“Nothing is foolproof to a sufficiently talented fool…”
“Nothing is foolproof to a sufficiently talented fool…”
CISA, the FBI, and HSS have recently published alert AA20-302A. The advisory outlines the threat of malicious cyber actors targeting the healthcare sector with TrickBot, BazarLoader and Conti malware. These attacks often drop the Ryuk ransomware with ...
With all the many versions of New Normal we’ve seen this year, it’s even more important to stay aware and vigilant. October is the month many countries around the world collaborate to raise awareness for cyber security. The initiative is embraced by government and ...
With the outbreak of the novel coronavirus came shelter-in-place orders and the common sense desire to keep people away from potential virus hotspots. For hospitals, that's resulted in a very serious effort to move non-essential employees to a work-from-home model.
With the outbreak of the novel coronavirus crisis, hackers smell blood in the water. Focused on addressing the crisis, already stretched super thin, and forced to improvise at each new turn, healthcare organizations in particular present an attractive target for hackers.
With the outbreak of the novel coronavirus crisis, hackers smell blood in the water. Focused on addressing the crisis, already stretched super thin, and forced to improvise at each new turn,...
The embrace of cloud solutions in healthcare has been accelerating at a frenetic pace. Since the introduction of the Affordable Care Act which compelled the adoption of Electronic Medical Records...
Yesterday CISA released an advisory for nineteen previously unknown vulnerabilities affecting Treck's embedded TCP/IP stack (also known as a network stack). This disclosure was the result of some...
In large organizations it's only natural for most of the workforce to ignore network analytics — mentally relegating it to the domain of IT and IT alone. In hospitals, more often than not, that...
In times like these, we could all use a distraction. With that in mind, we've created this short quiz on the state of connected healthcare and its digital risks.
On Wednesday March 11th, reports began to emerge about a vulnerability in the compression mechanism used by Microsoft for SMBv3.1.1. If exploited, this vulnerability would allow an attacker to...
In business as in life it’s important to cover your backside. More important and higher minded though is covering your bases. If you engage in risky behavior, it’s a good idea to insulate yourself...
Today, GE Healthcare — in coordination with CyberMDX and CISA (formerly ICS-CERT) — publicly disclosed the discovery of six software design flaws affecting seven products in their popular...
Each year we take some time to look at the trends we see happening in hospital technology and transformation. It is instructive to study the patterns and disruptive pressures contributing to...
Along with all its holiday cheer, this time of year always seems to bring a bounty of predictions as to what the industry will experience over the course of our next lap around the sun. Often,...
In the world of information security, each new year brings new opportunities for growth and learning. From new cyber threats and mitigations to new tools and techniques, there's no shortage of new...
The healthcare industry has come a long way in terms of technological advancement. Healthcare IT systems, structures, and standards have transformed modern healthcare and provided hospitals with...
Healthcare is the most cyber-targeted industry, with nearly one out of every six US data breaches happening in hospitals and the problem is only getting worse. 15,085,302 individual medical...
In 2004, Nema (the National Electrical Manufacturers Association), together with HIMSS (Health Information and Management Systems Society) and a number of other security experts and government...
It's already a well-known fact: cybersecurity constitutes a major challenge for connected healthcare operations, regardless of their unique organizational structures and processes. When each...
In the last several years, data breaches and cyber attacks on healthcare organizations have been in the news with alarming frequency.
This article is the final installment of a three-part series. We've already examined how those traits and trends converged around the principle of agility. Now, we'll discuss how the push for...
It’s only reasonable that access to sensitive medical devices should be restricted to those who require it. Physical access guidelines are designed to ensure that only professionals with the...
On August 13, 2019 Microsoft utilized “Patch Tuesday” to release 36 new CVEs. Of those vulnerabilities, four stand out for their striking similarity to the BlueKeep vulnerability that sent shock...
On July 29th, 2019, eleven vulnerabilities affecting the “VxWorks” Real Time Operating System (RTOS) were publicly disclosed. Since these vulnerabilities were all reported by the same source and...
Biomedical engineers are the unseen force behind some of modern medicine's greatest achievements. Biomedical engineers are at the forefront of exciting research and they are staples of day-to-day...
For the first time, on July 9, 2019, ICS-CERT disclosed a vulnerability specifically impacting anesthesia machines. If exploited, the vulnerability would allow an attacker to silence alarms, alter...
On June 18, 2019, Netflix researchers, together with MITRE, issued an advisory containing four vulnerabilities relating to how Linux handles TCP Selective-Acknowledgement (SACK) at the kernel...
For healthcare organizations, regulatory compliance is serious business. Non-compliance not only carries serious ethical implications and threatens the loss of public trust, but even from a purely...
On May 14, 2019, Microsoft published an advisory for a newly discovered remote code execution vulnerability. Given the identifier CVE-2019-0708, the vulnerability has been more popularly named...
Unless you’ve been living under a rock for the last 10 years, you’ve heard of the Internet of Things, or IoT as it’s commonly abbreviated. The subset of IoT belonging specifically to healthcare...
Today’s hospitals are centers of advanced technology, with upwards of several thousand medical devices and clinical assets under their roof. The US is home to 6,210 hospitals, each with 50 to 500...
Picture this: you're a doctor at Holy Mountain’s Heart & Vascular Center. You're running late. Rushing past a waiting room full of patients in need of care, you hurry to your office and unlock the...
The world is changing; and while there may never have been a time when that statement was not true, it seems particularly true today. Change these days seems to be a lot more aggressive and...
It’s been a year since Spectre and Meltdown — the hardware vulnerabilities discovered collaboratively by Google’s Project Zero and others — went public. Those vulnerabilities rightly garnered...
Subject to stringent regulatory regimes with considerable legacy complications hindering new infrastructure, technology, or processes — most hospitals are also saddled with significant...
Use of the Internet of Medical Things (IoMT) in hospitals is growing. IP addressable medical technologies help deliver personalized care more quickly, give healthcare professionals access to...
It seems that every day we hear about the need for more and better medical cybersecurity measures, but why? We don’t hear about the need for retailers to improve shoplifting prevention mechanisms....
Machine learning is totally transforming the healthcare industry; from how patient care is delivered, to how laboratory procedures are conducted, to diagnostics, all the way to how information...
By now, most of us are familiar with the “WannaCry” ransomware attack. This attack exploited a weakness in Microsoft's Windows operating system to encrypt files and render computers useless until...
I won't sugar coat it. Hospitals are seen by hackers as "soft" and valuable targets. The modern medical facility is connected to the internet in a multitude of ways.
Directed by Oscar-nominated filmmakers Kirby Dick and Amy Ziering, the new Netflix documentary, The Bleeding Edge, profiles five people who suffered horrendously when the medical devices on which...
Medical devices can be your best asset and your worst nightmare. X-ray machines, defibrillators, and other medical electronics are life-saving technologies, but they can also be easily hacked if...