Get notifications!

Put Your Knowledge to the Test: Connected Medical Device Risk Exposure

In times like these, we could all use a distraction. With that in mind, we've created this short quiz on the state of connected healthcare and its digital risks.

The US Coronavirus Relief Package: How Hospitals Can (and Cannot) Claim and Spend Funds

As COVID-19 continues to plague the world, governments are beginning to pass legislation aimed at both strengthening critical infrastructure and propping up the wider economy.

Cause for Optimism: Resourcefulness in the Face of COVID-19

There seems to be a lot of doom and gloom in the air these days and it's not hard to understand why. While I admit to sometimes playing the role of Negative Nelly myself, the truth is that all that negativity unfairly and inaccurately distorts our perception of reality.

The Windows 10 'SMBGhost' Vulnerability: What to Know & What to Do

On Wednesday March 11th, reports began to emerge about a vulnerability in the compression mechanism used by Microsoft for SMBv3.1.1. If exploited, this vulnerability would allow an ...

The Next Generation of Healthcare Risk Management Has Arrived

In business as in life it’s important to cover your backside. More important and higher minded though is covering your bases. If you engage in risky behavior, it’s a good idea to insulate yourself from potential fallout; it’s even better to take steps to reduce or even eliminate the potential for fallout.

...
Load Posts

The Next Generation of Healthcare Risk Management Has Arrived

In business as in life it’s important to cover your backside. More important and higher minded though is covering your bases. If you engage in risky behavior, it’s a good idea to insulate yourself...

The CCPA and Healthcare: What You Need to Know

Providing consumers greater control and transparency over their personal data, the California Consumer Privacy Act (CCPA) went into effect on January 1, 2020.

Everything You Need to Know About the MDhex Vulnerabilities

Today, GE Healthcare — in coordination with CyberMDX and CISA (formerly ICS-CERT) — publicly disclosed the discovery of six software design flaws affecting seven products in their popular...

A Very CyberMDX New Year's Resolution

The new year is a time take stock and be grateful for what we have. At CyberMDX, we're grateful for our amazing team, the best-in-class solution we've developed and continually improve, and of...

Grading Our 2019 Healthcare Predictions

Along with all its holiday cheer, this time of year always seems to bring a bounty of predictions as to what the industry will experience over the course of our next lap around the sun. Often,...

5 Medical Information Security Lessons for 2020

In the world of information security, each new year brings new opportunities for growth and learning. From new cyber threats and mitigations to new tools and techniques, there's no shortage of new...

A First Blush Guide to Cybersecurity in Hospitals

The healthcare industry has come a long way in terms of technological advancement. Healthcare IT systems, structures, and standards have transformed modern healthcare and provided hospitals with...

A Compendium of Connected Healthcare Technology Facts & Figures

Healthcare is the most cyber-targeted industry, with nearly one out of every six US data breaches happening in hospitals and the problem is only getting worse. 15,085,302 individual medical...

Put a SOC In It!

"Who will watch the watchmen?" It's a deceptively poignant and tricky question dating back to ancient Rome when it was famously posed by Juvenal. Then, as now, it would seem many of the most...

After the Dust Has Settled: GDPR in Healthcare

It's been more than a year since the General Data Protection Regulation (GDPR) has taken effect. The European Commission's wide-reaching law was designed to protect the privacy of EU citizens and...

How Cybersecurity Factors into the Medical Device Procurement Process

In 2018, the global medical device and clinical asset market was worth approximately $8.98 billion. By 2025, it’s estimated that it will be worth $61.35 billion. Hospitals, on average, spend 11-13%

How MDS² Data Can Inform Smarter Medical Device Workflows

In 2004, Nema (the National Electrical Manufacturers Association), together with HIMSS (Health Information and Management Systems Society) and a number of other security experts and government...

How Hospitals Prioritize Digital Risk Management

In the last several years, data breaches and cyber attacks on healthcare organizations have been in the news with alarming frequency.

Why It’s Wrong to Sync Medical Device Patching & Scheduled Maintenance

Machines are indispensable, yet imperfect. They work fine one day and break down the next. What’s more, even if the machine remains in essentially the same working order, you’ll still need to...

How Medical Device Cybersecurity Complements Physical Access Control

It’s only reasonable that access to sensitive medical devices should be restricted to those who require it. Physical access guidelines are designed to ensure that only professionals with the...

Windows DejaBlue: Lookalike RDP Flaws Emerge Months After BlueKeep

On August 13, 2019 Microsoft utilized “Patch Tuesday” to release 36 new CVEs. Of those vulnerabilities, four stand out for their striking similarity to the BlueKeep vulnerability that sent shock...

In Perspective: the Baltimore Hack Attack

The world is a dangerous place. Perhaps it’s always been that way. Nature is governed by evolutionary competition, politics take shape where interests and power meet, and economics are ruled by...

Why Cybersecurity is Important for Biomedical Engineers

Biomedical engineers are the unseen force behind some of modern medicine's greatest achievements. Biomedical engineers are at the forefront of exciting research and they are staples of day-to-day...

New Anesthesia Machine Vulnerability Disclosure Tells a Bigger Story

For the first time, on July 9, 2019, ICS-CERT disclosed a vulnerability specifically impacting anesthesia machines. If exploited, the vulnerability would allow an attacker to silence alarms, alter...

Cyber-Enabled Hospital Merger and Acquisition Management

The healthcare industry in the US has been facing widespread disruption for some years. The Affordable Care Act in 2010 demanded that the industry carry out wholesale changes to its processes and...

CVE-2019-10962 & IoT Security Threats From "Innocent" Objects

At one point early on in the beloved C. S. Lewis children’s novel, The Lion, the Witch and the Wardrobe, Mr. Tumnus sets the scene, intimating the stakes involved and explaining his own timidity,...

How Cybersecurity Enables Medical Device Regulatory Compliance

For healthcare organizations, regulatory compliance is serious business. Non-compliance not only carries serious ethical implications and threatens the loss of public trust, but even from a purely...

The BlueKeep Vulnerability Is Stalking Hospital Halls

On May 14, 2019, Microsoft published an advisory for a newly discovered remote code execution vulnerability. Given the identifier CVE-2019-0708, the vulnerability has been more popularly named...

Clinical Cybersecurity Explained

Picture this: you're a doctor at Holy Mountain’s Heart & Vascular Center. You're running late. Rushing past a waiting room full of patients in need of care, you hurry to your office and unlock the...

Cybersecurity as a Medical Device Quality Assurance Imperative

Though cybersecurity is most closely associated with the IT department, the truth is that it affects and touches all aspects of an organization. Indeed, even the most devoted IT professionals...

The Cyber Component In Medical Device Quality Assurance Training

Cybersecurity is currently one of health care’s largest concerns. The unlawful manipulation of medical devices locally, or more recently remotely, via malware and ransomware attacks, represents...

Cybersecurity: Key to the Hospital Strategic Planning Process

Hospitals operate in a challenging environment: relationships with insurers, state as well as federal rules and regulations, staff shortages, emerging treatments, new clinical technologies, and...

Endpoint Detection & Response: Key to Hospital Network Security

Spurred by competition, razor-thin operating margins, and government regulation, healthcare organizations are under immense pressure to quickly and regularly implement new technologies.

Why Strong Healthcare IoT Security Requires Specialized Solutions

The rush to adopt IoT devices in consumer and business markets is well documented, but the scale of uptake comes at a cost: the increased risk of cyber attack. More connected devices and the...

Cybersecurity 101: Medical Technology Edition

The world is changing; and while there may never have been a time when that statement was not true, it seems particularly true today. Change these days seems to be a lot more aggressive and...

Healthcare Cybersecurity Predictions for 2019

Like most business units at this time of year, biomedical and clinical teams will be reflecting on the last 12 months and trying, as best they can, to figure out what the new year will bring....

Where Healthcare Management, Spectre and Meltdown Meet

It’s been a year since Spectre and Meltdown — the hardware vulnerabilities discovered collaboratively by Google’s Project Zero and others — went public. Those vulnerabilities rightly garnered...

Why Are More Robust Medical Cybersecurity Measures Even Needed?

It seems that every day we hear about the need for more and better medical cybersecurity measures, but why? We don’t hear about the need for retailers to improve shoplifting prevention mechanisms....

Better Passwords Key to Bridging the Medical Data Security Gap

By now, most of us are familiar with the “WannaCry” ransomware attack. This attack exploited a weakness in Microsoft's Windows operating system to encrypt files and render computers useless until...

Dealing with Cybersecurity Issues in Healthcare: Tips & Tricks

I won't sugar coat it. Hospitals are seen by hackers as "soft" and valuable targets. The modern medical facility is connected to the internet in a multitude of ways.

Why the Prospect of a Medical Device Security Breach Concerns Hospital CEOs

Medical devices can be your best asset and your worst nightmare. X-ray machines, defibrillators, and other medical electronics are life-saving technologies, but they can also be easily hacked if...

How to Digitally Secure Fast-Changing Health Technologies

Cybercrime is nuanced, and while most medical facilities think they are secure, undiscovered security gaps are being exploited every day. And, it’s not always easy to detect a breach.

Tough Security Questions Hospital CISOs Must Be Able to Answer

Your CISO has a big job: develop network security processes and procedures, while addressing privacy, confidentiality and compliance standards, while investigating and managing health information...

MOST READ POSTS

MOST RECENT POSTS

POSTS BY TAGS


──────
Give a Little Love and It All Comes Back to You!

healthcare-industry-report