Guarding Health: Protecting the Healthcare Sector from Cyber Threats

Errol Weiss on Protecting the Healthcare Sector from Cyber Threats
Read this article in Fortra | Tripwire here:
This article includes:
- – From NSA to FS-ISAC to Health-ISAC
- – Communication challenges during a breach
- – From a legal risk decision to a business-based risk decision
- – 3 things health sector organizations can do to step up security
- – Risk acceptance and risk avoidance involving patching
- – About vendor partnerships
- – The current threat landscape in the health sector
Posted on July 8, 2024
Organizations must practice good data backup techniques, and you’ve got to make sure that those backups actually work. One way to test that is to pretend everything’s broken, everything’s down. Go build a new system and start from scratch. The questions to be answered in the after-action report would include: Can we restore the systems? How long is that going to take? What’s the downtime as a result of that? Is your staff equipped to operate on paper for that amount of time?
- Related Resources & News
- Potential Terror Threat Targeted at Health Sector – AHA & Health-ISAC Joint Threat Bulletin
- New Cybersecurity Policies Could Protect Patient Health Data
- CyberWire Podcast: PHP flaw sparks global attack wave
- Health-ISAC Hacking Healthcare 3-14-2025
- HSCC Aiming to Identify Healthcare Workflow Chokepoints
- New Healthcare Security Benchmark Highlights Key Investment Priorities and Risks
- Are Efforts to Help Secure Rural Hospitals Doing Any Good?
- CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts
- 2024 Health-ISAC Discussion Based Exercise Series After-Action Report
- Cobalt Strike takedown effort cuts cracked versions by 80%