SurgSecure

PBM – Case Study

How Surg Helped a PBM Provider Reconcile
their Hybrid Security Environment with the Right Tech

For Pharmacy Benefits Managers (PBMs), centralised pharmacy claims information is a mission-critical element that allows them to identify fraud, waste, and other potential savings for both insurers and pharmacies. In other words, data is invaluable to them.

As they operate at the nexus of crucial healthcare data flow, managing information effectively is key to maintaining the quality and efficacy of decision-making for everyone involved, from manufacturers to insurers.

As custodians of sensitive data, which includes the likes of health records, prescription data, and member demographics, PBMs are prime targets for malicious actors who aim to exploit the rich veins of confidential health information.

With stakes that high, PBMs must shift their mindsets from mere defence to proactive cybersecurity. Of course, cutting-edge technology is a key part of this imperative to outmanoeuvre potential breaches and ensure seamless delivery of healthcare benefits.

The Question

Our client, a mid-tier PBM, grappled with escalating cyber threats, primarily stemming from its hybrid infrastructure that meshed on-premises hardware with cloud-based services.

This blend not only broadened the attack landscape but also magnified the complexity of safeguarding health data against increasingly sophisticated cyber attacks.

How do you reconcile the discrepancy formed by the coexistence of on-prem and cloud solutions in the same company infrastructure?

The Hurdles

The fusion of cloud and on-premise technologies brought unique challenges—opaque visibility across networks and pronounced gaps in cybersecurity knowledge within the internal team.

These factors brewed a perfect storm for potential security incidents, necessitating a more focused, robust, and responsive cyber defence approach.

The Answer

Recognizing the urgent need for a unified security stack, we at Surg issued the adoption of several key technologies for the company’s tech stack.

This strategic choice for the technology was taken into consideration after a thorough process comprising five interconnected sessions, which included:

Discovery

Our initial step involved an intricate analysis of internal architectural documents and logs to pinpoint the exact locations—sites and APIs—that required urgent fortification. This meticulous review allowed us to tailor our approach, focusing on areas most susceptible to infiltration, thereby optimizing our resource allocation for maximum impact.

Implementation

Following the discovery phase, we segmented the identified IP addresses into functional units to facilitate a phased approach to DNS migration. This methodical process streamlined the migration and ensured minimal disruption to ongoing operations. Each phase of the DNS migration was meticulously executed, with subsequent monitoring protocols put in place to oversee the newly configured IP blocks.

Monitoring

Post-migration, our focus shifted to continuous monitoring of traffic across each IP address. This constant tab helped us detect and assess malicious activities in real-time. Each identified threat was logged along with the remediation, creating a comprehensive database for ongoing analysis and future reference.

Remediation

Our remediation strategy centred on minimizing the attack surface. By analyzing traffic patterns, we identified and subsequently decommissioned non-essential sites and APIs. This pruning process reduced unnecessary digital exposure and enhanced the security of the network infrastructure.

Blocking

With the network now optimized and the unnecessary exposure points eliminated, we activated Advanced Bot Protection. This final layer of defence was crucial in safeguarding the renewed digital environment and blocking any residual or new malicious attempts.

The Tools

The Outcome

Here’s what our collaboration achieved post-implementation:

The Learning

A hybrid cybersecurity setup isn’t an automatic failure if it’s supported by the right technologies and implemented correctly.

Don’t Wait for a Breach! Secure Your Future Today!

Get in touch with SurgSecure now to explore our tailored security solutions and take the first step towards a safer, more resilient business.

image