The Cybersecurity Threat Lurking in Legacy Medical Devices
Why HTM teams must treat “old but working” as a high-stakes cyber risk—and how to protect patients and operations now.
Why HTM teams must treat “old but working” as a high-stakes cyber risk—and how to protect patients and operations now.
Kettering Health is investigating a cybersecurity incident that disrupted its systems.
An unauthorized actor briefly accessed an employee’s email account, prompting a months-long review that confirmed the exposure of protected health information.
Why HTM teams must treat “old but working” as a high-stakes cyber risk—and how to protect patients and operations now.
Cyware has unveiled its Healthcare Threat Intelligence Platform, a system designed to address healthcare-specific threats with features like real-time dashboards and healthcare-focused threat feeds to support threat detection, compliance, and decision-making.
Read MoreIn the wake of a ransomware attack on UnitedHealth Group’s Change Healthcare unit, the healthcare sector faces a critical question: should breach notifications be handled by healthcare providers, or outsourced to specialized third parties for more efficient and timely responses?
Read MoreMillions of Americans depend on medical devices every day, but many are shockingly vulnerable to cyberattacks. Discover how new technologies and rising regulations are stepping in to protect patient data and prevent future breaches in healthcare.
Read MoreChange Healthcare notified customers about a cyberattack affecting PHI, offering 2 years of credit monitoring and identity theft protection.
Read MoreImproving medical device security requires real-time monitoring and comprehensive visibility of hardware and firmware, according to two industry experts. They explain their reasoning here.
Read MoreAscension is managing a ransomware attack with cybersecurity experts, sharing threat intelligence, and working to restore disrupted systems.
Read MoreHow HTMs can help secure facilities from cyberattacks via specialized training, asset management, prioritization, and response planning.