA[VMwareHIT]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3826</guid>

					<description><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div>Ransomware attacks against healthcare providers continue to threaten care and lives. As I recently wrote in my last post, the healthcare landscape is vulnerable to ransomware due to a host of institutional, regulatory, and technological issues.&#160; According to a 2022 Sophos global survey of more than 5000 IT professionals, more than two out of three &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/09/20/ransomware-risk-reduction-approaches-for-healthcare/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_E.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>Ransomware attacks against healthcare providers continue to threaten care and lives. As I <a href="https://blogs.vmware.com/industry-solutions/2023/08/14/ransomware-in-healthcare-understanding-the-challenges/">recently wrote</a> in my last post, the healthcare landscape is vulnerable to ransomware due to a host of institutional, regulatory, and technological issues.&nbsp;</p>



<p>According to a <a href="https://www.techtarget.com/searchsecurity/feature/Top-10-ransomware-targets-in-2021-and-beyond">2022 Sophos global survey of more than 5000 IT professionals</a>, more than two out of three organizations have been the target of ransomware attacks. If and when ransomware attacks take place, healthcare organizations–and their infosec teams–can use planning and preparation to minimize attack risk.</p>



<p>Unfortunately, traditional antivirus and vulnerability assessment tools may not protect organizations because many ransomware attacks are fileless and instead based on lateral LoTL (Living off the Land) approaches. Preventing lateral movement-based infection attacks requires a next-generation antivirus tool that applies Zero Trust Architecture.</p>



<p>Identifying the right next-generation tool that integrates both strong defenses and robust recovery options is crucial. Without it, healthcare organizations are vulnerable to attacks that can threaten lives, cause reputational damage, and disrupt medical care.&nbsp;</p>



<p><strong>The Danger of Ransomware Attacks</strong></p>



<p>Preventing ransomware attacks isn’t just about preventing financial harm, it’s about saving lives. A <a href="https://onlinelibrary.wiley.com/doi/abs/10.1111/1475-6773.13203">report in Health Services Research</a>, which leveraged data from the Department of Health and Human Services and Medicare Compare, found that ransomware attacks typically add an extra 2.7 minutes to response times for heart attacks–leading, in turn, to an additional 36 deaths per 10,000 heart attacks each year.&nbsp;</p>



<p>Additional challenges also happen during the ransomware attack recovery process. Healthcare organizations that opt to pay ransom payments and rely on their cybersecurity insurance policies to mitigate losses encounter further issues. Sophos’ survey found that 96% of victims either did not get their complete data back after paying ransom or had data leaked to the public. As a result, many insurance companies are either hiking premiums or not renewing cybersecurity insurance policies whatsoever.</p>



<p>Having a streamlined ransomware recovery workflow and an accompanying business continuity process makes the recovery process much quicker. This helps protect patients and minimize fallout from successful attacks.</p>



<p><strong>Minimize risk through Protect and Recovery</strong></p>



<p>As we discussed in my previous <a href="https://blogs.vmware.com/industry-solutions/2023/09/07/ransomware-attacks-what-the-healthcare-industry-can-do/">post</a>, there are several industry solutions and strategies for combating the Ransomware attack. Strategy and solutions are classified under two key categories: protect and recover.</p>



<ul>
<li><strong>Protect</strong></li>
</ul>



<p>Building a strong defense through ZTNA is key in preventing the minimizing the attack surface. Selecting solutions with built-in security functionality that quickly integrate into the environment is especially important. VMware, for instance, has a strong portfolio of products with intrinsic security built directly into the virtualization layer. With most organizations virtualizing upwards of 80% of their workloads, intrinsic security solutions can streamline the process.</p>



<p>One solution, <a href="https://www.vmware.com/products/carbon-black-cloud.html">VMware Carbon Black</a> with Next-Gen Antivirus and Extended Detection and Response (XDR), analyzes attacks and behavior patterns to detect and stop never-before-seen attacks. Another tool, <a href="https://www.vmware.com/solutions/secure-hybrid-workforce.html">VMware Workspace Security Solutions</a>, prevents and minimizes attacks with conditional and role-based access. It provides a comprehensive approach for total endpoint security with intelligence insights and analysis while allowing users to secure any app on any device.</p>



<p>Implementing East-West security and preventing lateral movement is also extremely helpful in decreasing the risk of successful ransomware attacks. <a href="https://www.vmware.com/products/nsx-distributed-firewall.html">VMware NSX Distributed Firewall</a> is another solution that provides Advance Threat Protection and automates building Zero Trust Architecture policy.</p>



<ul>
<li><strong>Recover</strong></li>
</ul>



<p>With the increasing danger of ransomware attacks, it’s essential that organizations deploy robust ransomware recovery solutions that comply with both cybersecurity insurance audits and security assessments.&nbsp;</p>



<p>While traditional backup and disaster recovery plans don’t mitigate ransomware risks, they help with recovery. One step that healthcare organizations can take in making recovery easier is building iterative recovery workflows for selecting restore points. Finding the right backup and isolating and cleaning it before putting it back into production can take anything from several hours to several days. Selecting a recovery solution that includes quick identification for restore points and network isolation capabilities speeds up the restore process considerably, decreases downtime, and improves the availability of patient care systems.</p>



<p>Because many organizations are not able to recover their full data even after paying a ransom and still have sensitive data encrypted, they need alternatives. The most comprehensive solutions for robust ransomware recovery solutions assist with pre-breach protection and detection and post-breach recovery. These comprehensive solutions help users minimize breach damage and recover from breaches quickly with minimal effort.&nbsp;</p>



<p>When deciding on disaster recovery solutions, it is important to carefully analyze and look for the specific capabilities needed during ransomware recovery. <a href="https://www.vmware.com/products/cloud-disaster-recovery.html">VMware VCDR</a> is a solution for restoring both systems and data with reduced upfront cost and minimal time to restore. VCDR has an additional <a href="https://www.vmware.com/products/cloud-disaster-recovery/ransomware.html">Ransomware Recovery Solution</a> add-on that can help with faster recovery with both a step-by-step workflow and built-in Isolated Recovery Environment (IRE).</p>



<p><strong>Strategies For Healthcare Settings</strong></p>



<p>For healthcare settings in particular, protecting both biomedical and Internet of Medical Things (IoMT) devices has become a challenge. I have <a href="https://blogs.vmware.com/industry-solutions/2023/08/14/ransomware-in-healthcare-understanding-the-challenges/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=ransomware-in-healthcare-understanding-the-challenges">written about this previously</a> as the threat landscape is rapidly changing, and there may be dissonance between leadership and security teams.</p>



<p><a href="https://www.vmware.com/products/secure-access-service-edge-sase.html">VMware SASE</a> solutions provide improved clinician and patient experiences with insights, analytics, and built-in security. And, they integrate well with other solutions in building strong segmentation layers around connected devices.</p>



<p>Strong disaster recovery solutions help as well in the ransomware context. While disaster recovery can encompass everything from hardware malfunctions to physical damage to a Data Center or data corruption, ransomware attacks are significant events that not only cripple system access but also potentially lead to reputational damage.</p>



<p>Reputational damage compounds the potential damage from ransomware attacks. This can mean cascading consequences that not only prevent system access and ruin brand reputation but also lead to tremendous financial strain with loss of revenue coupled with punitive damages in addition to risking patient health.</p>



<p>As the saying goes, an ounce of prevention is worth a pound of cure. When it comes to prevention and cures, don’t settle for painkillers–see the specialist. Cybersecurity insurance doesn’t help with prevention or cure and still leads to losses. Building a strong Zero Trust Architecture is the prevention. You can find products with intrinsic security that require minimal integration which helps with prevention. And if you cannot prevent it, then cure it by choosing a comprehensive disaster recovery solution with a Ransomware Recovery Solution.</p>



<p><strong>Cost Savings And ROI</strong></p>



<p>One way to get started testing out the right approach is a pilot lite deployment on the cloud; this will save on hardware costs and allow your team to test different options. This can help minimize security operations center and security team costs in building and maintaining IRE.</p>



<p>Adopting this approach can help reduce cybersecurity insurance premiums as well, leading to additional cost savings. And, quick recovery saves organizations from extended downtime and minimizes revenue loss.</p>



<p>In an era where ransomware attacks have become the norm, healthcare organizations can no longer afford to take passive approaches to cybersecurity. Ensuring a robust ransomware recovery plan is a necessity, and it is one that goes beyond simply relying on cybersecurity insurance.&nbsp;</p>



<p>Next-generation antivirus tools that apply Zero Trust Architecture can help prevent and minimize attacks while helping healthcare organizations protect their systems, data, and reputation. In the battle against ransomware, being proactive is key.&nbsp;</p>



<p>Investing in prevention and robust recovery solutions is the best way organizations can safeguard patient health and organizational reputation.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>VMware vRealize Suite Cloud for US Public Sector is now VMware Aria Suite Cloud&#x2122;&#xfe0f; for US Public Sector</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/09/13/vmware-vrealize-suite-cloud-for-u-s-public-sector-is-now-vmware-aria-suite-cloudtm-for-us-public-sector/</link>
		
		<dc:creator><![CDATA[Lori Pierson]]></dc:creator>
		<pubDate>Wed, 13 Sep 2023 18:24:57 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[Aria]]></category>
		<category><![CDATA[Government IT]]></category>
		<category><![CDATA[multi-cloud]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3808</guid>

					<description><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div>As we increasingly focus on enabling customers to deliver on their key priorities and drive to mission success and less on individual products, it drove our decision to rebrand the vRealize Suite Cloud and the individual products into a unified name. The VMware Aria Suite CloudTM for US Public Sector signifies a single, unified cloud &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/09/13/vmware-vrealize-suite-cloud-for-u-s-public-sector-is-now-vmware-aria-suite-cloudtm-for-us-public-sector/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/09/072723_VMware-Aria-rebranding-to-a-gov_1280x720_A-1.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>As we increasingly focus on enabling customers to deliver on their key priorities and drive to mission success and less on individual products, it drove our decision to rebrand the vRealize Suite Cloud and the individual products into a unified name. The VMware Aria Suite Cloud<sup>TM</sup> for US Public Sector signifies a single, unified cloud management solution that provides customers the promise to remove the noise and confusion generated by today’s highly complex multi-cloud environments and provide harmonious cloud operations. We are excited to announce that we have been recognized as a leader in the <a href="https://reprints2.forrester.com/#/assets/2/82/RES176411/report">The Forrester Wave<img src="https://s.w.org/images/core/emoji/14.0.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />: Hybrid Cloud Management, Q4 2022</a>. The strengths of our end-to-end solution built to handle the most complex hybrid clouds is one of the reasons for the recognition.</p>



<p>The Aria Suite Cloud as part of VMware Government Services portfolio maintains the FedRAMP JAB High Authorization that is vitally important to government agencies to secure the data on a cloud platform.&nbsp;</p>



<p>As government agencies are migrating workloads to the cloud, a portion of the workloads will remain on premise creating hybrid environments that need to be managed. The Aria Suite Cloud gives government teams a range of powerful tools to achieve a consistent cloud operating model across these multiple environments. This includes automation, orchestration, advanced analytics and reporting, and a unified interface for managing workloads. The suite of products helps customers avoid siloed cloud operations, reduces training needs, and ultimately saves on cloud costs and complexity. Agencies can leverage the power of Aria Suite Cloud to achieve a consistent cloud operating model and reduce complexity.</p>



<p>The suite includes:</p>



<ul>
<li><a href="https://www.vmware.com/products/aria-automation.html"><strong>VMware Aria Automation</strong></a>&nbsp;delivers a modern infrastructure automation platform for both traditional and cloud native workloads, powered by DevOps principles and the Salt Project open source community.</li>



<li><a href="https://www.vmware.com/products/aria-operations.html"><strong>VMware Aria Operations</strong></a>&nbsp;delivers continuous performance optimization, efficient capacity and cost management, proactive planning, intelligent remediation, and integrated compliance—powered by AI and predictive analytics.</li>



<li><a href="https://www.vmware.com/products/aria-operations-for-logs.html"><strong>VMware Aria Operations for Logs</strong></a>&nbsp;delivers centralized log management, deep operational visibility, and intelligent analytics.</li>



<li><a href="https://blogs.vmware.com/management/2023/01/manage-aria-licenses-and-overages-with-subscription-manager.html"><strong>VMware Aria Hub Subscription</strong></a>&nbsp;delivers easy onboarding and management of your SaaS-based subscription usage and consumption.</li>
</ul>



<p>The graphic below shows the complexity of hybrid cloud management by the numbers.</p>



<figure class="wp-block-image size-full"><img decoding="async" loading="lazy" width="936" height="374" src="https://blogs.vmware.com/industry-solutions/files/2023/09/Picture1.png" alt="" class="wp-image-3810" srcset="https://blogs.vmware.com/industry-solutions/files/2023/09/Picture1.png 936w, https://blogs.vmware.com/industry-solutions/files/2023/09/Picture1-300x120.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/09/Picture1-768x307.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/09/Picture1-600x240.png 600w" sizes="(max-width: 936px) 100vw, 936px" /></figure>



<p>Explore these additional resources to learn more about VMware’s Aria Suite and our many other capabilities.</p>



<ul>
<li><a href="https://www.vmware.com/products/aria.html"><strong>VMware Aria</strong></a></li>



<li><a href="https://www.vmware.com/products/trust-center.html"><strong>VMware Trust Center</strong></a></li>
</ul>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware Attacks: What the Healthcare Industry Can Do</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/09/07/ransomware-attacks-what-the-healthcare-industry-can-do/</link>
		
		<dc:creator><![CDATA[Soma Kancherla]]></dc:creator>
		<pubDate>Thu, 07 Sep 2023 17:48:28 +0000</pubDate>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Industry All]]></category>
		<category><![CDATA[HealthcareIT]]></category>
		<category><![CDATA[VMwareHIT]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3788</guid>

					<description><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div>In our previous post, we examined the risks posed by ransomware attacks on healthcare organizations and why healthcare is different from other industries.&#160; Because the healthcare ecosystem is so complex–encompassing everything from HIPAA-compliant management of patient records to network integration of life-supporting medical devices–it is a uniquely vulnerable target for ransomware attacks that are potentially &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/09/07/ransomware-attacks-what-the-healthcare-industry-can-do/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/09/080423_VMware-Healthcare-Ransomware_1280x720_A.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>In our <a href="https://blogs.vmware.com/industry-solutions/2023/08/14/ransomware-in-healthcare-understanding-the-challenges/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=ransomware-in-healthcare-understanding-the-challenges">previous post</a>, we examined the risks posed by ransomware attacks on healthcare organizations and why healthcare is different from other industries.&nbsp; Because the healthcare ecosystem is so complex–encompassing everything from HIPAA-compliant management of patient records to network integration of life-supporting medical devices–it is a uniquely vulnerable target for ransomware attacks that are potentially lucrative for criminals. These ransomware attacks are especially important to combat, because they potentially threaten public health and risk patient lives. The augmented expenses incurred in safeguarding against these attacks are rationalized by the tangible benefits accrued to patients.</p>



<p>Ransomware attacks can be devastating, and recent attacks show why a solid ransomware strategy is so important. For example, a <a href="https://apnews.com/article/cyberattack-hospital-emergency-outage-4c808c1dad8686458ecbeababd08fecf">2023 attack on a single medical group</a> led to outages at healthcare facilities in several states which shut down emergency rooms and required ambulances to divert to other hospitals.&nbsp;</p>



<p>Planning to prevent and mitigate ransomware attacks is not just about data protection, but about protecting patients and protecting the public from catastrophic outcomes. The onus is not just on information security professionals but also on every individual in the healthcare domain. It&#8217;s imperative that organizations not only adhere to compliance measures but also surpass their obligations by prioritizing security and patient well-being.</p>



<p>In this discussion, we will take a closer look at the strategies employed by industry experts to defend against the growing threat of ransomware attacks and recover from those threats. The focal points of these strategies center around the key themes of people, processes, and technology.</p>



<p><strong>People</strong></p>



<ul>
<li><strong>Training and Awareness</strong></li>
</ul>



<p>One of the most critical steps to protecting against cyberattacks is to educate and train all staff members, vendors, and contractors about the dangers of ransomware. They are the first line of defense and should be well-versed in identifying suspicious emails, links, and attachments.&nbsp;</p>



<p>As we discussed in our<a href="https://blogs.vmware.com/industry-solutions/2023/08/14/ransomware-in-healthcare-understanding-the-challenges/"> previous post</a>, the healthcare sector, particularly clinical staff, requires heightened user education and outreach to address ransomware risks effectively. Given the landscape of digital health practices, caregivers engage with external patients, rendering them more vulnerable to phishing attacks. It’s important to invest in continuous education through awareness workshops, and training. This approach can aid employees in cultivating a security-conscious mindset and, in turn, make more informed decisions to avoid falling victim to phishing attacks.</p>



<ul>
<li><strong>Incident Response Teams</strong></li>
</ul>



<p>Another important thing organizations can do to prevent ransomware attacks and mitigate damage is to staff and maintain dedicated incident response teams composed of individuals with the expertise to handle security incidents effectively. Establish a Security Operations Center (SOC) and/or Security Incident and Event Management (SIEM) team around the clock. These teams should have well-defined roles and responsibilities and be well-prepared to respond to ransomware attacks swiftly. SOCs may <a href="https://www.netsurion.com/articles/true-cost-of-setting-up-and-operating-security-operations-center">cost over a million dollars a year</a> to staff and operate, but they remain the most useful frontline tool for fighting ransomware attacks.</p>



<ul>
<li><strong>Cultural Shift and Employee Engagement</strong></li>
</ul>



<p>Fostering a culture of cybersecurity awareness and vigilance can encourage employees to report potential threats as soon as they occur. The leadership team should instill a sense of responsibility among all employees by highlighting the sensitive details and the governing regulations around PPI and PHI data to prioritize security in their daily activities and to report any potential security risks promptly. This can help in early threat detection and containment.</p>



<ul>
<li><strong>Everyone plays a vital Role</strong></li>
</ul>



<p>While it’s important for leadership to take charge in cultivating the right culture, preventing and minimizing ransomware attacks should be a team effort across the organization. Vulnerability assessment teams assist in identifying potential weak points in architecture and improving scanning, while infrastructure teams assist with patching remediation and coordinating software updates. Penetration testing teams can identify security weaknesses at the same time that disaster recovery and business continuity teams can make sure servers and systems keep running in case of cyberattacks.</p>



<p></p>



<p><strong>Process</strong></p>



<ul>
<li><strong>Patch Management</strong></li>
</ul>



<p>Proactively and consistently check on the effectiveness of your systems, ensuring that the software is up-to-date, patched, and strong enough to rectify any vulnerabilities that ransomware could exploit. Streamline this process and reduce vulnerabilities through a formal patch management program and have a process in place to handle zero day vulnerabilities.&nbsp;</p>



<ul>
<li><strong>Segmentation</strong></li>
</ul>



<p>Employ network segmentation to partition the network into isolated sections into application groups or segments that are only communicating to other systems within the segment. This inhibits the proliferation of ransomware across the network by impeding lateral movement. Make sure firewalls are set up between production and QA environments and only allow systems to communicate with systems that need to communicate.</p>



<ul>
<li><strong>Need and Role-based Access</strong></li>
</ul>



<p>Zero Trust Network strategy and principles should be applied. Multi-factor authentication should also be implemented as per industry best practices. Need-based access policy must be adopted—implementing the principle of least privilege restricts users’ access to only the resources necessary for their roles, reducing the potential attack surface.</p>



<ul>
<li><strong>Backups and Recovery Plans</strong></li>
</ul>



<p>Develop and sustain a robust backup strategy encompassing vital data and systems. Protect these backups by storing them offline or within isolated networks to preclude ransomware compromise. Establish a process to regularly test the reliability of backups.</p>



<ul>
<li><strong>Incident Response Plan</strong>&nbsp;</li>
</ul>



<p>Define and build a well-documented incident response plan detailing actions in the event of a ransomware attack. This plan should encompass notification protocols, designated roles, communication procedures, and steps for reinstating systems using backups.</p>



<ul>
<li><strong>Vendor Accountability</strong></li>
</ul>



<p>Medical devices often operate on outdated hardware and software systems, so continuously updating and reviewing cybersecurity protocols and policies is paramount. It&#8217;s crucial to actively engage with vendors to ensure the provision of security patches. Implement firewall rules, and segment devices to reduce vulnerability and minimize attack surface. Establish processes with vendors and make them accountable for making sure security updates are in place for the critical systems. These processes are pivotal in empowering people to enhance their efforts in fortifying Ransomware Defense and Recovery practices.</p>



<p></p>



<p><strong>Technology</strong></p>



<ul>
<li><strong>Endpoint Security and Device Management</strong></li>
</ul>



<p>Deploying robust endpoint security solutions including antivirus software, intrusion detection systems, and behavior monitoring tools can help identify and prevent ransomware attacks before they can cause significant damage. While various tools and software solutions are available, it&#8217;s crucial to ensure their seamless integration with existing infrastructure and alignment with essential cybersecurity practices and policies. Strive to uphold a balanced approach, steering clear of excessive software proliferation, which could strain resources required for integration, maintenance, and support.</p>



<ul>
<li><strong>Email Security</strong> <strong>and URL Filtering</strong></li>
</ul>



<p>Deploy robust email security solutions to filter out phishing emails and malicious attachments before they reach user’s inboxes. Use secure mail and encryption for critical email communication to protect and be intercepted by cybercriminals. Incorporating advanced threat protection can effectively detect and halt emails containing ransomware payloads. Apply spam filters that filter unwanted email like bulk and spam messages and allow users to flag and report suspicious mail. Deploy URL filtering tools to ensure users only access safe and secure websites.</p>



<ul>
<li><strong>Network Monitoring</strong>&nbsp;</li>
</ul>



<p>Use network monitoring tools to identify uncommon activities and anomalies that might signal a ransomware attack. Intrusion detection systems and Security Information and Event Management (SIEM) platforms can play a pivotal role in detecting potential threats. Monitor web traffic and inspect potential security risks.&nbsp;</p>



<ul>
<li><strong>Network Segmentation</strong></li>
</ul>



<p>Implement technology to partition the network into distinct zones, each with restricted communication paths, effectively curbing the lateral movement of attackers. This prevents ransomware from spreading across the entire network.</p>



<ul>
<li><strong>Advanced Threat Detection</strong></li>
</ul>



<p>Implementing advanced threat detection solutions that use machine learning and AI to identify anomalous behavior and patterns can help detect and mitigate ransomware attacks in real time.</p>



<ul>
<li><strong>Encryption</strong></li>
</ul>



<p>Deploy storage solutions that have the capability to encrypt sensitive data both at rest and in transit. Encryption adds an extra layer of protection against unauthorized access, even if attackers manage to infiltrate the network.&nbsp;</p>



<ul>
<li><strong>Multi-Factor Authentication (MFA)</strong></li>
</ul>



<p>Deploying authentication solutions enforcing MFA for accessing critical systems and applications adds an additional layer of security, making it harder for attackers to gain unauthorized access.</p>



<ul>
<li><strong>Protect Backups</strong></li>
</ul>



<p>A ransomware attack can encrypt backups preventing a recovery. Malicious code can be replicated or backed up which can cause delay in recovery or loss of data. Choose backup solutions that can effectively protect backups by keeping them air-gapped and immutable.&nbsp;</p>



<ul>
<li><strong>Recovery Environment</strong></li>
</ul>



<p>Organizations should build and actively maintain an isolated recovery environment (IRE), which periodically bridges the air-gap for necessary system updates. This setup can be readily accessed in critical situations to expedite recovery efforts. Deploy recovery solutions that will aid in creating and maintaining an IRE.</p>



<ul>
<li><strong>Ransomware-Specific Tools</strong>&nbsp;</li>
</ul>



<p>Some security solutions are designed to specifically combat ransomware. These tools may include behavior analysis, file recovery mechanisms, and decryption capabilities. These tools also help with minimal Recovery Time Objective (RTO) by providing quicker access to Restore points.</p>



<p>Technology serves as a pivotal pillar in supporting the people and process in the battle against ransomware. <a href="https://docs.vmware.com/en/VMware-Cloud-Disaster-Recovery/index.html">VMware VCDR</a> and <a href="https://www.vmware.com/products/cloud-disaster-recovery/ransomware.html">Ransomware Recovery as a Service</a> is one leading solution that provides comprehensive capabilities to both protect and recover from ransomware attacks.&nbsp;</p>



<p>Stay tuned for the final blog post in this series where we will delve into the best practices for mitigating ransomware risks.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Jumpstart Cloud Smart: Addressing the Cloud Skills Shortage in Healthcare</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/08/31/jumpstart-cloud-smart-addressing-the-cloud-skills-shortage-in-healthcare/</link>
		
		<dc:creator><![CDATA[Samantha Reid]]></dc:creator>
		<pubDate>Thu, 31 Aug 2023 04:24:00 +0000</pubDate>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Healthcare cloud]]></category>
		<category><![CDATA[Healthcare IT]]></category>
		<category><![CDATA[Healthcare multi-cloud]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3620</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-300x200.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-300x200.jpg 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-1024x683.jpg 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-768x512.jpg 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-600x400.jpg 600w, https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466.jpg 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div>In recent years, healthcare organizations have dramatically accelerated cloud adoption. According to research conducted by VMware, 89 percent of healthcare IT (HIT) leaders are currently migrating “all suitable applications from data center to cloud.”1 Global healthcare cloud decision makers cite improvements to security, disaster recovery and business continuity as top reasons for adopting public cloud.2 &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/08/31/jumpstart-cloud-smart-addressing-the-cloud-skills-shortage-in-healthcare/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-300x200.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-300x200.jpg 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-1024x683.jpg 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-768x512.jpg 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466-600x400.jpg 600w, https://blogs.vmware.com/industry-solutions/files/2023/08/72DPIxGettyImages-1189923466.jpg 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>In recent years, healthcare organizations have dramatically accelerated cloud adoption. According to research conducted by VMware, 89 percent of healthcare IT (HIT) leaders are currently migrating “all suitable applications from data center to cloud.”<sup>1</sup> Global healthcare cloud decision makers cite improvements to security, disaster recovery and business continuity as top reasons for adopting public cloud.<sup>2</sup> </p>



<p>In its <a href="https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-ebook-vmware-hybrid-multi-cloud-trends.pdf" target="_blank" rel="noreferrer noopener">Trends in Organizations’ Hybrid and Multi-cloud Strategies report</a>, ESG noted that 70 percent of businesses admit that their organizations have had one or more cloud projects “fail or be delayed due to a lack of skills.”<sup>3</sup> What’s more, 50 percent of HIT leaders think they lack the IT skills on their team to increase their cloud investments.<sup>4</sup></p>



<p>To bridge the skills gap, healthcare providers need to ensure teams are well-versed and supported in multi-cloud technologies and best practices. While formal cloud certifications remain important, organizations should also invest time and resources into formalizing training programs that develop critical cloud skills such as architecture, AI/ML, DevOps, automation, analytics, and other specialized topics like healthcare-specific regulatory requirements. Organizations should focus on training their existing staff and remain committed to continuous learning and development.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>50% of healthcare IT leaders think they lack the IT skills on their team to increase their cloud investments</strong><sup>4</sup></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Of course, training alone isn&#8217;t enough. Healthcare providers need to be sure they have the right technologies, tools and processes in place to accelerate innovation and ensure the safety and security of their data. This means having a comprehensive cloud strategy that takes into account app modernization, hybrid and multi-cloud interoperability, multi-cloud operations, compliance, governance, risk management, and future-proofing; as well as investing in vendors and technologies that facilitate simplicity and interoperability between on-premises and hybrid/multi-cloud infrastructures without the need for extra staff. This second part looks something like this: </p>



<ul>
<li>Implementing and operating full-stack, extensible software-defined services across on-premises and public cloud environments. This can be done for all compute, storage, networking, security and cloud management right from your data center. </li>



<li>Deploying a cloud operating model in your data center. Extend the same operating model to all of your public clouds for operational consistency. </li>



<li>Centralizing monitoring and integrating automation and observability capabilities across your multi-cloud estate to simplify deployment and lifecycle management, and identify and remediate issues in the shortest time possible. </li>
</ul>



<p>In addition, ensure that all IT leaders across the organization are nurturing a culture of innovation, change and partnership within the business. With ransomware an ever-present threat to healthcare organizations, you also need an efficient networking and security architecture with lateral security controls that can detect anomalous behavior and contain and evict threats.</p>



<p>VMware solutions help healthcare providers do more with the resources you have today:</p>



<ul>
<li><strong>Fast, effective, low-risk migrations</strong>: Move VMware vSphere<sup>®</sup>-based applications to the public cloud without refactoring or reconfiguring. </li>



<li><strong>Turnkey cloud infrastructure service</strong>: Leapfrog to a multi-cloud infrastructure and operating model built to meet the stringent requirements of healthcare applications and systems. </li>



<li><strong>Use existing tools and infrastructure</strong>: Empower and up-skill existing staff using the same tools and technologies they know today.</li>



<li><strong>Operate one or more public clouds consistently</strong>: Stay on VMware-consistent infrastructure regardless of cloud and manage existing applications, modern apps and native cloud services using one console.</li>
</ul>



<p>Multi-cloud innovation in healthcare is within every provider&#8217;s reach. <a href="https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-ebook-cloudskills-gapin-healthcare.pdf" target="_blank" rel="noreferrer noopener">Read our newest eBook</a> for more insights on how to leverage existing VMware infrastructure to extend to public cloud affordably and securely. </p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p class="has-small-font-size"><sup>1</sup>VMware. “FY24 Enterprise Operational Excellence Study.” N=120 Healthcare technology decision-makers (Q16). 2023.</p>



<p class="has-small-font-size"><sup>2</sup>Forrester. “The State Of Cloud In Healthcare, 2023.” May 2023.</p>



<p class="has-small-font-size"><sup>3</sup>Enterprise Strategy Group. “Trends in Organizations’ Hybrid and Multi-cloud Strategies.” December 2022.</p>



<p class="has-small-font-size"><sup>4</sup>VMware. “FY24 Enterprise Operational Excellence Study.” N=120 healthcare technology decision makers (Q16). 2023.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>VMware Retail Edge Solution &#8211; A Modern Approach to Retail Store Growth</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/08/22/vmware_retail_edge_solution/</link>
		
		<dc:creator><![CDATA[Arron Lock]]></dc:creator>
		<pubDate>Tue, 22 Aug 2023 12:00:00 +0000</pubDate>
				<category><![CDATA[Industry All]]></category>
		<category><![CDATA[Retail]]></category>
		<category><![CDATA[edge]]></category>
		<category><![CDATA[edge compute stack]]></category>
		<category><![CDATA[Retail IT]]></category>
		<category><![CDATA[vmware retail]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3723</guid>

					<description><![CDATA[Retail Stores and New Technologies The evolution of the retail store is happening at an alarming pace. New concepts, customer requirements and regulatory changes are forcing retailers to adopt new technologies in their stores just to keep up with ever-changing attitudes of buyers, as well as the competition.&#160; VMware Retail Edge allows retailers to transition &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/08/22/vmware_retail_edge_solution/">Continued</a>]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" width="1024" height="683" src="https://blogs.vmware.com/industry-solutions/files/2023/08/GettyImages-672156163-1024x683.jpg" alt="" class="wp-image-3729" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/GettyImages-672156163-1024x683.jpg 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/GettyImages-672156163-300x200.jpg 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/GettyImages-672156163-768x512.jpg 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/GettyImages-672156163-1536x1025.jpg 1536w, https://blogs.vmware.com/industry-solutions/files/2023/08/GettyImages-672156163-2048x1366.jpg 2048w, https://blogs.vmware.com/industry-solutions/files/2023/08/GettyImages-672156163-600x400.jpg 600w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2 class="wp-block-heading" id="h-retail-stores-and-new-technologies">Retail Stores and New Technologies</h2>



<p>The evolution of the retail store is happening at an alarming pace. New concepts, customer requirements and regulatory changes are forcing retailers to adopt new technologies in their stores just to keep up with ever-changing attitudes of buyers, as well as the competition.&nbsp;</p>



<p>VMware Retail Edge allows retailers to transition to a software-defined environment where point-of-sale (POS), loss prevention and other retail front-of-house and back office workloads are shifted to the edge. VMware Retail Edge can work with infrastructure that’s already in place, so the cost of migrating workloads is minimal, which maximizes the ROI.</p>



<h2 class="wp-block-heading" id="h-many-issues-one-solution">Many Issues, One Solution</h2>



<p>With sometimes 100s if not 1000s of stores, rolling out new business services and keeping them secure and compliant throughout their lifespan used to be an extremely difficult process.&nbsp; Recent technologies have enabled new opportunities that stretch from loss prevention through to rapid innovation at scale, like customer hyper-personalization. On too many occasions, however, each can be its own silo, with its own business justification and case. This leads to extra complexity and cost.</p>



<p>Retail stores face many hurdles that technology can ease. Here are some of the issues at hand.</p>



<ul>
<li><strong>Customer Engagement</strong> &#8211; There are many ways that a retailer can add value to the customer’s shopping experience―from buy-online-pickup-in-store (BOPIS) through to in-store interactive digital signage. Behind the scenes, retailers need valuable insights to provide hyper-personalized shopping experiences while optimizing store layout and product placement.</li>



<li><strong>Loss Prevention</strong> &#8211; According to an <a href="https://nrf.com/media-center/press-releases/nrf-reports-retail-shrink-nearly-100b-problem" target="_blank" rel="noreferrer noopener">NRF report</a> Retail experienced nearly $100 billion in theft and fraud in 2022 alone. Traditional security and camera systems are limited in their capabilities―they are heavily reliant on human interaction and may not provide automated real-time alerts for critical events, such as shoplifting, unauthorized access or incidents, like spillages, that require immediate attention. They often lack advanced analytics capabilities to identify patterns and trends, limiting the retailer&#8217;s ability to optimize operations and prevent future negative incidents.</li>



<li><strong>Point-Of-Sale and Back Office &nbsp;</strong>&#8211; Every retailer has customer-facing solutions in the form of POS to transact with customers.&nbsp; Retailers also have a wide variety of other technologies running in the retail front-of-house, including kiosks, self-checkout, digital signage and more, as well as back office services like Store Manager PCs.&nbsp;Each of these end points consists of a hardware device and an operating system. These devices represent a significant investment in time and resources to maintain. Their lifecycles often are out of step and retailers can incur massive tech debt related to the traditional rip and replace deployment models they have been forced into historically.</li>



<li><strong>Store Infrastructure and Space</strong> &#8211; As the retail store continues to evolve, requirements for infrastructure have increased. For most, space often is limited and at a premium. Additionally, IT teams are faced with the challenge of deploying, maintaining and, eventually, replacing systems and applications that are required to run in store. This includes database servers, payment controllers, POS infrastructure, DVRs and more. Where do you put it?</li>
</ul>



<h2 class="wp-block-heading" id="h-vmware-solutions-for-today-s-retail-store">VMware: Solutions for Today’s Retail Store</h2>



<p>VMware Retail Edge Solution<img src="https://s.w.org/images/core/emoji/14.0.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> is built on the VMware Edge Compute Stack and provides the in-store infrastructure foundation that allows retailers to innovate. It leverages the management, security and monitoring tools, as well as the processes, that are already familiar, but at the edge (the store) and it scales! Whether retailers need to run legacy applications or modern ones, they will happily co-exist on VMware Retail Edge, enabling businesses to deploy the much-needed solutions to drive brand sentiment, customer retention and bottom-line margin improvements―all from one platform. </p>



<p>IT teams gain the benefit of working with proven architectures that they have used elsewhere in the business. Since workloads are consolidated, future solutions can be deployed and managed easily. Updates can be scripted and orchestrated using DevOps solutions. And finally, having a “store-in-a-box” approach allows for rapid deployment, as well as the ability to pivot when consumer demands change.</p>



<p class="has-text-align-left"><em>“VMware’s&nbsp;Retail Edge&nbsp;solution&nbsp;transforms the way we can rollout and support our&nbsp;client’s retail stores enabling rapid innovation at scale.&nbsp;&nbsp;Cognizant and VMware enable our retail clients to rapidly deploy and&nbsp;test&nbsp;new technologies in-store, and at point of sale (POS) to</em> <em>provide a&nbsp;seamless,&nbsp;digital&nbsp;customer experience leveraging generative AI services,&nbsp;while optimizing on costs.&nbsp;We can combine the tools we have relied on for years to manage the data center, and new tools to now support hundreds of stores across any geography without a costly hardware upgrade. This vastly simplifies the support model, but also allows us to rapidly deploy new services and technologies&nbsp;for our clients in stores.”</em> &#8211; Scott Headington,&nbsp;Vice President Industry Solutions for Retail&nbsp;at Cognizant.</p>



<h2 class="wp-block-heading" id="h-ok-but-where-do-you-put-it">Ok, But Where Do You Put It?</h2>



<p>New software solutions often require a place to run in the store. Traditionally, IT teams would rack up a new server and, in some cases, deploy additional in-store devices to access the service. Many solutions come to market and test well in a small-scale proof of concept, but never get deployed because of large-scale complexity.</p>



<p>VMware Retail Solutions<img src="https://s.w.org/images/core/emoji/14.0.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> are built with the scale and complexity of retail in mind. VMware is foundational in allowing retailers to be transformational. Retail Edge provides a modern solution for deploying AI workloads, a robust and secure platform for loss prevention, with computer vision-based solutions. This helps to minimize store infrastructure and accelerates digital transformation by enabling the virtualization of retail store infrastructure and end points.</p>



<h2 class="wp-block-heading" id="h-enabling-loss-prevention">Enabling Loss Prevention</h2>



<p>Today, loss prevention efforts are advancing by leaps and bounds by leveraging AI/ML to provide real-time insights and alerts to personnel for faster action. Computer vision is providing the actionable data insights for retailers to become proactive, rather than reactive, in store management.&nbsp;</p>



<p>As computer vision AI becomes more mainstream for retailers, implementing these solutions continues to be a challenge because of the requirement to deploy new infrastructure. And as mentioned, space and cost continue to create hurdles for retailers that can be hard to overcome.</p>



<p>Computer vision AI can identify suspicious in-store behavior or unusual traffic patterns and alert staff as, or before, an incident occurs. Additionally, cameras enabled with AI can monitor shelves for resupply needs to prevent lost revenue and dissatisfied customers.</p>



<p>With VMware, computer vision leaders, such as&nbsp;<a href="https://www.chooch.com/solutions/retail/" target="_blank" rel="noreferrer noopener">Chooch</a>, offer retailers the solutions they need to become more proactive, rather than reactive, in loss prevention, as well as with inventory management and&nbsp;supply chain optimization.</p>



<p>&nbsp;“<em>VMware Retail Edge is a key part of the future of AI Vision solutions for retail loss prevention and supply chain optimization. It is providing a secure digital foundation for deploying secure AI workloads on the edge, across multiple clouds, which allows retailers to&nbsp;increase revenues, improve profits and spend less time on IT infrastructure costs and operations.</em>” &#8211; Anubhav Saxena, President &amp; COO, Chooch.</p>



<h2 class="wp-block-heading" id="h-the-next-step">The Next Step</h2>



<p>If you’d like to learn more about how VMware is changing the retail landscape, please head over to: <a href="https://www.vmware.com/solutions/industry/retail-it-solutions.html">https://www.vmware.com/solutions/industry/retail-it-solutions.html</a></p>



<figure class="wp-block-image"><img alt=""/></figure>



<figure class="wp-block-image"><img alt=""/></figure>



<figure class="wp-block-image"><img alt=""/></figure>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Decoding Operational Resilience: Navigating Industry Regulations in Financial Services</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/08/17/decoding-operational-resilience-navigating-industry-regulations-in-financial-services/</link>
		
		<dc:creator><![CDATA[Joe Chenevey]]></dc:creator>
		<pubDate>Thu, 17 Aug 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Financial Services]]></category>
		<category><![CDATA[Industry All]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[banks]]></category>
		<category><![CDATA[cross cloud]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[multi-cloud]]></category>
		<category><![CDATA[multicloud]]></category>
		<category><![CDATA[vmware]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3712</guid>

					<description><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div>In recent years, with the increasing use of cloud services and reliance on information and communication technology (ICT)&#160;in the industry, financial services regulators have provided extensive Operational Resilience guidance, covering areas such as pandemics, cybersecurity, ICT outsourcing, and ICT third-party risks respectively. Before I describe how VMware offers our financial services customers choice to meet &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/08/17/decoding-operational-resilience-navigating-industry-regulations-in-financial-services/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/08/072723_VMware-5-Dos-Multi-cloud-migration_1280x720_A.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>In recent years, with the increasing use of cloud services and reliance on information and communication technology (ICT)&nbsp;in the industry, financial services regulators have provided extensive Operational Resilience guidance, covering areas such as pandemics, cybersecurity, ICT outsourcing, and ICT third-party risks respectively. Before I describe how VMware offers our financial services customers choice to meet their regulatory compliance demands, how should we understand <strong>“<em>Operational Resilience&#8221; </em></strong>in the context of the financial services industry?</p>



<p>Let’s explore this through examples from prominent regulatory bodies:</p>



<figure class="wp-block-table"><table><tbody><tr><td>Financial Services Regulator&nbsp;</td><td>Definition of Operational Resilience</td></tr><tr><td><a href="https://www.federalreserve.gov/supervisionreg/topics/operational-resilience.htm">US Federal Reserve</a>&nbsp;</td><td>Operational Resilience is the ability to deliver operations, including critical operations and core business lines, through a disruption from any hazard. It is the outcome of effective operational risk management combined with sufficient financial and operational resources to prepare, adapt, withstand, and recover from disruptions. A firm that operates in a safe and sound manner is able to identify threats, respond and adapt to incidents, and recover and learn from such threats and incidents so that it can prioritize and deliver critical operations and core business lines, along with other operations, services, and functions identified by the firm, through a disruption.&nbsp;</td></tr><tr><td><a href="https://ithandbook.ffiec.gov/it-booklets/business-continuity-management/appendix-b-glossary/">Federal Financial Institutions Examination Council (FFIEC)</a>&nbsp;</td><td>The ability of an entity’s personnel, systems, telecommunications networks, activities, or processes to resist, absorb, and recover from or adapt to an incident that may cause harm, destruction, or loss of ability to perform mission-related functions.&nbsp;</td></tr><tr><td><a href="https://www.bis.org/bcbs/publ/d516.htm">Basel Committee on Banking Supervision</a>&nbsp;</td><td>The ability of a bank to deliver critical operations through disruption. This ability enables a bank to identify and protect itself from threats and potential failures, respond and adapt to, as well as recover and learn from disruptive events in order to minimize their impact on the delivery of critical operations through disruption. In considering its operational resilience, a bank should assume that disruptions will occur and take into account its overall risk appetite and tolerance for disruption.&nbsp;</td></tr><tr><td><a href="https://www.bankofengland.co.uk/glossary#chapter-14">Bank of England</a>&nbsp;</td><td>By ‘Operational Resilience’, we mean the ability of firms, and the financial sector as a whole, to absorb and adapt to shocks and disruptions, rather than contribute to them. It extends beyond business continuity and disaster recovery. Financial firms and FMIs must have robust plans in place to deliver essential services, no matter what the cause of the disruption. This includes man-made threats such as physical and cyber attacks, IT system outages, third-party supplier failure, as well as natural hazards such as fire, flood, severe weather, and pandemic.&nbsp;</td></tr><tr><td><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32022R2554#d1e1370-1-1">European Commission &#8211; Digital Operational Resilience Act (DORA)</a>&nbsp;</td><td>‘Digital Operational Resilience’ means the ability of a financial entity to build, assure, and review its operational integrity and reliability by ensuring, either directly or indirectly through the use of services provided by ICT third-party service providers, the full range of ICT-related capabilities needed to address the security of the network and information systems which a financial entity uses, and which support the continued provision of financial services and their quality, including throughout disruptions.&nbsp;</td></tr></tbody></table><figcaption class="wp-element-caption">Table of Operational Resilience Definitions</figcaption></figure>



<p>To summarize, <em><strong>Operational Resilience</strong></em> involves a comprehensive approach to ensuring that essential customer services (e.g. customer banking, payments, etc.) can be delivered continuously regardless of disruptions and that financial services organizations can respond and recover effectively to maintain its critical operations and business functions. Key components include the ability to identify and protect against threats, respond and adapt to disruptive events, and recover and learn from incidents to mitigate their impact on critical operations and core business lines.&nbsp;&nbsp;</p>



<p>Furthermore, here are some examples of how regulators in Europe and North America are strengthening industry regulations around Operational Resilience:&nbsp;</p>



<p><span style="text-decoration: underline;">European Union</span></p>



<p>The Digital Operational Resilience Act (DORA) by the European Commission introduces extensive regulations for managing Digital Operational Resilience, aiming to mitigate risks related to ICT&nbsp;systems and third-party dependencies. DORA seeks to rationalize the fragmented European financial services regulatory landscape by establishing a comprehensive EU-wide framework with no overlaps or gaps. DORA entered into force in January 2023 and shall apply to all EU member states from 17 January 2025.</p>



<p>DORA puts detailed requirements on FS firms across five pillars:</p>



<ul>
<li>Risk management &#8211; firms must have a comprehensive and well-documented ICT risk management</li>



<li>Incident Reporting &#8211; firms must report major ICT-related incidents&nbsp;</li>



<li>Digital operational resilience testing &#8211; firms&#8217; business continuity and disaster recovery plans must deliver high levels of operational resiliency and tested regularly (at least annually)</li>



<li>ICT third-party risk* &#8211; firms must manage ICT third-party risk as part of their overall risk management framework</li>



<li>Information &amp; intelligence sharing &#8211; firms are encouraged to share cyber-threat information to enhance operational resilience of the entire financial system</li>
</ul>



<p>*Under DORA, &#8220;critical&#8221; ICT third-party providers now come under the direct supervision of EU financial services regulators.</p>



<p><span style="text-decoration: underline;">United Kingdom</span></p>



<p>The UK’s supervisory authorities (collectively the Financial Conduct Authority (FCA) and Prudential Regulation Authority (PRA), along with the Bank of England)) initially released its final<a href="https://www.fca.org.uk/publications/policy-statements/ps21-3-building-operational-resilience"> rules and guidelines in March 2021</a>. Financial Services firms in the UK are expected to <a href="https://www.fca.org.uk/firms/operational-resilience">adhere to these requirements</a> to ensure operational resilience by a deadline of 31 March 2025. </p>



<p>Key actions include:</p>



<ul>
<li>Identifying vital business services that could harm consumers, market integrity, firm viability, or financial system stability if disrupted.</li>



<li>Setting impact tolerances for maximum allowable service disruption.</li>



<li>Conducting thorough mapping, testing, and vulnerability assessments.</li>



<li>Undertake lessons learned exercises to enhance response and recovery capabilities.</li>



<li>Creating communication plans for service disruptions.</li>



<li>Preparing self-assessment documentation.</li>
</ul>



<p>And by 31 March 2025:</p>



<ul>
<li>Perform mapping and testing to stay within impact tolerances for crucial business services.</li>



<li>Make necessary investments for consistent operation within impact tolerances.</li>
</ul>



<p><span style="text-decoration: underline;">North America</span></p>



<p>In October 2020, <a href="https://www.occ.gov/news-issuances/bulletins/2020/bulletin-2020-94.html">an interagency paper</a> titled <em>&#8220;Sound Practices to Strengthen Operational Resilience&#8221; </em>was released by the United States Office of the Comptroller of the Currency (OCC), the Board of Governors of the Federal Reserve System, and the Federal Deposit Insurance Corporation collectively. This interagency paper consolidates existing regulations, guidance, and common industry standards in one place to provide a comprehensive approach that banks may use to strengthen and maintain their operational resilience.</p>



<p>The sound practices are anchored by robust operational risk and business continuity management, informed by rigorous scenario analyses and testing, consideration of third-party risks, and planning for alternative service providers where necessary.</p>



<p>Additionally, the Canadian Office of the Superintendent of Financial Institutions (OSFI) has also <a href="https://www.osfi-bsif.gc.ca/Eng/fi-if/rg-ro/gdn-ort/gl-ld/Pages/b10_dft_2022_let.aspx?utm_source=osfi-bsif&amp;utm_medium=email&amp;utm_campaign=osfi-bsif-email">openly discussed</a> issuing more stringent guidance on managing IT operational risks from use and reliance on services from cloud providers and other third-party service providers.&nbsp;</p>



<p class="has-medium-font-size"><strong>What impact does this risk &amp; regulatory environment have on our Financial Services customers?</strong></p>



<p>While regulators offer prudent guidance on key risks that should be considered, firms themselves are directly responsible for identifying operational risks and mitigating them through appropriate risk management and resiliency strategies, including those related to cloud service providers. The days when firms could treat compliance as a checkbox exercise and state a critical service has a “backup” are behind us. Firms need to demonstrate through regular testing they can actually sustain their operations, have further remediation plans enacted, and fully developed exit strategies in place (<a href="https://blogs.vmware.com/industry-solutions/2022/11/21/financial-institutions-the-time-to-plan-a-cloud-exit-is-before-you-need-one/">ahead of when you need one</a>).</p>



<p>Relying on new software or a cloud service is not enough, however. For all <em>“critical”</em> and <em>“important” </em>services, firms need to make sure that they have implemented the solution, run it optimally, and can demonstrate to regulators that they have full visibility, control, and contingency in place.&nbsp; And just as we see a commonality in how the various regulators define terms, financial services firms around the world should expect regulators to continue to talk amongst each other to encourage common prudential guidelines across the world. Much like GDPR, the EU’s DORA is particularly one regulation that we anticipate will have a much wider impact on the financial services industry than just within EU member states.</p>



<p>All things considered, compliance is not such an easy task for banks, insurers, and other financial services firms. &nbsp;It’s become much more than a checkbox exercise; it’s increasingly feeling like a full-contact sport!</p>



<p class="has-medium-font-size"><strong>For Financial Services, Multi-Cloud can provide a solution to the Operational Resiliency challenge!</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" width="1024" height="536" src="https://blogs.vmware.com/industry-solutions/files/2023/08/MCforFSRiskRegDiagram-1024x536.png" alt="" class="wp-image-3714" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/MCforFSRiskRegDiagram-1024x536.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/MCforFSRiskRegDiagram-300x157.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/MCforFSRiskRegDiagram-768x402.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/MCforFSRiskRegDiagram-600x314.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/08/MCforFSRiskRegDiagram.png 1100w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>At VMware, we’re seeing many financial services customers: 1) struggling to execute their public cloud strategies, and 2) adapting their operational models to run critical business systems seamlessly across both the data center and the public cloud. Many of their cloud migration projects have either stalled or exceeded their initial timelines.</p>



<ul>
<li>Correspondingly a <a href="https://www.afme.eu/news/press-releases/details/regulatory-complexity-is-making-it-harder-for-financial-institutions-to-adopt-cloud-services">December 2022 report on cloud adoption in Europe</a> by the Association for Financial Markets in Europe highlights regulatory complexity as a major barrier affecting the pace of cloud adoption within the finance industry.</li>



<li>With an estimated 75% of FSI firms leveraging multiple cloud providers, many financial institutions are embracing a multi-cloud strategy to mitigate operational risk. However, in pursuit of this objective, firms encounter the difficulty of navigating and managing diverse cloud approaches for each CSP, all while ensuring a resilient financial ecosystem.</li>
</ul>



<p>VMware&#8217;s multi-cloud approach for financial services risk/regulate environments combines the use of our VMware SDDC architecture across all clouds (private, public, <a href="https://vmc.techzone.vmware.com/vmware-sovereign-cloud">sovereign</a>, and edge) with our workload migration and DR capabilities. By maintaining a common and consistent architecture, financial institutions can:</p>



<ul>
<li>Develop and operate diverse applications delivering an <a href="https://www.vmware.com/cross-cloud-services.html">agile and scalable cloud experience across multiple cloud providers</a> and on-premises</li>



<li>Ensure continuity of operations during planned DR testing or unplanned outages/disasters</li>



<li>Protect against ransomware and other cyber-threats</li>



<li>Enable seamless migrations between different clouds should firms need to enact cloud provider contingency plans</li>
</ul>



<p>However, not all workloads or financial systems can or will be migrated to the public cloud and regulators are no less concerned with how data center environments operate in the event of instability. For those environments, utilizing <a href="https://www.vmware.com/products/cloud-foundation.html">VMware Cloud Foundation</a>, firms can enjoy the advantages of the same highly available and resilient SDDC architecture on-premises, enabling streamlined operations and efficient utilization of infrastructure in the data center.</p>



<p class="has-medium-font-size"><strong>Key Takeaway for Financial Services Institutions</strong></p>



<p>VMware offers our financial services customers unequivocal choice in both application platform and infrastructure platform layers enabling them to strike a balance between agility and operational resilience!&nbsp;</p>



<p><strong>Runecast Partnership</strong></p>



<p>We’re excited to be working with our partner <a href="https://www.cybersecuritydive.com/press-release/20230814-runecast-showcases-dora-audits-agentless-vmware-scanning-at-vmware-explor/">Runecast</a> to address the challenge financial services firms face in gaining visibility into and managing their EU DORA compliance posture in a multi-cloud world enabled by VMware. More to come on our partnership so stay tuned to VMware’s Industry Solutions blog for updates.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware in Healthcare: Understanding the Challenges</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/08/14/ransomware-in-healthcare-understanding-the-challenges/</link>
		
		<dc:creator><![CDATA[Soma Kancherla]]></dc:creator>
		<pubDate>Mon, 14 Aug 2023 21:54:29 +0000</pubDate>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[HealthcareIT]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3684</guid>

					<description><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div>Ransomware History and News The healthcare ecosystem continues to face persistent challenges due to ransomware attacks, affecting providers, payers, and vendors alike. Becker’s Hospital Review reported that the healthcare industry witnessed its first ransomware attack known as the AIDS Trojan, or the PC Cyborg back in 1989. Despite the passage of 28 years, this sector &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/08/14/ransomware-in-healthcare-understanding-the-challenges/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="169" src="https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-300x169.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-300x169.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-1024x576.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-768x432.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-752x423.png 752w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-576x324.png 576w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D-600x338.png 600w, https://blogs.vmware.com/industry-solutions/files/2023/08/080423_VMware-Healthcare-Ransomware_1280x720_D.png 1280w" sizes="(max-width: 300px) 100vw, 300px" /></div><p><strong>Ransomware History and News</strong></p>



<p>The healthcare ecosystem continues to face persistent challenges due to ransomware attacks, affecting providers, payers, and vendors alike. <a href="http://www.beckershospitalreview.com/healthcare-information-technology/first-known-ransomware-attack-in-1989-also-targeted-healthcare.html">Becker’s Hospital Review</a> reported that the healthcare industry witnessed its first ransomware attack known as the <a href="https://www.knowbe4.com/aids-trojan">AIDS Trojan</a>, or the PC Cyborg back in 1989. Despite the passage of 28 years, this sector remains a prime target for cyber threats, highlighting the critical need to strengthen cybersecurity measures to protect sensitive data and ensure the security of patient information.</p>



<p><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-healthcare-ponemon-report.pdf">A 2022 Ponemon Institute study</a> of healthcare organizations found that 41% of respondents experienced ransomware attacks over the past two years. These ransomware attacks frequently lead to delays in care, affecting patient lives and substantial financial losses.</p>



<p><a href="https://www.sonicwall.com/2023-mid-year-cyber-threat-report/">According to a SonicWall report</a>, approximately 140.1 million ransomware attacks took place worldwide across industries in the first half of 2023. The problem is severe enough that the White House is considering an outright <a href="https://www.ciodive.com/news/white-house-considers-ransom-payment-ban/649734/">ban on ransom payments.</a></p>



<p>The average cost of a data breach reached an all-time high in 2023 of USD 4.45 million as per <a href="https://www.ibm.com/reports/data-breach">report by IBM Security on data breach</a>. However, this did not factor in many costs of ongoing legal battles, damage to the brand and future business, increase in cyber insurance premiums and investment in new technology. Considering these additional costs, the actual financial impact of a data breach can be much higher than the initial estimated average cost.</p>



<p><strong>The Effect of Ransomware in Healthcare</strong></p>



<p>Ransomware attacks impact healthcare providers on four fronts: financial impact, patient care and safety, impact to caregivers and damage to the brand and business. They also present a range of dangers, like completely going out of business, ongoing lawsuits, inability to recover the data completely and so on.</p>



<p>2017’s Wannacry ransomware attack took <a href="https://www.forbes.com/sites/thomasbrewster/2017/05/17/wannacry-ransomware-hit-real-medical-devices/?sh=537c72425cf9">connected medical devices offline </a>at hospitals in the United Kingdom and the United States. In Florida, smart IT work <a href="https://www.msn.com/en-us/news/us/tampa-general-hospital-cyber-attack-unnoticed-for-18-days-but-stopped-before-ransom-attempt/ar-AA1e8VO0">prevented a ransomware attack </a>on Tampa General Hospital. St. Margaret’s Health, a small hospital in Illinois, closed their doors and cited a <a href="https://www.nbcnews.com/tech/security/illinois-hospital-links-closure-ransomware-attack-rcna85983">2021 ransomware attack </a>that delayed months of claims submissions as a contributing factor.</p>



<p><strong>Why Healthcare?</strong></p>



<p>Healthcare is one of the four most-frequently targeted verticals for ransomware attacks, alongside government, education, and finance. The healthcare sector is uniquely vulnerable to ransomware attacks for a number of reasons. Most importantly, healthcare providers have a large number of weak points due to third party vendors, patient data practices, connected medical devices, supply chain issues and outdated systems or software.&nbsp;</p>



<p>Criminals also target healthcare providers because they are soft targets. Healthcare providers have a responsibility to keep patients healthy and alive and are more likely to pay ransoms in many circumstances as a result.</p>



<p>The American Hospital Association, a trade group, <a href="https://www.aha.org/center/cybersecurity-and-risk-advisory-services/ransomware-attacks-hospitals-have-changed">characterizes ransomware attacks on hospitals</a> as “threat-to-life crimes because they directly threaten a hospital’s ability to provide patient care, which puts patient safety at risk.”&nbsp;</p>



<p><strong>What makes Healthcare an easy Target for Ransomware</strong></p>



<p>Let us look at some factors that makes Healthcare an easy target for cyber criminals</p>



<p><strong><em>Legacy Systems</em></strong></p>



<p>One major problem facing healthcare in particular is overreliance on legacy systems. Many clinical systems and medical device vendors often run on outdated software stacks that don’t always support critical ongoing security updates.</p>



<p>Sensitive patient data held on undersecure legacy systems also presents an attractive target for ransomware criminals. Because patient data frequently includes personally identifying information such as date of birth and addresses that aid criminals in identity theft and credit card fraud, protecting it is a necessity.</p>



<p><strong><em>Security, Regulation &amp; Ethical Challenges</em></strong></p>



<p>Healthcare organizations have a strong incentive to safeguard sensitive patient data due to legal obligations and potential consequences. Government regulations, patient privacy laws, and strict penalties create a framework that demands data security. Improperly secured data can lead to various legal complications if a breach occurs, including costly legal battles, damage to reputation, and loss of public trust. Consequently, prioritizing robust data security measures is crucial not only to protect patients but also to avoid potential legal issues and negative impacts on healthcare organizations.</p>



<p>Ransomware attacks on healthcare organizations frequently result in a challenging dilemma. Due to the critical nature of patient outcomes and service delivery, some healthcare organizations opt to pay the ransom demanded by criminals to regain access to their systems. This makes the healthcare sector an appealing target for attackers, knowing that they may get what they demand.</p>



<p>However, this practice creates tensions with government organizations that advocate against paying ransoms. Governments fear that yielding to these demands sets dangerous precedents, encouraging more ransomware attacks in the future.</p>



<p>Furthermore, even when the ransom is paid, there is no guarantee of a full data recovery. Many organizations have faced the grim outcome of not regaining complete control over their data, leading to further complications. In some instances, the attackers have even leaked sensitive data on the internet, exacerbating the damage caused by the initial attack.</p>



<p>Finding a balance between responding to attacks swiftly and responsibly while also avoiding rewarding criminal behavior remains a significant challenge for the healthcare industry.</p>



<p><strong><em>Technological Challenges</em></strong></p>



<p>Bad actors employ diverse attack vectors to distribute ransomware, making it imperative for security teams to be proactive in their response. One of the most concerning methods used by criminals involves exploiting zero-day vulnerabilities. These vulnerabilities are previously unknown to the software vendor and, as a result, have no patches or fixes available at the time of the attack. Prompt remediation actions are crucial for security teams to mitigate the impact of such attacks.</p>



<p>Furthermore, security teams must take a comprehensive approach to safeguarding against ransomware. They need to analyze and secure wider attack surfaces, which may include various locations where critical data and workloads are distributed. This can encompass on-premises software, edge networks, data collection centers, cloud-based or Software-as-a-Service (SaaS) solutions, and more.</p>



<p>Slowed or delayed support for remote administration and access can create vulnerabilities that ransomware attackers may exploit to gain unauthorized access to systems. Additionally, fileless attacks can be leveraged by bad actors to move laterally within a network, making it harder for traditional security measures to detect their presence.</p>



<p>Moreover, ransomware attacks can remain undetected for extended periods, posing significant challenges for prevention and mitigation efforts. <a href="https://www.zdnet.com/article/this-is-how-long-hackers-will-spend-in-your-network-before-deploying-ransomware-or-being-spotted/">Sophos reports an average of 11 days</a> before such attacks are discovered, during which time they can silently wreak havoc on a system, exfiltrate data, or escalate their impact.</p>



<p><strong><em>Resource &amp; Education Gaps</em></strong></p>



<p>The healthcare industry, particularly clinical clients, requires enhanced user education and outreach to address ransomware risks effectively. Organizations must gain a comprehensive understanding of how technology can aid in protecting and recovering from ransomware attacks, rather than relying solely on traditional backup restore methods.&nbsp;</p>



<p>However, the shortage of qualified cybersecurity analysts and engineers poses a significant challenge, making it difficult for many organizations to build robust teams despite available funding. Furthermore, cyber attackers continuously develop more sophisticated techniques, necessitating constant adaptation from cybersecurity teams.&nbsp;</p>



<p>The high cost of maintaining Security Operations Centers further exacerbates resource constraints for many healthcare entities. To tackle these issues, a holistic approach is needed, encompassing improved user training, targeted hiring efforts, and exploring cost-effective alternatives for SOC services.&nbsp;</p>



<p><strong><em>Infrastructure Challenges</em></strong></p>



<p>The absence of standardized infrastructure across the healthcare ecosystem presents an additional hurdle for security experts. Establishing and managing Air-gap Environments and immutable backups is a daunting task, both financially and technically. Since there are no universal solutions for protecting against ransomware attacks, security teams must tailor and optimize their approaches, often integrating multiple solutions.&nbsp;</p>



<p>Furthermore, interoperability demands at many organizations necessitate API and other integrations, which can increase the risk of ransomware attacks by exposing systems to potential vulnerabilities. This lack of standardization and the need for customized solutions create complex challenges that healthcare organizations must address to effectively protect their systems and data from ransomware threats.</p>



<p><strong><em>Cost Challenges</em></strong></p>



<p>Providers and vendors in the healthcare ecosystem encounter numerous cost challenges that can complicate ransomware defense efforts. While not specific to healthcare, these financial constraints impact the implementation of robust cybersecurity measures. Cybersecurity tools and software, in particular, can be costly to procure and implement. Additionally, the complexity involved in integrating and managing these tools further adds to the financial burden.&nbsp;</p>



<p>Insurance-related challenges add to the complexity of ransomware defense in the healthcare industry. Cybersecurity insurance premiums that include coverage for ransomware incidents can be prohibitively expensive, especially for high-risk organizations. In some cases, insurers are even refusing to provide coverage to organizations deemed to have significant vulnerability to ransomware attacks, further exacerbating the issue.</p>



<p>Comprehensive ransomware defense audits, which encompass penetration testing and recovery drills, are crucial spending areas to assess and strengthen an organization&#8217;s resilience against ransomware threats. However, these audits can be costly.&nbsp;</p>



<p>While they provide strong defenses, some organizations are also hesitant to implement widespread encryption and firewall systems as those can cause slowness and decrease performance which can affect the bottomline. Managing encryption keys and configuring firewall rules can be complex and time-consuming tasks, requiring specialized expertise and resources. Some organizations may be reluctant to invest in the necessary infrastructure and personnel to implement and maintain these security measures.</p>



<p>Finally, maintaining a comprehensive and effective security operations center (SOC) requires a dedicated team of skilled professionals who can monitor, detect, and respond to security incidents around the clock. The cost of hiring and retaining such cybersecurity experts can be significant, especially in the face of a cybersecurity talent shortage.</p>



<p>While they are expensive, all of these defenses and strategies can prevent the significant damage to patient outcomes, organizational finances, and public reputation that many ransomware attacks result in.</p>



<p><strong>What’s Next?</strong></p>



<p>Now that we understand the challenges<strong> </strong>of Ransomware in Healthcare, in our next two posts, we will focus on the industry&#8217;s response to protect against these threats. We will briefly explore the diverse range of solutions available to tackle the healthcare ransomware challenge and shed light on effective strategies for mitigating the risk and facilitating recovery in case of an attack. Stay tuned for parts 2 and 3 of this series for more valuable insights on safeguarding healthcare systems and patient data in the face of this persistent cyber threat.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meet Leading Healthcare Experts at the Explore Las Vegas Healthcare Workshop</title>
		<link>https://blogs.vmware.com/industry-solutions/2023/08/14/meet-leading-healthcare-experts-at-the-explore-las-vegas-healthcare-workshop/</link>
		
		<dc:creator><![CDATA[Enrique Estrada]]></dc:creator>
		<pubDate>Mon, 14 Aug 2023 20:25:03 +0000</pubDate>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[VMware Explore]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/industry-solutions/?p=3672</guid>

					<description><![CDATA[<div><img width="300" height="167" src="https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-300x167.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-300x167.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-1024x570.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-768x428.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-1536x855.png 1536w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-2048x1140.png 2048w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-600x334.png 600w" sizes="(max-width: 300px) 100vw, 300px" /></div>Are you ready to unleash the potential of AI in your healthcare organization? The integration of artificial intelligence (AI) in healthcare has emerged as a groundbreaking paradigm, poised to revolutionize the accessibility, quality, and cost of care. But do you have the right strategy to unlock its full potential? Join us for this interactive workshop &#8230; <a href="https://blogs.vmware.com/industry-solutions/2023/08/14/meet-leading-healthcare-experts-at-the-explore-las-vegas-healthcare-workshop/">Continued</a>]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="167" src="https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-300x167.png" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" style="margin-bottom: 10px;" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-300x167.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-1024x570.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-768x428.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-1536x855.png 1536w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-2048x1140.png 2048w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-600x334.png 600w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>Are you ready to unleash the potential of AI in your healthcare organization?</p>



<p>The integration of artificial intelligence (AI) in healthcare has emerged as a groundbreaking paradigm, poised to revolutionize the accessibility, quality, and cost of care. But do you have the right strategy to unlock its full potential? Join us for this interactive workshop that includes perspectives on key enabling technology and insights from leading healthcare IT professionals.</p>



<p>At this session, you will:</p>



<ul>
<li>Gain key insights from panelists who will share their best practices and challenges they face when integrating AI</li>



<li>Explore the AI use cases that can materially improve the quality of patient care</li>



<li>Share perspectives on tech solutions that enable healthcare providers to innovate faster</li>



<li>Learn how generative AI can safely free healthcare practitioners from overburden </li>



<li>Dig into the ethics and policies needed for using AI in healthcare settings</li>
</ul>



<figure class="wp-block-image size-large"><img decoding="async" loading="lazy" width="1024" height="570" src="https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-1024x570.png" alt="" class="wp-image-3676" srcset="https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-1024x570.png 1024w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-300x167.png 300w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-768x428.png 768w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-1536x855.png 1536w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-2048x1140.png 2048w, https://blogs.vmware.com/industry-solutions/files/2023/08/Unknown-1-600x334.png 600w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Meet our Guest Speakers:</p>



<ul>
<li>Peter Shen, Head of Digital &amp; Automation &#8211; North America, Siemens Healthineers &#8211; <a href="https://www.linkedin.com/in/peterhshen?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAARIBJUBzvF-gMvhSVw0qvobFZ6aiR9Dyz0&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3Bqk%2BuvjmfR5Wpu%2FAXP67BdA%3D%3D">LinkedIn</a></li>



<li>John Henderson: VP and CIO Children’s Hospital of Orange County &#8211; <a href="https://www.linkedin.com/in/john-henderson-926728?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAbcS4BhdHX-pieCGJuYU23dmcvuHRhKiI&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BfYvoKcgKRaWw1ltRK7ScpQ%3D%3D">LinkedIn</a></li>



<li>(Host) Enrique Estrada: Sr. Director Healthcare Industry Solutions,  VMware &#8211; <a href="https://www.linkedin.com/in/enrique-estrada-8ba150?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAFZg4BcWfhTB3trM3T8mxjiN5tr0WbooY&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3B6zg2zDXVR4GVhDwJcG0rOg%3D%3D">LinkedIn</a></li>



<li>(Host) Michael Robinson: Vice President Healthcare, North America &#8211; <a href="https://www.linkedin.com/in/robinsonhealth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAB5940BUWw2vg8tjSojYJb7wL39klCsSRk&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BALIDSVzUTsS%2FPasRVH4t0A%3D%3D">LinkedIn</a></li>
</ul>



<p><strong>Don’t miss out!</strong></p>



<p>This session will showcase real-world examples where generative AI and AI/ML can successfully enhance patient outcomes and improve the clinical decision-making process at the point of care. Learn what it takes to become AI-ready for your enterprise.</p>



<p><strong>Workshop Details:</strong></p>



<p>VMware Explore Las Vegas: Session ID: INDT2713LV</p>



<p>Unleashing the Potential of AI in Healthcare for Improving Access and Quality of Care</p>



<ul>
<li>The Venetian Las Vegas</li>



<li>Monday, Aug 21</li>



<li>2:00 PM – 3:30 PM PDT</li>



<li>Level 3, Lido 3005</li>
</ul>



<p>Register here:</p>



<p><a href="https://event.vmware.com/flow/vmware/explore2023lv/content/page/catalog?tab.contentcatalogtabs=1627421929827001vRXW&amp;search=2713">https://event.vmware.com/flow/vmware/explore2023lv/content/page/catalog?tab.contentcatalogtabs=1627421929827001vRXW&amp;search=2713</a></p>



<p><br></p>



<p></p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
