<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://www.cybermdx.com/blog</link>
    <description>Please join us as we push the conversation on healthcare management and cybersecurity ever-forward. Let this be your one-stop-shop for the technological trends, best practice techniques, and cyber insights to guide your IoMT strategy.</description>
    <language>en</language>
    <pubDate>Wed, 05 Aug 2020 16:36:10 GMT</pubDate>
    <dc:date>2020-08-05T16:36:10Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>4 IoT Use Cases That Are Changing the Face of Healthcare</title>
      <link>https://www.cybermdx.com/blog/4-iot-use-cases-that-are-changing-the-face-of-healthcare</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/4-iot-use-cases-that-are-changing-the-face-of-healthcare" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/iot-use-cases-in-healthcare.jpg" alt="iot-use-cases-medical" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="text-align: left;"&gt;Medicine has not been immune to the wave of digitization that’s reshaped so many other aspects of life. With the growth of IoT and the advent of its corollary IoMT (Internet of Medical Things), the paradigm for modern healthcare has shifted. Indeed, estimates suggest that the healthcare IoT market is expected to grow at a &lt;a href="https://www.globenewswire.com/news-release/2020/03/19/2003195/0/en/Internet-of-Things-IoT-in-Healthcare-Market-is-Expected-to-Grow-at-a-CAGR-of-29-9-to-Reach-322-2-billion-by-2025-Meticulous-Research.html"&gt;CAGR of 29.9 percent to reach $322.2 billion by 2025&lt;/a&gt;.&lt;em&gt;&lt;/em&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/4-iot-use-cases-that-are-changing-the-face-of-healthcare" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/iot-use-cases-in-healthcare.jpg" alt="iot-use-cases-medical" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="text-align: left;"&gt;Medicine has not been immune to the wave of digitization that’s reshaped so many other aspects of life. With the growth of IoT and the advent of its corollary IoMT (Internet of Medical Things), the paradigm for modern healthcare has shifted. Indeed, estimates suggest that the healthcare IoT market is expected to grow at a &lt;a href="https://www.globenewswire.com/news-release/2020/03/19/2003195/0/en/Internet-of-Things-IoT-in-Healthcare-Market-is-Expected-to-Grow-at-a-CAGR-of-29-9-to-Reach-322-2-billion-by-2025-Meticulous-Research.html"&gt;CAGR of 29.9 percent to reach $322.2 billion by 2025&lt;/a&gt;.&lt;em&gt;&lt;/em&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2F4-iot-use-cases-that-are-changing-the-face-of-healthcare&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 04 Aug 2020 10:13:00 GMT</pubDate>
      <author>alextate07@gmail.com (Alex Tate)</author>
      <guid>https://www.cybermdx.com/blog/4-iot-use-cases-that-are-changing-the-face-of-healthcare</guid>
      <dc:date>2020-08-04T10:13:00Z</dc:date>
    </item>
    <item>
      <title>The New Normal: How COVID-19 Is Complicating MedTech &amp; HIT Management</title>
      <link>https://www.cybermdx.com/blog/the-new-normal-how-covid-19-is-complicating-medtech-hit-management</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-new-normal-how-covid-19-is-complicating-medtech-hit-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/covid-hit-security-management.png" alt="The New Normal: How COVID-19 Is Complicating MedTech &amp;amp; HIT Management" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Bearing the weight of a global pandemic, the healthcare system is struggling with medical surge and runs on vital equipment. Sadly, hospitals have also been beset by a marked increase in cybercrime — threatening their very efficiency, safety, and security.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-new-normal-how-covid-19-is-complicating-medtech-hit-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/covid-hit-security-management.png" alt="The New Normal: How COVID-19 Is Complicating MedTech &amp;amp; HIT Management" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Bearing the weight of a global pandemic, the healthcare system is struggling with medical surge and runs on vital equipment. Sadly, hospitals have also been beset by a marked increase in cybercrime — threatening their very efficiency, safety, and security.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fthe-new-normal-how-covid-19-is-complicating-medtech-hit-management&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare risk management</category>
      <pubDate>Tue, 28 Jul 2020 14:51:23 GMT</pubDate>
      <author>amir_v@cybermdx.com (Amir Vashkover)</author>
      <guid>https://www.cybermdx.com/blog/the-new-normal-how-covid-19-is-complicating-medtech-hit-management</guid>
      <dc:date>2020-07-28T14:51:23Z</dc:date>
    </item>
    <item>
      <title>Coronavirus &amp; Work From Home Security</title>
      <link>https://www.cybermdx.com/blog/coronavirus-work-from-home-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/coronavirus-work-from-home-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/coronavirus-work-from-home-security.jpg" alt="Coronavirus-work-from-home-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;With the outbreak of the novel coronavirus came shelter-in-place orders and the common sense desire to keep people away from potential virus hotspots. For hospitals, that's resulted in a very serious effort to move non-essential employees to a work-from-home model.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/coronavirus-work-from-home-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/coronavirus-work-from-home-security.jpg" alt="Coronavirus-work-from-home-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;With the outbreak of the novel coronavirus came shelter-in-place orders and the common sense desire to keep people away from potential virus hotspots. For hospitals, that's resulted in a very serious effort to move non-essential employees to a work-from-home model.&amp;nbsp;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fcoronavirus-work-from-home-security&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare network security</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>General IT security threats</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 16 Jul 2020 20:15:00 GMT</pubDate>
      <author>amir_v@cybermdx.com (Amir Vashkover)</author>
      <guid>https://www.cybermdx.com/blog/coronavirus-work-from-home-security</guid>
      <dc:date>2020-07-16T20:15:00Z</dc:date>
    </item>
    <item>
      <title>Coronavirus, Telemedicine, and Security</title>
      <link>https://www.cybermdx.com/blog/coronavirus-telemedicine-and-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/coronavirus-telemedicine-and-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/telemedicine-security.jpg" alt="coronavirus-telemedicine-and-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;With the outbreak of the novel coronavirus crisis, hackers smell blood in the water. Focused on addressing the crisis, already stretched super thin, and forced to improvise at each new turn, healthcare organizations in particular present an attractive target for hackers.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/coronavirus-telemedicine-and-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/telemedicine-security.jpg" alt="coronavirus-telemedicine-and-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;With the outbreak of the novel coronavirus crisis, hackers smell blood in the water. Focused on addressing the crisis, already stretched super thin, and forced to improvise at each new turn, healthcare organizations in particular present an attractive target for hackers.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fcoronavirus-telemedicine-and-security&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <category>General IT security threats</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 02 Jul 2020 06:38:00 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/coronavirus-telemedicine-and-security</guid>
      <dc:date>2020-07-02T06:38:00Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>3 Security Considerations for Hospitals Moving to Cloud Infrastructure</title>
      <link>https://www.cybermdx.com/blog/3-security-considerations-for-hospitals-moving-to-cloud-infrastructure</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/3-security-considerations-for-hospitals-moving-to-cloud-infrastructure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/hospitals-moving-to-cloud-infrastructure.jpg" alt="hospitals-moving-to-cloud-infrastructure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The embrace of cloud solutions in healthcare has been accelerating at a frenetic pace. Since the introduction of the &lt;a href="https://www.healthcare.gov/glossary/affordable-care-act/"&gt;&lt;span&gt;Affordable Care Act&lt;/span&gt;&lt;/a&gt;&lt;span&gt; which compelled the adoption of Electronic Medical Records (EMR) and supporting systems, US hospitals have been more open to not only digitizing their processes, but to decentralizing their information technology infrastructure and moving cloud-ward.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/3-security-considerations-for-hospitals-moving-to-cloud-infrastructure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/hospitals-moving-to-cloud-infrastructure.jpg" alt="hospitals-moving-to-cloud-infrastructure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The embrace of cloud solutions in healthcare has been accelerating at a frenetic pace. Since the introduction of the &lt;a href="https://www.healthcare.gov/glossary/affordable-care-act/"&gt;&lt;span&gt;Affordable Care Act&lt;/span&gt;&lt;/a&gt;&lt;span&gt; which compelled the adoption of Electronic Medical Records (EMR) and supporting systems, US hospitals have been more open to not only digitizing their processes, but to decentralizing their information technology infrastructure and moving cloud-ward.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2F3-security-considerations-for-hospitals-moving-to-cloud-infrastructure&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Wed, 24 Jun 2020 15:29:34 GMT</pubDate>
      <author>rahul@arkenea.com (Rahul Varshneya)</author>
      <guid>https://www.cybermdx.com/blog/3-security-considerations-for-hospitals-moving-to-cloud-infrastructure</guid>
      <dc:date>2020-06-24T15:29:34Z</dc:date>
    </item>
    <item>
      <title>Ripple20: Why this Latest Bundle of Related CVEs Is Making Waves</title>
      <link>https://www.cybermdx.com/blog/ripple20-why-this-latest-bundle-of-related-cves-is-making-waves</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/ripple20-why-this-latest-bundle-of-related-cves-is-making-waves" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Ripple20-19-related%20CVEs.jpg" alt="Ripple20: Why this Latest Bundle of Related CVEs Is Making Waves" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Yesterday CISA released an advisory for nineteen previously unknown vulnerabilities affecting &lt;a href="https://treck.com/"&gt;Treck's&lt;/a&gt; embedded TCP/IP stack (also known as a network stack). This disclosure was the result of some very meticulous and dedicated research on the part of JSOF, beginning in September 2019. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/ripple20-why-this-latest-bundle-of-related-cves-is-making-waves" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Ripple20-19-related%20CVEs.jpg" alt="Ripple20: Why this Latest Bundle of Related CVEs Is Making Waves" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Yesterday CISA released an advisory for nineteen previously unknown vulnerabilities affecting &lt;a href="https://treck.com/"&gt;Treck's&lt;/a&gt; embedded TCP/IP stack (also known as a network stack). This disclosure was the result of some very meticulous and dedicated research on the part of JSOF, beginning in September 2019. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fripple20-why-this-latest-bundle-of-related-cves-is-making-waves&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>General IT security threats</category>
      <pubDate>Wed, 17 Jun 2020 21:05:56 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/ripple20-why-this-latest-bundle-of-related-cves-is-making-waves</guid>
      <dc:date>2020-06-17T21:05:56Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Five Nearly Universal Enterprise Information Security Best Practices</title>
      <link>https://www.cybermdx.com/blog/five-nearly-universal-enterprise-information-security-best-practices</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/five-nearly-universal-enterprise-information-security-best-practices" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/universal-info-sec-best-practices-2.png" alt="Five Nearly Universal Enterprise Information Security Best Practices" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span style="background-color: transparent;"&gt;In the world of enterprise information security, the specific areas of knowledge and expertise that set you apart in your current situation might not be as directly and immediately applicable to a different IT environment or different professional circumstances. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/five-nearly-universal-enterprise-information-security-best-practices" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/universal-info-sec-best-practices-2.png" alt="Five Nearly Universal Enterprise Information Security Best Practices" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span style="background-color: transparent;"&gt;In the world of enterprise information security, the specific areas of knowledge and expertise that set you apart in your current situation might not be as directly and immediately applicable to a different IT environment or different professional circumstances. &lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Ffive-nearly-universal-enterprise-information-security-best-practices&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>HIT professional advancement</category>
      <category>General IT security threats</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 19 May 2020 16:22:23 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/five-nearly-universal-enterprise-information-security-best-practices</guid>
      <dc:date>2020-05-19T16:22:23Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>How Network Analytics Can Enhance Biomedical Engineering Workflows</title>
      <link>https://www.cybermdx.com/blog/how-network-analytics-can-enhance-biomedical-engineering-workflows</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-network-analytics-can-enhance-biomedical-engineering-workflows" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/network-analytics-enhance-biomedical-engineering-workflows.jpg" alt="network-analytics-enhance-biomedical-engineering-workflows" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In large organizations it's only natural for most of the workforce to ignore network analytics — mentally relegating it to the&amp;nbsp; domain of IT and IT alone. In hospitals, more often than not, that type of mentality proves a mistake. The insights extracted via network analytics offer serious opportunities for operational improvements and added value across departments. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-network-analytics-can-enhance-biomedical-engineering-workflows" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/network-analytics-enhance-biomedical-engineering-workflows.jpg" alt="network-analytics-enhance-biomedical-engineering-workflows" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In large organizations it's only natural for most of the workforce to ignore network analytics — mentally relegating it to the&amp;nbsp; domain of IT and IT alone. In hospitals, more often than not, that type of mentality proves a mistake. The insights extracted via network analytics offer serious opportunities for operational improvements and added value across departments. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhow-network-analytics-can-enhance-biomedical-engineering-workflows&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Wed, 06 May 2020 15:53:54 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/how-network-analytics-can-enhance-biomedical-engineering-workflows</guid>
      <dc:date>2020-05-06T15:53:54Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>Put Your Knowledge to the Test: Connected Medical Device Risk Exposure</title>
      <link>https://www.cybermdx.com/blog/test-your-knowledge-the-state-of-connected-medical-device-risk-exposure</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/test-your-knowledge-the-state-of-connected-medical-device-risk-exposure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/test-your-knowledge-of-connected-medical-device-risk-1.png" alt="test-your-knowledge-connected-medical-device-risk-exposure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In times like these, we could all use a distraction. With that in mind, we've created this short quiz on the state of connected healthcare and its digital risks.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/test-your-knowledge-the-state-of-connected-medical-device-risk-exposure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/test-your-knowledge-of-connected-medical-device-risk-1.png" alt="test-your-knowledge-connected-medical-device-risk-exposure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In times like these, we could all use a distraction. With that in mind, we've created this short quiz on the state of connected healthcare and its digital risks.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Ftest-your-knowledge-the-state-of-connected-medical-device-risk-exposure&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 28 Apr 2020 19:03:42 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/test-your-knowledge-the-state-of-connected-medical-device-risk-exposure</guid>
      <dc:date>2020-04-28T19:03:42Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>The US Coronavirus Relief Package: How Hospitals Can (and Cannot) Claim and Spend Funds</title>
      <link>https://www.cybermdx.com/blog/the-us-coronavirus-relief-package-how-hospitals-can-and-cannot-claim-and-spend-funds</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-us-coronavirus-relief-package-how-hospitals-can-and-cannot-claim-and-spend-funds" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/hospital-grant-restrictions-per-us-coronavirus-relief-package-2.png" alt="hospital-grant-restrictions-per-us-coronavirus-relief-package" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;As COVID-19 continues to plague the world, governments are beginning to pass legislation aimed at both strengthening critical infrastructure and propping up the wider economy. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-us-coronavirus-relief-package-how-hospitals-can-and-cannot-claim-and-spend-funds" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/hospital-grant-restrictions-per-us-coronavirus-relief-package-2.png" alt="hospital-grant-restrictions-per-us-coronavirus-relief-package" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;As COVID-19 continues to plague the world, governments are beginning to pass legislation aimed at both strengthening critical infrastructure and propping up the wider economy. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fthe-us-coronavirus-relief-package-how-hospitals-can-and-cannot-claim-and-spend-funds&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 23 Apr 2020 13:11:13 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/the-us-coronavirus-relief-package-how-hospitals-can-and-cannot-claim-and-spend-funds</guid>
      <dc:date>2020-04-23T13:11:13Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Cause for Optimism: Resourcefulness in the Face of COVID-19</title>
      <link>https://www.cybermdx.com/blog/inspiring-examples-of-resourcefulness-in-the-face-of-covid-19</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/inspiring-examples-of-resourcefulness-in-the-face-of-covid-19" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/covid-19-resourcefulness-3.png" alt="Cause for Optimism: Resourcefulness in the Face of COVID-19" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;There seems to be a lot of doom and gloom in the air these days and it's not hard to understand why. While I admit to sometimes playing the role of Negative Nelly myself, the truth is that all that negativity unfairly and inaccurately distorts our perception of reality.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/inspiring-examples-of-resourcefulness-in-the-face-of-covid-19" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/covid-19-resourcefulness-3.png" alt="Cause for Optimism: Resourcefulness in the Face of COVID-19" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;There seems to be a lot of doom and gloom in the air these days and it's not hard to understand why. While I admit to sometimes playing the role of Negative Nelly myself, the truth is that all that negativity unfairly and inaccurately distorts our perception of reality.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Finspiring-examples-of-resourcefulness-in-the-face-of-covid-19&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Mon, 06 Apr 2020 19:39:50 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/inspiring-examples-of-resourcefulness-in-the-face-of-covid-19</guid>
      <dc:date>2020-04-06T19:39:50Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>How Improved Tracking Processes Can Boost Medical Device Availability</title>
      <link>https://www.cybermdx.com/blog/how-improved-resource-allocation-processes-can-increase-medical-device-availability</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-improved-resource-allocation-processes-can-increase-medical-device-availability" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/smart-strategies-to-increase-medical-device-availability.jpg" alt="How Improved Tracking Processes Can Boost Medical Device Availability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;As part of the worldwide battle against COVID-19, hospitals will need to maximize the availability and visibility of key medical assets. &lt;span&gt;By automatically locating medical devices and tracking utilization, HDOs can improve operational efficiencies and accelerate care&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-improved-resource-allocation-processes-can-increase-medical-device-availability" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/smart-strategies-to-increase-medical-device-availability.jpg" alt="How Improved Tracking Processes Can Boost Medical Device Availability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;As part of the worldwide battle against COVID-19, hospitals will need to maximize the availability and visibility of key medical assets. &lt;span&gt;By automatically locating medical devices and tracking utilization, HDOs can improve operational efficiencies and accelerate care&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhow-improved-resource-allocation-processes-can-increase-medical-device-availability&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Wed, 25 Mar 2020 18:11:47 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/how-improved-resource-allocation-processes-can-increase-medical-device-availability</guid>
      <dc:date>2020-03-25T18:11:47Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>10 Quick Cybersecurity Tips for Hospitals in the Midst of COVID-19</title>
      <link>https://www.cybermdx.com/blog/10-quick-cybersecurity-tips-for-hospitals-in-the-midst-of-covid-19</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/10-quick-cybersecurity-tips-for-hospitals-in-the-midst-of-covid-19" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/cybersecurity-tips-hospitals-in-COVID-19.png" alt="hospitals-struggle-to-cope-with-covid-19" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;There's no denying it and no point in ignoring it, so let's just acknowledge it: there's a big ugly elephant in the room and it goes by the name COVID-19. It's on everyone's mind, has already exacted a heavy human cost, is the source of untold anxiety and consternation, is the gravest threat to the global economy since the Great Recession, and is likely to only get worse.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/10-quick-cybersecurity-tips-for-hospitals-in-the-midst-of-covid-19" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/cybersecurity-tips-hospitals-in-COVID-19.png" alt="hospitals-struggle-to-cope-with-covid-19" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;There's no denying it and no point in ignoring it, so let's just acknowledge it: there's a big ugly elephant in the room and it goes by the name COVID-19. It's on everyone's mind, has already exacted a heavy human cost, is the source of untold anxiety and consternation, is the gravest threat to the global economy since the Great Recession, and is likely to only get worse.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2F10-quick-cybersecurity-tips-for-hospitals-in-the-midst-of-covid-19&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 19 Mar 2020 09:32:00 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/10-quick-cybersecurity-tips-for-hospitals-in-the-midst-of-covid-19</guid>
      <dc:date>2020-03-19T09:32:00Z</dc:date>
      <dc:creator>Ido Geffen</dc:creator>
    </item>
    <item>
      <title>The Windows 10 'SMBGhost' Vulnerability: What to Know &amp; What to Do</title>
      <link>https://www.cybermdx.com/blog/the-smbghost-vulnerability-what-to-know-what-to-do</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-smbghost-vulnerability-what-to-know-what-to-do" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Windows-10-SMBGhost-vulnerability-CVE-2020-0796.png" alt="The Windows 10 'SMBGhost' Vulnerability: What to Know &amp;amp; What to Do" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On Wednesday March 11&lt;sup&gt;th&lt;/sup&gt;, &lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv200005"&gt;reports began to emerge&lt;/a&gt; about a vulnerability in the compression mechanism used by Microsoft for SMBv3.1.1. If exploited, this vulnerability would allow an attacker to remotely execute code on affected devices and systems.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-smbghost-vulnerability-what-to-know-what-to-do" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Windows-10-SMBGhost-vulnerability-CVE-2020-0796.png" alt="The Windows 10 'SMBGhost' Vulnerability: What to Know &amp;amp; What to Do" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On Wednesday March 11&lt;sup&gt;th&lt;/sup&gt;, &lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv200005"&gt;reports began to emerge&lt;/a&gt; about a vulnerability in the compression mechanism used by Microsoft for SMBv3.1.1. If exploited, this vulnerability would allow an attacker to remotely execute code on affected devices and systems.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fthe-smbghost-vulnerability-what-to-know-what-to-do&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <pubDate>Mon, 16 Mar 2020 11:23:41 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/the-smbghost-vulnerability-what-to-know-what-to-do</guid>
      <dc:date>2020-03-16T11:23:41Z</dc:date>
      <dc:creator>Ido Geffen</dc:creator>
    </item>
    <item>
      <title>The Next Generation of Healthcare Risk Management Has Arrived</title>
      <link>https://www.cybermdx.com/blog/the-next-generation-of-healthcare-risk-management-has-arrived</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-next-generation-of-healthcare-risk-management-has-arrived" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/next-gen-risk-management-2.png" alt="next-gen-hospital-risk-management" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In business as in life it’s important to cover your backside. More important and higher minded though is covering your bases. If you engage in risky behavior, it’s a good idea to insulate yourself from potential fallout; it’s even better to take steps to reduce or even eliminate the potential for fallout.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-next-generation-of-healthcare-risk-management-has-arrived" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/next-gen-risk-management-2.png" alt="next-gen-hospital-risk-management" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In business as in life it’s important to cover your backside. More important and higher minded though is covering your bases. If you engage in risky behavior, it’s a good idea to insulate yourself from potential fallout; it’s even better to take steps to reduce or even eliminate the potential for fallout.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fthe-next-generation-of-healthcare-risk-management-has-arrived&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 12 Mar 2020 16:22:21 GMT</pubDate>
      <author>amir_v@cybermdx.com (Amir Vashkover)</author>
      <guid>https://www.cybermdx.com/blog/the-next-generation-of-healthcare-risk-management-has-arrived</guid>
      <dc:date>2020-03-12T16:22:21Z</dc:date>
    </item>
    <item>
      <title>How Automating Healthcare Processes Changes the Way Hospitals Operate</title>
      <link>https://www.cybermdx.com/blog/how-automating-healthcare-processes-changes-the-way-organizations-operate</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-automating-healthcare-processes-changes-the-way-organizations-operate" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/automating-healthcare-processes.jpg" alt="How Automating Healthcare Processes Changes&amp;nbsp;the Way Hospitals Operate" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;From improving patient experience to enhancing medical procedures, technology functions as the engine driving the healthcare system forward.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-automating-healthcare-processes-changes-the-way-organizations-operate" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/automating-healthcare-processes.jpg" alt="How Automating Healthcare Processes Changes&amp;nbsp;the Way Hospitals Operate" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;From improving patient experience to enhancing medical procedures, technology functions as the engine driving the healthcare system forward.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhow-automating-healthcare-processes-changes-the-way-organizations-operate&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 20 Feb 2020 12:38:04 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/how-automating-healthcare-processes-changes-the-way-organizations-operate</guid>
      <dc:date>2020-02-20T12:38:04Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>12 Top Healthcare Conferences to Attend in 2020</title>
      <link>https://www.cybermdx.com/blog/the-12-top-healthcare-conferences-not-to-be-missed-in-2020</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-12-top-healthcare-conferences-not-to-be-missed-in-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/2020-top-healthcare-conferences.jpg" alt="12 Top Healthcare Conferences to Attend in 2020" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Each year there are countless conferences and &lt;span&gt;events focused on healthcare management and technology&lt;/span&gt;, but with so many options, it can be difficult to pick the right ones for your specific purposes.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-12-top-healthcare-conferences-not-to-be-missed-in-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/2020-top-healthcare-conferences.jpg" alt="12 Top Healthcare Conferences to Attend in 2020" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Each year there are countless conferences and &lt;span&gt;events focused on healthcare management and technology&lt;/span&gt;, but with so many options, it can be difficult to pick the right ones for your specific purposes.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fthe-12-top-healthcare-conferences-not-to-be-missed-in-2020&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>HIT professional advancement</category>
      <pubDate>Sun, 09 Feb 2020 13:52:51 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/the-12-top-healthcare-conferences-not-to-be-missed-in-2020</guid>
      <dc:date>2020-02-09T13:52:51Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>The CCPA and Healthcare: What You Need to Know</title>
      <link>https://www.cybermdx.com/blog/the-ccpa-and-healthcare-what-you-need-to-know</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-ccpa-and-healthcare-what-you-need-to-know" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/the-ccpa-and-healthcare.png" alt="The CCPA and Healthcare: What You Need to Know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Providing consumers greater control and transparency over their personal data, the&lt;a href="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180SB1121"&gt; California Consumer Privacy Act (CCPA)&lt;/a&gt; went into effect on January 1, 2020. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-ccpa-and-healthcare-what-you-need-to-know" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/the-ccpa-and-healthcare.png" alt="The CCPA and Healthcare: What You Need to Know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Providing consumers greater control and transparency over their personal data, the&lt;a href="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180SB1121"&gt; California Consumer Privacy Act (CCPA)&lt;/a&gt; went into effect on January 1, 2020. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fthe-ccpa-and-healthcare-what-you-need-to-know&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 28 Jan 2020 20:56:00 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/the-ccpa-and-healthcare-what-you-need-to-know</guid>
      <dc:date>2020-01-28T20:56:00Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>Everything You Need to Know About the MDhex Vulnerabilities</title>
      <link>https://www.cybermdx.com/blog/everything-you-need-to-know-about-the-mdhex-vulnerabilities</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/everything-you-need-to-know-about-the-mdhex-vulnerabilities" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/mdhex-ge-carescape-vulnerabilities-2.png" alt="Everything You Need to Know About the MDhex Vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Today, GE Healthcare — in coordination with CyberMDX and CISA (formerly ICS-CERT) — publicly disclosed the discovery of &lt;a href="https://www.cybermdx.com/vulnerability-research-disclosures/cic-pro-and-other-ge-devices"&gt;six software design flaws affecting seven products&lt;/a&gt; in their popular CARESCAPE line. These flaws represent a significant cybersecurity risk and offer an open door to bad actors who might seek to disrupt hospital operations or steal valuable medical data.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/everything-you-need-to-know-about-the-mdhex-vulnerabilities" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/mdhex-ge-carescape-vulnerabilities-2.png" alt="Everything You Need to Know About the MDhex Vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Today, GE Healthcare — in coordination with CyberMDX and CISA (formerly ICS-CERT) — publicly disclosed the discovery of &lt;a href="https://www.cybermdx.com/vulnerability-research-disclosures/cic-pro-and-other-ge-devices"&gt;six software design flaws affecting seven products&lt;/a&gt; in their popular CARESCAPE line. These flaws represent a significant cybersecurity risk and offer an open door to bad actors who might seek to disrupt hospital operations or steal valuable medical data.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Feverything-you-need-to-know-about-the-mdhex-vulnerabilities&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 23 Jan 2020 18:00:00 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/everything-you-need-to-know-about-the-mdhex-vulnerabilities</guid>
      <dc:date>2020-01-23T18:00:00Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Windows 7 EoL Has Arrived: Now What?</title>
      <link>https://www.cybermdx.com/blog/windows-7-eol-has-arrived-what-now</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/windows-7-eol-has-arrived-what-now" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Windows-7-EoL.jpg" alt="Windows 7 EoL Has Arrived: Now What?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span style="background-color: transparent;"&gt;Although Microsoft officially ended mainstream support for Windows 7 back in January 2015, the company continued to release security patches and offer updates for an additional five years. As of January 14th 2020, that’s no longer the case.&lt;/span&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/windows-7-eol-has-arrived-what-now" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Windows-7-EoL.jpg" alt="Windows 7 EoL Has Arrived: Now What?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;span style="background-color: transparent;"&gt;Although Microsoft officially ended mainstream support for Windows 7 back in January 2015, the company continued to release security patches and offer updates for an additional five years. As of January 14th 2020, that’s no longer the case.&lt;/span&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fwindows-7-eol-has-arrived-what-now&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>General IT security threats</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 14 Jan 2020 16:03:00 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/windows-7-eol-has-arrived-what-now</guid>
      <dc:date>2020-01-14T16:03:00Z</dc:date>
      <dc:creator>Ido Geffen</dc:creator>
    </item>
    <item>
      <title>A Very CyberMDX New Year's Resolution</title>
      <link>https://www.cybermdx.com/blog/a-very-cybermdx-new-years-resolution</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/a-very-cybermdx-new-years-resolution" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/cybermdx-2020-resolution.png" alt="cybersecurity-vendor-against-fud-resolution" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The new year is a time take stock and be grateful for what we have. At CyberMDX, we're grateful for our amazing team, the best-in-class solution we've developed and continually improve, and of course for our customers. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/a-very-cybermdx-new-years-resolution" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/cybermdx-2020-resolution.png" alt="cybersecurity-vendor-against-fud-resolution" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The new year is a time take stock and be grateful for what we have. At CyberMDX, we're grateful for our amazing team, the best-in-class solution we've developed and continually improve, and of course for our customers. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fa-very-cybermdx-new-years-resolution&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <pubDate>Mon, 06 Jan 2020 09:49:29 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/a-very-cybermdx-new-years-resolution</guid>
      <dc:date>2020-01-06T09:49:29Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>5 Hospital Technology and Transformation Predictions for 2020</title>
      <link>https://www.cybermdx.com/blog/5-hospital-technology-and-transformation-predictions-for-2020</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/5-hospital-technology-and-transformation-predictions-for-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/2020-Hospital-Technology-and-Transformation-Predictions.png" alt="2020-Hospital-Technology-and-Transformation-Predictions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Each year we take some time to look at the trends we see happening in hospital technology and transformation. It is instructive to study the patterns and disruptive pressures contributing to changes in the hospital industry.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/5-hospital-technology-and-transformation-predictions-for-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/2020-Hospital-Technology-and-Transformation-Predictions.png" alt="2020-Hospital-Technology-and-Transformation-Predictions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Each year we take some time to look at the trends we see happening in hospital technology and transformation. It is instructive to study the patterns and disruptive pressures contributing to changes in the hospital industry.&amp;nbsp;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2F5-hospital-technology-and-transformation-predictions-for-2020&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare standards and regulations</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 31 Dec 2019 14:58:28 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/5-hospital-technology-and-transformation-predictions-for-2020</guid>
      <dc:date>2019-12-31T14:58:28Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Grading Our 2019 Healthcare Predictions</title>
      <link>https://www.cybermdx.com/blog/grading-our-2019-healthcare-predictions</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/grading-our-2019-healthcare-predictions" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/2019-healthcare-predictions.png" alt="2019-healthcare-predictions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Along with all its holiday cheer, this time of year always seems to bring a bounty of predictions as to what the industry will experience over the course of our next lap around the sun. Often, that flurry of articles and blog posts seems more motivated by click-bait than thoughtful industry analysis and predictions are seldom ever held to account against the test of time.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/grading-our-2019-healthcare-predictions" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/2019-healthcare-predictions.png" alt="2019-healthcare-predictions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Along with all its holiday cheer, this time of year always seems to bring a bounty of predictions as to what the industry will experience over the course of our next lap around the sun. Often, that flurry of articles and blog posts seems more motivated by click-bait than thoughtful industry analysis and predictions are seldom ever held to account against the test of time.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fgrading-our-2019-healthcare-predictions&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Wed, 18 Dec 2019 13:31:00 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/grading-our-2019-healthcare-predictions</guid>
      <dc:date>2019-12-18T13:31:00Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>5 Medical Information Security Lessons for 2020</title>
      <link>https://www.cybermdx.com/blog/5-medical-information-security-lessons-from-2019</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/5-medical-information-security-lessons-from-2019" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Medical%20Information%20Security%20Lessons.png" alt="Medical Information Security Lessons" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In the world of information security, each new year brings new opportunities for growth and learning. From new cyber threats and mitigations to new tools and techniques, there's no shortage of new information to assimilate, new skills to master, and new lessons to take.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/5-medical-information-security-lessons-from-2019" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Medical%20Information%20Security%20Lessons.png" alt="Medical Information Security Lessons" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In the world of information security, each new year brings new opportunities for growth and learning. From new cyber threats and mitigations to new tools and techniques, there's no shortage of new information to assimilate, new skills to master, and new lessons to take.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2F5-medical-information-security-lessons-from-2019&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>Machine learning in healthcare</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 12 Dec 2019 14:16:57 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/5-medical-information-security-lessons-from-2019</guid>
      <dc:date>2019-12-12T14:16:57Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>5 Top Healthcare Technology Trends Going Into 2020</title>
      <link>https://www.cybermdx.com/blog/5-top-healthcare-technology-trends-going-into-2020</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/5-top-healthcare-technology-trends-going-into-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/2020-Healthcare-Technology-Trends.png" alt="2020-Healthcare-Technology-Trends" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;It goes without saying that advances in healthcare technology are fundamentally changing the way that medicine is practiced. Recently, it would seem that these advances have begun to evolve more rapidly and more profoundly.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/5-top-healthcare-technology-trends-going-into-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/2020-Healthcare-Technology-Trends.png" alt="2020-Healthcare-Technology-Trends" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;It goes without saying that advances in healthcare technology are fundamentally changing the way that medicine is practiced. Recently, it would seem that these advances have begun to evolve more rapidly and more profoundly.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2F5-top-healthcare-technology-trends-going-into-2020&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Connected medical devices</category>
      <category>Healthcare standards and regulations</category>
      <category>Hospital administration</category>
      <pubDate>Sun, 08 Dec 2019 10:59:45 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/5-top-healthcare-technology-trends-going-into-2020</guid>
      <dc:date>2019-12-08T10:59:45Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>A First Blush Guide to Cybersecurity in Hospitals</title>
      <link>https://www.cybermdx.com/blog/a-first-blush-guide-to-cybersecurity-in-hospitals</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/a-first-blush-guide-to-cybersecurity-in-hospitals" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/cybersecurity-in-hospitals-control-room.jpg" alt="cybersecurity-in-hospitals-control-room" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The healthcare industry has come a long way in terms of technological advancement. Healthcare IT systems, structures, and standards have transformed modern healthcare and provided hospitals with new opportunities when it comes to patient care.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/a-first-blush-guide-to-cybersecurity-in-hospitals" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/cybersecurity-in-hospitals-control-room.jpg" alt="cybersecurity-in-hospitals-control-room" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The healthcare industry has come a long way in terms of technological advancement. Healthcare IT systems, structures, and standards have transformed modern healthcare and provided hospitals with new opportunities when it comes to patient care.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fa-first-blush-guide-to-cybersecurity-in-hospitals&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <pubDate>Wed, 27 Nov 2019 13:30:29 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/a-first-blush-guide-to-cybersecurity-in-hospitals</guid>
      <dc:date>2019-11-27T13:30:29Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>A Compendium of Connected Healthcare Technology Facts &amp; Figures</title>
      <link>https://www.cybermdx.com/blog/a-compendium-of-connected-healthcare-technology-facts-figures</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/a-compendium-of-connected-healthcare-technology-facts-figures" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/cybermdx-definitive-healthcare-technology-facts.jpg" alt="cybermdx-definitive-healthcare-technology-facts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Healthcare is the most cyber-targeted industry, with nearly one out of every six US data breaches happening in hospitals and the problem is only getting worse. &lt;strong&gt;15,085,302&lt;/strong&gt; individual medical records were breached globally in 2018 — representing &lt;a href="https://www.protenus.com/2019-breach-barometer"&gt;&lt;strong&gt;a 3X increase&lt;/strong&gt; over the year prior&lt;/a&gt;. In 2019, things are looking even bleaker, with that figure having more than doubled ⁠— reaching nearly &lt;a href="https://pages.protenus.com/2019-mid-year-breach-barometer-report"&gt;&lt;strong&gt;32 million&lt;/strong&gt; breached records&lt;/a&gt; ⁠— in the first half of the year alone!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/a-compendium-of-connected-healthcare-technology-facts-figures" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/cybermdx-definitive-healthcare-technology-facts.jpg" alt="cybermdx-definitive-healthcare-technology-facts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Healthcare is the most cyber-targeted industry, with nearly one out of every six US data breaches happening in hospitals and the problem is only getting worse. &lt;strong&gt;15,085,302&lt;/strong&gt; individual medical records were breached globally in 2018 — representing &lt;a href="https://www.protenus.com/2019-breach-barometer"&gt;&lt;strong&gt;a 3X increase&lt;/strong&gt; over the year prior&lt;/a&gt;. In 2019, things are looking even bleaker, with that figure having more than doubled ⁠— reaching nearly &lt;a href="https://pages.protenus.com/2019-mid-year-breach-barometer-report"&gt;&lt;strong&gt;32 million&lt;/strong&gt; breached records&lt;/a&gt; ⁠— in the first half of the year alone!&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fa-compendium-of-connected-healthcare-technology-facts-figures&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>HIT professional advancement</category>
      <category>Hospital administration</category>
      <pubDate>Wed, 20 Nov 2019 14:32:21 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/a-compendium-of-connected-healthcare-technology-facts-figures</guid>
      <dc:date>2019-11-20T14:32:21Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Put a SOC In It!</title>
      <link>https://www.cybermdx.com/blog/put-a-soc-in-it</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/put-a-soc-in-it" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/soc%282%29-certified-healthcare-cyber-vendor.jpg" alt="soc(2)-certified-healthcare-cyber-vendor" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;"Who will watch the watchmen?" It's a deceptively poignant and tricky question dating back to ancient Rome when it was famously posed by &lt;a href="https://en.wikipedia.org/wiki/Juvenal"&gt;Juvenal&lt;/a&gt;. Then, as now, it would seem many of the most biting social commentaries rise to popular consciousness through the satirists. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/put-a-soc-in-it" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/soc%282%29-certified-healthcare-cyber-vendor.jpg" alt="soc(2)-certified-healthcare-cyber-vendor" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;"Who will watch the watchmen?" It's a deceptively poignant and tricky question dating back to ancient Rome when it was famously posed by &lt;a href="https://en.wikipedia.org/wiki/Juvenal"&gt;Juvenal&lt;/a&gt;. Then, as now, it would seem many of the most biting social commentaries rise to popular consciousness through the satirists. &lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fput-a-soc-in-it&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <pubDate>Thu, 14 Nov 2019 15:12:51 GMT</pubDate>
      <author>amir_v@cybermdx.com (Amir Vashkover)</author>
      <guid>https://www.cybermdx.com/blog/put-a-soc-in-it</guid>
      <dc:date>2019-11-14T15:12:51Z</dc:date>
    </item>
    <item>
      <title>After the Dust Has Settled: GDPR in Healthcare</title>
      <link>https://www.cybermdx.com/blog/after-the-dust-has-settled-gdpr-in-healthcare</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/after-the-dust-has-settled-gdpr-in-healthcare" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/GDPR-in-healthcare.jpg" alt="GDPR-in-healthcare" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;It's been more than a year since the General Data Protection Regulation (GDPR) has taken effect. The European Commission's wide-reaching law was designed to protect the privacy of EU citizens and residents while pushing businesses to handle people's personal information more sparingly and with greater security and sensitivity.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/after-the-dust-has-settled-gdpr-in-healthcare" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/GDPR-in-healthcare.jpg" alt="GDPR-in-healthcare" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;It's been more than a year since the General Data Protection Regulation (GDPR) has taken effect. The European Commission's wide-reaching law was designed to protect the privacy of EU citizens and residents while pushing businesses to handle people's personal information more sparingly and with greater security and sensitivity.&amp;nbsp;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fafter-the-dust-has-settled-gdpr-in-healthcare&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 31 Oct 2019 09:07:07 GMT</pubDate>
      <author>amir_v@cybermdx.com (Amir Vashkover)</author>
      <guid>https://www.cybermdx.com/blog/after-the-dust-has-settled-gdpr-in-healthcare</guid>
      <dc:date>2019-10-31T09:07:07Z</dc:date>
    </item>
    <item>
      <title>How Cybersecurity Factors into the Medical Device Procurement Process</title>
      <link>https://www.cybermdx.com/blog/how-cybersecurity-considerations-should-factor-into-the-medical-device-procurement-process</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-cybersecurity-considerations-should-factor-into-the-medical-device-procurement-process" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/medical%20device%20procurement-2.png" alt="medical device procurement-2" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="font-size: 16px; color: #747780;"&gt;In 2018, the global medical device and clinical asset market was worth approximately &lt;a href="https://www.globenewswire.com/news-release/2019/02/06/1711142/0/en/Global-Healthcare-Asset-Management-Market-Will-Reach-USD-61-35-Billion-By-2025-Zion-Market-Research.html"&gt;$8.98 billion&lt;/a&gt;. By 2025, it’s estimated that it will be worth $61.35 billion. Hospitals, on average, spend &lt;a href="https://www.linkedin.com/pulse/comparing-purchasing-processes-surgical-devices-us-van-den-mooter/"&gt;11-13%&lt;/a&gt; of their annual budget on medical devices and clinical assets. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-cybersecurity-considerations-should-factor-into-the-medical-device-procurement-process" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/medical%20device%20procurement-2.png" alt="medical device procurement-2" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="font-size: 16px; color: #747780;"&gt;In 2018, the global medical device and clinical asset market was worth approximately &lt;a href="https://www.globenewswire.com/news-release/2019/02/06/1711142/0/en/Global-Healthcare-Asset-Management-Market-Will-Reach-USD-61-35-Billion-By-2025-Zion-Market-Research.html"&gt;$8.98 billion&lt;/a&gt;. By 2025, it’s estimated that it will be worth $61.35 billion. Hospitals, on average, spend &lt;a href="https://www.linkedin.com/pulse/comparing-purchasing-processes-surgical-devices-us-van-den-mooter/"&gt;11-13%&lt;/a&gt; of their annual budget on medical devices and clinical assets. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhow-cybersecurity-considerations-should-factor-into-the-medical-device-procurement-process&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Connected medical devices</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 24 Oct 2019 19:40:58 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/how-cybersecurity-considerations-should-factor-into-the-medical-device-procurement-process</guid>
      <dc:date>2019-10-24T19:40:58Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>How MDS² Data Can Inform Smarter Medical Device Workflows</title>
      <link>https://www.cybermdx.com/blog/how-mds2-data-can-inform-smarter-medical-device-workflows</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-mds2-data-can-inform-smarter-medical-device-workflows" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/mds2-forms-enhance-biomed-workflows.png" alt="mds2-forms-enhance-biomed-workflows" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In 2004, Nema (the National Electrical Manufacturers Association), together with HIMSS (Health Information and Management Systems Society) and a number of other security experts and government agencies, produced a short document template for manufacturers to use in order to describe the vital security properties of their devices.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-mds2-data-can-inform-smarter-medical-device-workflows" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/mds2-forms-enhance-biomed-workflows.png" alt="mds2-forms-enhance-biomed-workflows" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In 2004, Nema (the National Electrical Manufacturers Association), together with HIMSS (Health Information and Management Systems Society) and a number of other security experts and government agencies, produced a short document template for manufacturers to use in order to describe the vital security properties of their devices.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhow-mds2-data-can-inform-smarter-medical-device-workflows&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 17 Oct 2019 12:26:15 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/how-mds2-data-can-inform-smarter-medical-device-workflows</guid>
      <dc:date>2019-10-17T12:26:15Z</dc:date>
      <dc:creator>Ido Geffen</dc:creator>
    </item>
    <item>
      <title>The Top 4 Problems Hospitals Face When Addressing Cybersecurity</title>
      <link>https://www.cybermdx.com/blog/the-top-4-problems-hospitals-face-when-addressing-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-top-4-problems-hospitals-face-when-addressing-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/top-problems-hospitals-face-in-cyber-sec.jpg" alt="top-problems-hospitals-face-in-cyber-sec" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;It's already a well-known fact: cybersecurity constitutes a major challenge for connected healthcare operations, regardless of their unique organizational structures and processes. When &lt;a href="https://healthitsecurity.com/news/healthcare-cyberattacks-cost-1.4-million-on-average-in-recovery"&gt;each cyberattack costs healthcare organizations an average of $1.4 million&lt;/a&gt; to recover, it is critical that any and all gaps in network defenses are quickly identified and filled.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-top-4-problems-hospitals-face-when-addressing-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/top-problems-hospitals-face-in-cyber-sec.jpg" alt="top-problems-hospitals-face-in-cyber-sec" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;It's already a well-known fact: cybersecurity constitutes a major challenge for connected healthcare operations, regardless of their unique organizational structures and processes. When &lt;a href="https://healthitsecurity.com/news/healthcare-cyberattacks-cost-1.4-million-on-average-in-recovery"&gt;each cyberattack costs healthcare organizations an average of $1.4 million&lt;/a&gt; to recover, it is critical that any and all gaps in network defenses are quickly identified and filled.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fthe-top-4-problems-hospitals-face-when-addressing-cybersecurity&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 08 Oct 2019 11:12:12 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/the-top-4-problems-hospitals-face-when-addressing-cybersecurity</guid>
      <dc:date>2019-10-08T11:12:12Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>How Hospitals Prioritize Digital Risk Management</title>
      <link>https://www.cybermdx.com/blog/how-hospitals-prioritize-digital-risk-management</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-hospitals-prioritize-digital-risk-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/healthcare-digital-risk-management-strategy-1.png" alt="healthcare-digital-risk-management-strategy-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In the last several years, data breaches and cyber attacks on healthcare organizations have been in the news with alarming frequency. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-hospitals-prioritize-digital-risk-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/healthcare-digital-risk-management-strategy-1.png" alt="healthcare-digital-risk-management-strategy-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;In the last several years, data breaches and cyber attacks on healthcare organizations have been in the news with alarming frequency. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhow-hospitals-prioritize-digital-risk-management&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Wed, 02 Oct 2019 12:21:12 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/how-hospitals-prioritize-digital-risk-management</guid>
      <dc:date>2019-10-02T12:21:12Z</dc:date>
      <dc:creator>Ido Hoyda</dc:creator>
    </item>
    <item>
      <title>HealthOps: The Next Frontier of Healthcare Management</title>
      <link>https://www.cybermdx.com/blog/healthops-the-next-stage-in-the-evolution-of-healthcare-management-processes</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/healthops-the-next-stage-in-the-evolution-of-healthcare-management-processes" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/healthops.png" alt="healthops" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="font-size: 16px; color: #747780;"&gt;This article is the final installment of a three-part series. We've already examined how those traits and trends converged around the principle of agility. Now, we'll discuss how&lt;span&gt; the push for greater agility has given way to a broader "DevOps-ification".&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/healthops-the-next-stage-in-the-evolution-of-healthcare-management-processes" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/healthops.png" alt="healthops" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="font-size: 16px; color: #747780;"&gt;This article is the final installment of a three-part series. We've already examined how those traits and trends converged around the principle of agility. Now, we'll discuss how&lt;span&gt; the push for greater agility has given way to a broader "DevOps-ification".&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhealthops-the-next-stage-in-the-evolution-of-healthcare-management-processes&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Machine learning in healthcare</category>
      <category>Hospital administration</category>
      <pubDate>Wed, 25 Sep 2019 09:42:01 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/healthops-the-next-stage-in-the-evolution-of-healthcare-management-processes</guid>
      <dc:date>2019-09-25T09:42:01Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>Smarter, Lighter, More Proactive: The Strategy of Business Agility</title>
      <link>https://www.cybermdx.com/blog/smarter-lighter-more-proactive-strategy-business-agility</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/smarter-lighter-more-proactive-strategy-business-agility" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/business-agility.jpg" alt="business-agility" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="font-size: 16px; color: #747780;"&gt;This article is the second installment of a three-part series.&amp;nbsp;&lt;span&gt;In &lt;a href="https://www.cybermdx.com/blog/the-internet-of-medical-things-iomt-punctuates-a-century-of-progress"&gt;the previous installment&lt;/a&gt;, we examined how technology evolved and how it has culminated in the streamlined, automated, intelligence of Internet of Things ecosystems. We paid special attention to the healthcare sector and looked at how the Internet of Medical Things is availing itself to new technologies as it pushes to open new healthcare frontiers and improve patient outcomes.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/smarter-lighter-more-proactive-strategy-business-agility" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/business-agility.jpg" alt="business-agility" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="font-size: 16px; color: #747780;"&gt;This article is the second installment of a three-part series.&amp;nbsp;&lt;span&gt;In &lt;a href="https://www.cybermdx.com/blog/the-internet-of-medical-things-iomt-punctuates-a-century-of-progress"&gt;the previous installment&lt;/a&gt;, we examined how technology evolved and how it has culminated in the streamlined, automated, intelligence of Internet of Things ecosystems. We paid special attention to the healthcare sector and looked at how the Internet of Medical Things is availing itself to new technologies as it pushes to open new healthcare frontiers and improve patient outcomes.&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fsmarter-lighter-more-proactive-strategy-business-agility&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Hospital administration</category>
      <pubDate>Thu, 19 Sep 2019 08:29:21 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/smarter-lighter-more-proactive-strategy-business-agility</guid>
      <dc:date>2019-09-19T08:29:21Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>The Internet of Medical Things (IoMT) Punctuates a Century of Progress</title>
      <link>https://www.cybermdx.com/blog/the-internet-of-medical-things-iomt-punctuates-a-century-of-progress</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-internet-of-medical-things-iomt-punctuates-a-century-of-progress" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/internet-of-medical-things-iomt-1.png" alt="internet-of-medical-things-iomt-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;"&lt;em&gt;When wireless is perfectly applied, the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole.” &lt;/em&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/the-internet-of-medical-things-iomt-punctuates-a-century-of-progress" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/internet-of-medical-things-iomt-1.png" alt="internet-of-medical-things-iomt-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;&lt;span&gt;"&lt;em&gt;When wireless is perfectly applied, the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole.” &lt;/em&gt;&lt;/span&gt;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fthe-internet-of-medical-things-iomt-punctuates-a-century-of-progress&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 12 Sep 2019 12:10:09 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/the-internet-of-medical-things-iomt-punctuates-a-century-of-progress</guid>
      <dc:date>2019-09-12T12:10:09Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>Why It’s Wrong to Sync Medical Device Patching &amp; Scheduled Maintenance</title>
      <link>https://www.cybermdx.com/blog/why-its-wrong-to-sync-medical-device-patching-scheduled-maintenance</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/why-its-wrong-to-sync-medical-device-patching-scheduled-maintenance" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/medical-device-patching-servicing-1.png" alt="medical-device-patching-servicing-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Machines are indispensable, yet imperfect. They work fine one day and break down the next. What’s more, even if the machine remains in essentially the same working order, you’ll still need to reconfigure, adjust, reinforce, or add components if its environment is liable to change.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/why-its-wrong-to-sync-medical-device-patching-scheduled-maintenance" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/medical-device-patching-servicing-1.png" alt="medical-device-patching-servicing-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Machines are indispensable, yet imperfect. They work fine one day and break down the next. What’s more, even if the machine remains in essentially the same working order, you’ll still need to reconfigure, adjust, reinforce, or add components if its environment is liable to change.&amp;nbsp;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fwhy-its-wrong-to-sync-medical-device-patching-scheduled-maintenance&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 05 Sep 2019 12:23:54 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/why-its-wrong-to-sync-medical-device-patching-scheduled-maintenance</guid>
      <dc:date>2019-09-05T12:23:54Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>How Medical Device Cybersecurity Complements Physical Access Control</title>
      <link>https://www.cybermdx.com/blog/how-medical-device-cybersecurity-complements-physical-access-control</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-medical-device-cybersecurity-complements-physical-access-control" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/physical-access-control-1.png" alt="physical-access-control-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;It’s only reasonable that access to sensitive medical devices should be restricted to those who require it. Physical access guidelines are designed to ensure that only professionals with the proper knowledge and need can utilize medical equipment to the greatest extent possible.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-medical-device-cybersecurity-complements-physical-access-control" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/physical-access-control-1.png" alt="physical-access-control-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;It’s only reasonable that access to sensitive medical devices should be restricted to those who require it. Physical access guidelines are designed to ensure that only professionals with the proper knowledge and need can utilize medical equipment to the greatest extent possible.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhow-medical-device-cybersecurity-complements-physical-access-control&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Wed, 21 Aug 2019 19:09:36 GMT</pubDate>
      <author>amir_v@cybermdx.com (Amir Vashkover)</author>
      <guid>https://www.cybermdx.com/blog/how-medical-device-cybersecurity-complements-physical-access-control</guid>
      <dc:date>2019-08-21T19:09:36Z</dc:date>
    </item>
    <item>
      <title>Windows DejaBlue: Lookalike RDP Flaws Emerge Months After BlueKeep</title>
      <link>https://www.cybermdx.com/blog/windows-dejablue-lookalike-vulnerabilities-emerge-3-months-after-bluekeep</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/windows-dejablue-lookalike-vulnerabilities-emerge-3-months-after-bluekeep" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/dejablue-5.png" alt="dejablue-5" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On August 13, 2019 Microsoft utilized “Patch Tuesday” to release &lt;a href="https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/312890cc-3673-e911-a991-000d3a33a34d"&gt;36 new CVEs&lt;/a&gt;. Of those vulnerabilities, four stand out for their striking similarity to the BlueKeep vulnerability that sent shock waves through the industry only three months earlier.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/windows-dejablue-lookalike-vulnerabilities-emerge-3-months-after-bluekeep" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/dejablue-5.png" alt="dejablue-5" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On August 13, 2019 Microsoft utilized “Patch Tuesday” to release &lt;a href="https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/312890cc-3673-e911-a991-000d3a33a34d"&gt;36 new CVEs&lt;/a&gt;. Of those vulnerabilities, four stand out for their striking similarity to the BlueKeep vulnerability that sent shock waves through the industry only three months earlier.&amp;nbsp;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fwindows-dejablue-lookalike-vulnerabilities-emerge-3-months-after-bluekeep&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Healthcare risk management</category>
      <category>General IT security threats</category>
      <pubDate>Fri, 16 Aug 2019 17:38:21 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/windows-dejablue-lookalike-vulnerabilities-emerge-3-months-after-bluekeep</guid>
      <dc:date>2019-08-16T17:38:21Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Everything HDOs Need to Know About URGENT/11</title>
      <link>https://www.cybermdx.com/blog/everything-hdos-need-to-know-about-urgent-11</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/everything-hdos-need-to-know-about-urgent-11" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/urgent11-for-hospitals.png" alt="urgent11-for-hospitals" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On July 29th, 2019, eleven vulnerabilities affecting the “VxWorks” Real Time Operating System (RTOS) were publicly disclosed. Since these vulnerabilities were all reported by the same source and all deal with VxWorks’ network stack (the software code implementing network communications), they were bundled together in the same advisory: ICSA-19-211-01.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/everything-hdos-need-to-know-about-urgent-11" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/urgent11-for-hospitals.png" alt="urgent11-for-hospitals" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On July 29th, 2019, eleven vulnerabilities affecting the “VxWorks” Real Time Operating System (RTOS) were publicly disclosed. Since these vulnerabilities were all reported by the same source and all deal with VxWorks’ network stack (the software code implementing network communications), they were bundled together in the same advisory: ICSA-19-211-01.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Feverything-hdos-need-to-know-about-urgent-11&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>General IT security threats</category>
      <pubDate>Wed, 07 Aug 2019 19:10:38 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/everything-hdos-need-to-know-about-urgent-11</guid>
      <dc:date>2019-08-07T19:10:38Z</dc:date>
      <dc:creator>Ido Geffen</dc:creator>
    </item>
    <item>
      <title>In Perspective: the Baltimore Hack Attack</title>
      <link>https://www.cybermdx.com/blog/in-perspective-the-baltimore-hack-attack</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/in-perspective-the-baltimore-hack-attack" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/baltimore-hack-attack-2019-1.jpg" alt="baltimore-hack-attack-2019-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The world is a dangerous place. Perhaps it’s always been that way. Nature is governed by evolutionary competition, politics take shape where interests and power meet, and economics are ruled by free markets and comparative advantages. It’s a brutal, cutthroat business. And yet, things seem even more dangerous today.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/in-perspective-the-baltimore-hack-attack" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/baltimore-hack-attack-2019-1.jpg" alt="baltimore-hack-attack-2019-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The world is a dangerous place. Perhaps it’s always been that way. Nature is governed by evolutionary competition, politics take shape where interests and power meet, and economics are ruled by free markets and comparative advantages. It’s a brutal, cutthroat business. And yet, things seem even more dangerous today.&amp;nbsp;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fin-perspective-the-baltimore-hack-attack&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare risk management</category>
      <category>General IT security threats</category>
      <pubDate>Tue, 30 Jul 2019 12:05:21 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/in-perspective-the-baltimore-hack-attack</guid>
      <dc:date>2019-07-30T12:05:21Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Why Cybersecurity is Important for Biomedical Engineers</title>
      <link>https://www.cybermdx.com/blog/why-cybersecurity-is-important-for-biomedical-engineers</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/why-cybersecurity-is-important-for-biomedical-engineers" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/iStock-1013559166-1-compressor-1.jpg" alt="iStock-1013559166-1-compressor-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Biomedical engineers are the unseen force behind some of modern medicine's greatest achievements. Biomedical engineers are at the forefront of exciting research and they are staples of day-to-day hospital operations. Their responsibilities are wide-ranging and they touch many aspects of modern healthcare, from medical imaging to bionanotechnology.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/why-cybersecurity-is-important-for-biomedical-engineers" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/iStock-1013559166-1-compressor-1.jpg" alt="iStock-1013559166-1-compressor-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Biomedical engineers are the unseen force behind some of modern medicine's greatest achievements. Biomedical engineers are at the forefront of exciting research and they are staples of day-to-day hospital operations. Their responsibilities are wide-ranging and they touch many aspects of modern healthcare, from medical imaging to bionanotechnology.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fwhy-cybersecurity-is-important-for-biomedical-engineers&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 23 Jul 2019 15:54:06 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/why-cybersecurity-is-important-for-biomedical-engineers</guid>
      <dc:date>2019-07-23T15:54:06Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>How to Track and Act On Clinical Asset Utilization Insights</title>
      <link>https://www.cybermdx.com/blog/how-to-track-clinical-asset-utilization-factors-and-what-to-do-with-the-information</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-to-track-clinical-asset-utilization-factors-and-what-to-do-with-the-information" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/office%20space%20final.png" alt="office space final" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="font-size: 16px; color: #747780;"&gt;HDOs occupy a unique position: on the one hand, their focus is on patient care, and their success is measured by health outcomes. On the other hand, they are businesses, with investors, executives, and a need to watch their financial bottom line.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/how-to-track-clinical-asset-utilization-factors-and-what-to-do-with-the-information" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/office%20space%20final.png" alt="office space final" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p style="font-size: 16px; color: #747780;"&gt;HDOs occupy a unique position: on the one hand, their focus is on patient care, and their success is measured by health outcomes. On the other hand, they are businesses, with investors, executives, and a need to watch their financial bottom line.&amp;nbsp;&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fhow-to-track-clinical-asset-utilization-factors-and-what-to-do-with-the-information&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare data</category>
      <category>Connected medical devices</category>
      <category>Hospital administration</category>
      <pubDate>Mon, 15 Jul 2019 10:42:44 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/how-to-track-clinical-asset-utilization-factors-and-what-to-do-with-the-information</guid>
      <dc:date>2019-07-15T10:42:44Z</dc:date>
      <dc:creator>Ido Geffen</dc:creator>
    </item>
    <item>
      <title>New Anesthesia Machine Vulnerability Disclosure Tells a Bigger Story</title>
      <link>https://www.cybermdx.com/blog/new-vulnerability-disclosure-for-anesthesia-machines-tells-a-bigger-story</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/new-vulnerability-disclosure-for-anesthesia-machines-tells-a-bigger-story" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/anesthesia-device-vulnerability.jpg" alt="anesthesia-device-vulnerability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;For the first time, on July 9, 2019, &lt;a href="https://www.us-cert.gov/ics/advisories/icsma-19-190-01"&gt;ICS-CERT disclosed&lt;/a&gt; a vulnerability specifically impacting anesthesia machines. If exploited, the vulnerability would allow an attacker to silence alarms, alter date and time settings, adjust gas composition inputs, change barometric pressure, and switch between anesthetic agents — all without authentication.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/new-vulnerability-disclosure-for-anesthesia-machines-tells-a-bigger-story" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/anesthesia-device-vulnerability.jpg" alt="anesthesia-device-vulnerability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;For the first time, on July 9, 2019, &lt;a href="https://www.us-cert.gov/ics/advisories/icsma-19-190-01"&gt;ICS-CERT disclosed&lt;/a&gt; a vulnerability specifically impacting anesthesia machines. If exploited, the vulnerability would allow an attacker to silence alarms, alter date and time settings, adjust gas composition inputs, change barometric pressure, and switch between anesthetic agents — all without authentication.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fnew-vulnerability-disclosure-for-anesthesia-machines-tells-a-bigger-story&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>General IT security threats</category>
      <category>Hospital administration</category>
      <pubDate>Tue, 09 Jul 2019 21:22:35 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/new-vulnerability-disclosure-for-anesthesia-machines-tells-a-bigger-story</guid>
      <dc:date>2019-07-09T21:22:35Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Why CVE-2019-5599, SACK Panic, Is Causing Headaches</title>
      <link>https://www.cybermdx.com/blog/why-cve-2019-5599-sack-panic-similar-vulnerabilities-are-giving-enterprise-organizations-cybersecurity-firms-fits</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/why-cve-2019-5599-sack-panic-similar-vulnerabilities-are-giving-enterprise-organizations-cybersecurity-firms-fits" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/sack-panic.png" alt="sack-panic" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On June 18, 2019, Netflix researchers, together with MITRE, issued an advisory containing four vulnerabilities relating to how Linux handles TCP Selective-Acknowledgement (SACK) at the kernel level. These vulnerabilities affect devices running operating systems containing a large range of Linux and FreeBSD kernels. The most dangerous such vulnerability has been dubbed the "&lt;strong&gt;SACK Panic&lt;/strong&gt;” vulnerability &lt;span style="background-color: transparent;"&gt;(&lt;/span&gt;&lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" style="background-color: transparent;"&gt;CVE-2019-11477&lt;/a&gt;&lt;span style="background-color: transparent;"&gt;)&lt;/span&gt;, which if exploited it can the device to crash courtesy of &lt;em&gt;kernel panic&lt;/em&gt;. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/why-cve-2019-5599-sack-panic-similar-vulnerabilities-are-giving-enterprise-organizations-cybersecurity-firms-fits" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/sack-panic.png" alt="sack-panic" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On June 18, 2019, Netflix researchers, together with MITRE, issued an advisory containing four vulnerabilities relating to how Linux handles TCP Selective-Acknowledgement (SACK) at the kernel level. These vulnerabilities affect devices running operating systems containing a large range of Linux and FreeBSD kernels. The most dangerous such vulnerability has been dubbed the "&lt;strong&gt;SACK Panic&lt;/strong&gt;” vulnerability &lt;span style="background-color: transparent;"&gt;(&lt;/span&gt;&lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" style="background-color: transparent;"&gt;CVE-2019-11477&lt;/a&gt;&lt;span style="background-color: transparent;"&gt;)&lt;/span&gt;, which if exploited it can the device to crash courtesy of &lt;em&gt;kernel panic&lt;/em&gt;. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fwhy-cve-2019-5599-sack-panic-similar-vulnerabilities-are-giving-enterprise-organizations-cybersecurity-firms-fits&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>General IT security threats</category>
      <category>Hospital administration</category>
      <pubDate>Mon, 01 Jul 2019 15:52:49 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/why-cve-2019-5599-sack-panic-similar-vulnerabilities-are-giving-enterprise-organizations-cybersecurity-firms-fits</guid>
      <dc:date>2019-07-01T15:52:49Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>Cyber-Enabled Hospital Merger and Acquisition Management</title>
      <link>https://www.cybermdx.com/blog/cyber-enabled-hospital-merger-and-acquisition-management</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/cyber-enabled-hospital-merger-and-acquisition-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/hospital-merger-management-3.png" alt="hospital-merger-management-3" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The healthcare industry in the US has been facing &lt;a href="https://www.cybermdx.com/blog/emerging-medtech-trends-to-keep-an-eye-on-in-2019"&gt;widespread disruption&lt;/a&gt; for some years. The Affordable Care Act in 2010 demanded that the industry carry out wholesale changes to its processes and systems in order to bring down patient costs and streamline data management.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/cyber-enabled-hospital-merger-and-acquisition-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/hospital-merger-management-3.png" alt="hospital-merger-management-3" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The healthcare industry in the US has been facing &lt;a href="https://www.cybermdx.com/blog/emerging-medtech-trends-to-keep-an-eye-on-in-2019"&gt;widespread disruption&lt;/a&gt; for some years. The Affordable Care Act in 2010 demanded that the industry carry out wholesale changes to its processes and systems in order to bring down patient costs and streamline data management.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fcyber-enabled-hospital-merger-and-acquisition-management&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare risk management</category>
      <category>Hospital administration</category>
      <pubDate>Thu, 20 Jun 2019 09:23:55 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/cyber-enabled-hospital-merger-and-acquisition-management</guid>
      <dc:date>2019-06-20T09:23:55Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>CVE-2019-10962 &amp; IoT Security Threats From "Innocent" Objects</title>
      <link>https://www.cybermdx.com/blog/cve-2019-10962-the-iot-security-threat-presented-by-innocent-objects</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/cve-2019-10962-the-iot-security-threat-presented-by-innocent-objects" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/The-IoT-Security-Threat-of-the-trees.jpg" alt="The-IoT-Security-Threat-of-the-trees" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;At one point early on in the beloved C. S. Lewis children’s novel, &lt;i&gt;The Lion, the Witch and the Wardrobe&lt;/i&gt;, Mr. Tumnus sets the scene, intimating the stakes involved and explaining his own timidity, saying, “The Witch is ever so watchful. Even the trees have eyes...!”&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/cve-2019-10962-the-iot-security-threat-presented-by-innocent-objects" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/The-IoT-Security-Threat-of-the-trees.jpg" alt="The-IoT-Security-Threat-of-the-trees" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;At one point early on in the beloved C. S. Lewis children’s novel, &lt;i&gt;The Lion, the Witch and the Wardrobe&lt;/i&gt;, Mr. Tumnus sets the scene, intimating the stakes involved and explaining his own timidity, saying, “The Witch is ever so watchful. Even the trees have eyes...!”&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fcve-2019-10962-the-iot-security-threat-presented-by-innocent-objects&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <pubDate>Mon, 17 Jun 2019 07:00:24 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/cve-2019-10962-the-iot-security-threat-presented-by-innocent-objects</guid>
      <dc:date>2019-06-17T07:00:24Z</dc:date>
      <dc:creator>Jon Rabinowitz</dc:creator>
    </item>
    <item>
      <title>3 Best Practices to Guide Your Healthcare Automation</title>
      <link>https://www.cybermdx.com/blog/3-best-practices-to-guide-your-healthcare-automation</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/3-best-practices-to-guide-your-healthcare-automation" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/heatlhcare-automation-2.png" alt="heatlhcare-automation-2" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The climate for healthcare organizations is a challenging one, with healthcare costs expected to rise by &lt;a href="https://www.uipath.com/blog/rpa-in-the-healthcare-industry"&gt;6.5%&lt;/a&gt; over the next year. Between &lt;a href="https://www.navexglobal.com/blog/article/top-10-regulatory-challenges-in-the-healthcare-environment/"&gt;tighter compliance regulations&lt;/a&gt;, &lt;a href="https://www.cybermdx.com/blog/emerging-medtech-trends-to-keep-an-eye-on-in-2019"&gt;increased competition&lt;/a&gt;, and &lt;a href="https://www.uipath.com/blog/rpa-in-the-healthcare-industry"&gt;tighter budgets&lt;/a&gt;, HDOs have to do everything possible to reduce costs and streamline healthcare delivery processes.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/3-best-practices-to-guide-your-healthcare-automation" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/heatlhcare-automation-2.png" alt="heatlhcare-automation-2" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;The climate for healthcare organizations is a challenging one, with healthcare costs expected to rise by &lt;a href="https://www.uipath.com/blog/rpa-in-the-healthcare-industry"&gt;6.5%&lt;/a&gt; over the next year. Between &lt;a href="https://www.navexglobal.com/blog/article/top-10-regulatory-challenges-in-the-healthcare-environment/"&gt;tighter compliance regulations&lt;/a&gt;, &lt;a href="https://www.cybermdx.com/blog/emerging-medtech-trends-to-keep-an-eye-on-in-2019"&gt;increased competition&lt;/a&gt;, and &lt;a href="https://www.uipath.com/blog/rpa-in-the-healthcare-industry"&gt;tighter budgets&lt;/a&gt;, HDOs have to do everything possible to reduce costs and streamline healthcare delivery processes.&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2F3-best-practices-to-guide-your-healthcare-automation&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare IoT</category>
      <category>Connected medical devices</category>
      <category>HIT professional advancement</category>
      <pubDate>Wed, 05 Jun 2019 09:26:19 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/3-best-practices-to-guide-your-healthcare-automation</guid>
      <dc:date>2019-06-05T09:26:19Z</dc:date>
      <dc:creator>Safi Oranski</dc:creator>
    </item>
    <item>
      <title>How Cybersecurity Enables Medical Device Regulatory Compliance</title>
      <link>https://www.cybermdx.com/blog/cybersecurity-as-a-broad-spectrum-tool-for-streamlining-medical-device-regulatory-compliance</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/cybersecurity-as-a-broad-spectrum-tool-for-streamlining-medical-device-regulatory-compliance" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Cyber-Medical-Device-Regulatory-Compliance-3.png" alt="Cyber-Medical-Device-Regulatory-Compliance-3" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;For healthcare organizations, regulatory compliance is serious business. Non-compliance not only carries serious ethical implications and threatens the loss of public trust, but even from a purely financial perspective, regulations still loom large. HIPAA especially. &lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/cybersecurity-as-a-broad-spectrum-tool-for-streamlining-medical-device-regulatory-compliance" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/Cyber-Medical-Device-Regulatory-Compliance-3.png" alt="Cyber-Medical-Device-Regulatory-Compliance-3" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;For healthcare organizations, regulatory compliance is serious business. Non-compliance not only carries serious ethical implications and threatens the loss of public trust, but even from a purely financial perspective, regulations still loom large. HIPAA especially. &lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fcybersecurity-as-a-broad-spectrum-tool-for-streamlining-medical-device-regulatory-compliance&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare data</category>
      <category>Healthcare network security</category>
      <category>Healthcare standards and regulations</category>
      <category>Healthcare risk management</category>
      <pubDate>Sun, 26 May 2019 09:25:22 GMT</pubDate>
      <author>amir_v@cybermdx.com (Amir Vashkover)</author>
      <guid>https://www.cybermdx.com/blog/cybersecurity-as-a-broad-spectrum-tool-for-streamlining-medical-device-regulatory-compliance</guid>
      <dc:date>2019-05-26T09:25:22Z</dc:date>
    </item>
    <item>
      <title>The BlueKeep Vulnerability Is Stalking Hospital Halls</title>
      <link>https://www.cybermdx.com/blog/bluekeep-vulnerability-stalks-hospital-halls</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/bluekeep-vulnerability-stalks-hospital-halls" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/protect-against-bluekeep-vulnerability.png" alt="protect-against-bluekeep-vulnerability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On May 14, 2019,&amp;nbsp;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708"&gt;Microsoft&amp;nbsp;published an advisory&lt;/a&gt; for a newly discovered remote code execution vulnerability. Given the identifier CVE-2019-0708, the vulnerability has been more popularly&amp;nbsp;named "BlueKeep".&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.cybermdx.com/blog/bluekeep-vulnerability-stalks-hospital-halls" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cybermdx.com/hubfs/protect-against-bluekeep-vulnerability.png" alt="protect-against-bluekeep-vulnerability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;On May 14, 2019,&amp;nbsp;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708"&gt;Microsoft&amp;nbsp;published an advisory&lt;/a&gt; for a newly discovered remote code execution vulnerability. Given the identifier CVE-2019-0708, the vulnerability has been more popularly&amp;nbsp;named "BlueKeep".&lt;/p&gt;    
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4388584&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.cybermdx.com%2Fblog%2Fbluekeep-vulnerability-stalks-hospital-halls&amp;amp;bu=https%253A%252F%252Fwww.cybermdx.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Healthcare network security</category>
      <category>Connected medical devices</category>
      <category>Medical hacking</category>
      <category>Healthcare risk management</category>
      <category>General IT security threats</category>
      <pubDate>Thu, 16 May 2019 15:13:16 GMT</pubDate>
      <guid>https://www.cybermdx.com/blog/bluekeep-vulnerability-stalks-hospital-halls</guid>
      <dc:date>2019-05-16T15:13:16Z</dc:date>
      <dc:creator>Ido Hoyda</dc:creator>
    </item>
  </channel>
</rss>
