Get notifications!

Your Hospital's Vulnerable: Here's How to Protect Against BlueKeep

On May 14, 2019, Microsoft published an advisory for a newly discovered remote code execution vulnerability. Given the identifier CVE-2019-0708, the vulnerability has been more popularly named "BlueKeep".

FAQ: Can’t My NAC Track & Knock Back an HIT Attack?

Unless you’ve been living under a rock for the last 10 years, you’ve heard of the Internet of Things, or IoT as it’s commonly abbreviated. The subset of IoT belonging specifically to healthcare and its supporting technologies is called the Internet of Medical Thin...

Cybersecurity and Medical Equipment Inventory Management: A Case for Symbiosis

Hospitals have an average of 15 to 20 devices per bed, which means even a comparatively small 100-bed hospital is home to thousands of medical devices, most of which are connected to the hospital network....

Best Practices for End of Product Life Health Technology Management

Today’s hospitals are centers of advanced technology, with upwards of several thousand medical devices and clinical assets under their roof. The US is home to 6,210 hospitals, each with 50 to 500 beds and 10-15 networked devices per bed. According to the American ...

Load Posts

Why Cybersecurity Needs to Be a Part of Medical Device SOP Training

Cybersecurity is currently one of health care’s largest concerns. The unlawful manipulation of medical devices locally, or more recently remotely, via malware and ransomware attacks, represents...

Cybersecurity: Key to the Hospital Strategic Planning Process

Hospitals operate in a challenging environment: relationships with insurers, state as well as federal rules and regulations, staff shortages, emerging treatments, new clinical technologies, and...

5 Frightening Real-Life Cyber-Attacks You Probably Never Heard About

It’s often said there’s a statistic to support any story you want to tell, a fact that’s borne out by the worrying increase in fake news, but some are repeated so often they’re worth listening to:

Fortifying HIT Network Security with Endpoint Detection & Response

Spurred by competition, razor-thin operating margins, and government regulation, healthcare organizations are under immense pressure to quickly and regularly implement new technologies.

Why General IoT Security Solutions Can't Handle Healthcare Threats

The rush to adopt IoT devices in consumer and business markets is well documented, but the scale of uptake comes at a cost: the increased risk of cyber attack. More connected devices and the...

MedTech Cybersecurity 101

The world is changing; and while there may never have been a time when that statement was not true, it seems particularly true today. Change these days seems to be a lot more aggressive and...

Healthcare Cybersecurity Predictions for 2019

Like most business units at this time of year, biomedical and clinical teams will be reflecting on the last 12 months and trying, as best they can, to figure out what the new year will bring....

Spectre, Meltdown, and the Internet of Medical Things: A Retrospective

It’s been a year since Spectre and Meltdown — the hardware vulnerabilities discovered collaboratively by Google’s Project Zero and others — went public. Those vulnerabilities rightly garnered...

12 Top Healthcare Conferences Not to Be Missed in 2019

Each year there are countless conferences and events focused on healthcare management and technology, but with so many options, it can be difficult to pick the right ones for your specific...

Emerging MedTech Trends to Keep an Eye On In 2019

Subject to stringent regulatory regimes with considerable legacy complications hindering new infrastructure, technology, or processes — most hospitals are also saddled with significant...

How Leading Cybersecurity Solutions Cover Hospitals

Medical devices are often the weak point in a hospital’s technology landscape and, if compromised, could affect patient privacy, health, and safety. The concern is even greater since medical...

Obstacles on the Path to Comprehensive IoMT Security

Use of the Internet of Medical Things (IoMT) in hospitals is growing. IP addressable medical technologies help deliver personalized care more quickly, give healthcare professionals access to...

What Is Cybersecurity All About for Hospitals

Picture this: you're a doctor at Holy Mountain’s Heart & Vascular Center. You're running late. Rushing past a waiting room full of patients in need of care, you hurry to your office and unlock the...

Why Are More Robust Medical Cybersecurity Measures Even Needed?

It seems that every day we hear about the need for more and better medical cybersecurity measures, but why? We don’t hear about the need for retailers to improve shoplifting prevention mechanisms....

Leveraging Machine Learning to Automate Medical Device Insights

Machine learning is totally transforming the healthcare industry; from how patient care is delivered, to how laboratory procedures are conducted, to diagnostics, all the way to how information...

Better Passwords Key to Bridging the Medical Data Security Gap

By now, most of us are familiar with the “WannaCry” ransomware attack. This attack exploited a weakness in Microsoft's Windows operating system to encrypt files and render computers useless until...

Healthcare Industry Cybersecurity Tips & Tricks

I won't sugar coat it. Hospitals are seen by hackers as "soft" and valuable targets. The modern medical facility is connected to the internet in a multitude of ways. These connections include...

Protect & Defend: How A Zero-Day Vulnerability Is Disclosed & Closed

CyberMDX made news recently when its research and analysis team identified and responsibly disclosed two serious and hitherto unknown medical device vulnerabilities.

The Problem with the Medical Device Industry that The Bleeding Edge Ignores

Directed by Oscar-nominated filmmakers Kirby Dick and Amy Ziering, the new Netflix documentary, The Bleeding Edge, profiles five people who suffered horrendously when the medical devices on which...

Why Hospital CEOs Should Worry About Medical Device Cybersecurity

Medical devices can be your best asset and your worst nightmare. X-ray machines, defibrillators, and other medical electronics are life-saving technologies, but they can also be easily hacked if...

How to Digitally Secure Fast-Evolving & Emerging Health Technologies

Cybercrime is nuanced, and while most medical facilities think they are secure, undiscovered security gaps are being exploited every day. And, it’s not always easy to detect a breach.

Top Cybersecurity Questions Hospital CISOs Must Be Ready to Answer

Your CISO has a big job: develop network security processes and procedures, while addressing privacy, confidentiality and compliance standards, while investigating and managing health information...

Insights on Medical Cybersecurity Trends, Technologies and Strategies

You cannot secure what you do not see. How do you know that there is not a malicious file embedded within this text if you don't even know that the text is here? To achieve comprehensive...

MOST READ POSTS

MOST RECENT POSTS

POSTS BY TAGS


──────
Give a Little Love and It All Comes Back to You!

healthcare-industry-report