Get notifications!

New Anesthesia Machine Vulnerability Disclosure Tells a Bigger Story

For the first time, on July 9, 2019, ICS-CERT disclosed a vulnerability specifically impacting anesthesia machines. If exploited, the vulnerability would allow an attacker to silence alarms, alter date and time settings, adjust gas composition inputs, change barometric pressure, and switch between anesthetic agents — all without authentication.

Cyber-Enabled Hospital Merger and Acquisition Management

The healthcare industry in the US has been facing widespread disruption for some years. The Affordable Care Act in 2010 demanded that the industry carry out wholesale changes to its processes and systems in order to ...

CVE-2019-10962 & IoT Security Threats From "Innocent" Objects

At one point early on in the beloved C. S. Lewis children’s novel, The Lion, the Witch and the Wardrobe, Mr. Tumnus sets the scene, intimating the stakes involved and explaining his own timidity, saying, “The Witch is ever so watchful. Even the trees have eyes...!”

How Cybersecurity Enables Medical Device Regulatory Compliance

For healthcare organizations, regulatory compliance is serious business. Non-compliance not only carries serious ethical implications and threatens the loss of public trust, but even from a purely financial perspective, regulations still loom large. HIPAA especially. With a maximum penalty of $1.5 million per ...

The BlueKeep Vulnerability Is Stalking Hospital Halls

On May 14, 2019, Microsoft published an advisory for a newly discovered remote code execution vulnerability. Given the identifier CVE-2019-0708, the vulnerability has been more ...

Your Finger on the Cyber Pulse!

Thank you for visiting the CyberMDX blog, a space devoted to exploring the intersection of healthcare management and cybersecurity.

Let us be your go-to resource for technological trends, best practice techniques, and cyber intelligence surrounding your connected medical ecosystems.

We encourage active participation in this vital conversation, so comments are welcome. If you're interested in contributing content, please reach out by email.



Load Posts

The BlueKeep Vulnerability Is Stalking Hospital Halls

On May 14, 2019, Microsoft published an advisory for a newly discovered remote code execution vulnerability. Given the identifier CVE-2019-0708, the vulnerability has been more popularly named...

Clinical Cybersecurity Explained

Picture this: you're a doctor at Holy Mountain’s Heart & Vascular Center. You're running late. Rushing past a waiting room full of patients in need of care, you hurry to your office and unlock the...

Cybersecurity as a Medical Device Quality Assurance Imperative

Though cybersecurity is most closely associated with the IT department, the truth is that it affects and touches all aspects of an organization. Indeed, even the most devoted IT professionals...

The Cyber Component In Medical Device Quality Assurance Training

Cybersecurity is currently one of health care’s largest concerns. The unlawful manipulation of medical devices locally, or more recently remotely, via malware and ransomware attacks, represents...

Cybersecurity: Key to the Hospital Strategic Planning Process

Hospitals operate in a challenging environment: relationships with insurers, state as well as federal rules and regulations, staff shortages, emerging treatments, new clinical technologies, and...

Endpoint Detection & Response: Key to Hospital Network Security

Spurred by competition, razor-thin operating margins, and government regulation, healthcare organizations are under immense pressure to quickly and regularly implement new technologies.

Why Strong Healthcare IoT Security Requires Specialized Solutions

The rush to adopt IoT devices in consumer and business markets is well documented, but the scale of uptake comes at a cost: the increased risk of cyber attack. More connected devices and the...

Cybersecurity 101: Medical Technology Edition

The world is changing; and while there may never have been a time when that statement was not true, it seems particularly true today. Change these days seems to be a lot more aggressive and...

Healthcare Cybersecurity Predictions for 2019

Like most business units at this time of year, biomedical and clinical teams will be reflecting on the last 12 months and trying, as best they can, to figure out what the new year will bring....

Where Healthcare Management, Spectre and Meltdown Meet

It’s been a year since Spectre and Meltdown — the hardware vulnerabilities discovered collaboratively by Google’s Project Zero and others — went public. Those vulnerabilities rightly garnered...

Why Are More Robust Medical Cybersecurity Measures Even Needed?

It seems that every day we hear about the need for more and better medical cybersecurity measures, but why? We don’t hear about the need for retailers to improve shoplifting prevention mechanisms....

Better Passwords Key to Bridging the Medical Data Security Gap

By now, most of us are familiar with the “WannaCry” ransomware attack. This attack exploited a weakness in Microsoft's Windows operating system to encrypt files and render computers useless until...

Dealing with Cybersecurity Issues in Healthcare: Tips & Tricks

I won't sugar coat it. Hospitals are seen by hackers as "soft" and valuable targets. The modern medical facility is connected to the internet in a multitude of ways. These connections include...

Why Cybersecurity Should Concern Every Hospital CEO

Medical devices can be your best asset and your worst nightmare. X-ray machines, defibrillators, and other medical electronics are life-saving technologies, but they can also be easily hacked if...

How to Digitally Secure Fast-Changing Health Technologies

Cybercrime is nuanced, and while most medical facilities think they are secure, undiscovered security gaps are being exploited every day. And, it’s not always easy to detect a breach.

Tough Security Questions Hospital CISOs Must Be Able to Answer

Your CISO has a big job: develop network security processes and procedures, while addressing privacy, confidentiality and compliance standards, while investigating and managing health information...




Give a Little Love and It All Comes Back to You!