The current healthcare cyber threat landscape demands strict, sophisticated security controls and constant monitoring. But the ongoing cybersecurity workforce shortage has left many organizations scrambling to safeguard data and prevent...
Both Taylor Regional Hospital (TRH) in Kentucky and East Tennessee Children's Hospital (ETCH) are beginning the long journey to cybersecurity incident recovery.
Two separate security incidents...
Public, private, hybrid, and multi-cloud architectures are gaining traction in healthcare, but industry clouds may be the next big thing in cloud computing. As the name suggests, industry clouds offer sector-specific cloud solutions to...
The current cyber threat landscape calls for sophisticated defense in depth strategies that allow organizations to adapt and respond to healthcare cyberattacks and vulnerabilities.
The National Institute of Standards and Technology (NIST)...
As healthcare organizations continue to integrate connected medical devices into everyday clinical care, it is imperative that providers recognize and prepare for medical device security risks that...
Distributed denial-of-service (DDoS) attacks flood a victim’s network with traffic, rendering network resources unusable. Often, DDoS attacks serve as a distraction while bad actors deploy more sinister malware on their...
Cyber resiliency is the armor that healthcare organizations need to defend against cybercriminals. Equipped with the tools to prevent, prepare, and respond, organizations can significantly reduce the...
The US Food and Drug Administration’s (FDA) Center for Devices and Radiological Health recently released best practices for communicating medical device vulnerabilities to patients and caregivers...
With one wrong click, a healthcare phishing attack can take down entire networks, encrypt files, and put patient data in jeopardy. The smartest attackers take advantage of victims by claiming to be a...
In a public notice, the Federal Communications Commission (FCC) concluded its assessment on the widespread adoption of the Hospital Robocall Protection Group’s (HRPG) best practices. The FCC...
The National Security Agency released new guidance designed to help organizations across all sectors mitigate cloud vulnerabilities, including identifying cloud security components, threat actors, and...