Healthcare Heartbeat Quarterly Threat Report Q2 2020
Introducing Healthcare Heartbeat
We’re excited to showcase the first “Healthcare Heartbeat” — a quarterly threat brief created by Health-ISAC and Perch Security covering the top cyber threat trends that the healthcare sector is facing. With the visibility that Perch has across the healthcare sector and more, we’re in a unique position to highlight recent threats and attack trends including malware, ransomware, scanning activity and insecure online activity that could impact Health-ISAC members.
Download a pdf of this threat brief here: [activedemand_form id=”84595″]
Threat and Attack Trends for Q2 2020
Health-ISAC and Perch Security have created an inaugural joint report covering top cyber threat trends that the healthcare sector is facing. The purpose of this report is to share some of the threats and attack trends across the healthcare industry that Perch Security, in collaboration with Health-ISAC, have observed over the last quarter. Health-ISAC member products and services are both augmented and supported by trusted intelligence partner relationships. The Perch/ Health-ISAC relationship is unique in that analysts from both Perch and Health-ISAC exchange timely relevant threat intelligence collected and secured within Health-ISAC’s Threat Operations Center (TOC) in Titusville, FL. This unique relationship creates opportunities to collaborate on threats facing the healthcare sector supported with real-time sensor flow of network security data to provide critical insights to member organizations.
Health-ISAC member products and services are both augmented and supported by trusted intelligence partner relationships. The Perch/ Health-ISAC relationship is unique in that analysts from both Perch and Health-ISAC exchange timely relevant threat intelligence collected and secured within Health-ISAC’s Threat Operations Center (TOC) in Titusville, FL. This unique relationship creates opportunities to collaborate on threats facing the healthcare sector supported with real-time sensor flow of network security data to provide critical insights to member organizations.
- Related Resources & News
- Cyber Threats Know No Borders
- Health-ISAC Hacking Healthcare 1-10-2025
- Google’s rural healthcare cybersecurity initiative
- Gen Z is stealing your health data—and the consequences may be worse than you think
- Left to Our Own Devices Podcast #71: Errol Weiss
- 2025 Newsletter – January
- The Year Ahead: What Can We Expect Within the Cybersecurity Landscape?
- HHS Urges Health Sector to Beef Up OT, IoMT Security
- Defending Healthcare Facilities Against Ransomware Attacks
- Health-ISAC Hacking Healthcare 12-16-2024