Skip to main content

Post Topic: Hacking Healthcare

Health-ISAC Hacking Healthcare 5-17-2022

TLP White

This week, Hacking Healthcare begins with a look at the growing regulatory and legislative efforts to address medical device cybersecurity. We will break down what the various guidance and regulations ask for or would require, what their chances are going forward, and what might be coming next. Then, we provide a preview of what to expect from the European Union’s (EU) update to its Network Information Security Directive (NIS). The updated directive appears poised to add tens of thousands of new entities to its scope and introduces controversial aspects like cyber incident reporting.

Continue reading

Health-ISAC Hacking Healthcare 5-10-2022

TLP White

This week, Hacking Healthcare begins with a call for participants for this year’s Hobby Exercise. Next, we examine recent statements from American officials in the intelligence and defense community that caution against underestimating the Russian cyber threat. The officials point to serious infrastructure attacks in Ukraine as evidence that critical infrastructure in the United States should keep up its guard. We then dive into two recent documents published from the Health Sector Coordinating Council (HSCC). Specifically, we evaluate what members can gain by assessing their guidance on vulnerability communications as well as guidance on responding to and recovering from cyber incidents that create extended enterprise outages.

Continue reading

Health-ISAC Hacking Healthcare 5-4-2022

TLP White

This week, Hacking Healthcare examines a new report from the European Union Agency for Cybersecurity (ENISA) on the state of coordinated vulnerability disclosure (CVD) within the EU. In addition to outlining the challenges to CVD policy alignment we discuss the Health-ISACs role in the CVD process. Next, we explore what appears to be coordinated sabotage of internet infrastructure in France and reiterate the importance of planning for unforeseen service outages. Finally, we cover a concerning new cybersecurity incident reporting regime coming into force in India.

Continue reading

Health-ISAC Hacking Healthcare 4-26-2022

TLP White

This week, Hacking Healthcare examines how a United States law enforcement agency was given legal backing to remotely access private devices to cleanse malware. This operation raises interesting legal questions as well as concerns over the potential for accidental harm. Then, we provide thoughts on how the United States government’s attempts at public-private collaboration keep falling short.

Continue reading

Health-ISAC Hacking Healthcare 4-19-2022

TLP White

This week, Hacking Healthcare examines Singapore’s 2018 Cybersecurity Act.  In particular, we breakdown what their “light-weight” licensing framework will mean for healthcare organizations that employ penetration testing and managed security operations centers.  We then evaluate a new legislative bill introduced in the United States Senate that would require the Department of Homeland Security (DHS) to share cybersecurity information with legislative bodies more quickly.  We take a look at how this legislation could impact the private sector organizations that share sensitive information, like technical indicators, with government entities.

Continue reading

Health-ISAC Hacking Healthcare 4-12-2022

TLP White
This week, Hacking Healthcare provides an update on the newly developing Trans-Atlantic Data Privacy Framework that would replace the EU-US Privacy Shield that was invalidated in 2020. We will break down what we know of the new agreement, what its chances are of holding up to legal challenge, how long it may take to implement, and what companies should do in the interim. Then we take a look at a recent UK National Cyber Security Centre (NCSC) blog post on the risk associated with using technologies, products and services with ties to Russia, and tie it into a larger discussion around risk management.

Continue reading

Health-ISAC Hacking Healthcare 4-5-2022

TLP White

This week, Hacking Healthcare focuses on the United States and begins by breaking down a new senate bill that looks to improve healthcare cybersecurity.  We examine why the bill may not end up being as impactful as its drafters may hope despite its good intentions.  Next, we explore what a cybercrime statistics bill would and wouldn’t accomplish in helping to improve the nation’s ability to tap into comprehensive cybersecurity statistical data.

Continue reading

Health-ISAC Hacking Healthcare 3-29-2022

TLP White

This week, Hacking Healthcare begins by assessing a report from a U.S. senator on the Homeland Security and Governmental Affairs committee, which alleges that the Federal Bureau of Investigation (FBI) may not always be doing an adequate job of helping ransomware victims who have reached out for assistance. Then, we briefly break down some of the main statistics and predictions from the FBI’s new Internet Crime Report and make a few recommendations for healthcare organizations.

Continue reading

Health-ISAC Hacking Healthcare 3-9-2022

TLP White

This week, Hacking Healthcare begins with an update on the cyber incident reporting bill that was passed by the United States Senate. We examine what the bill requires and what comes next as it looks to become law. Additionally, we explain why implementation may still be some ways off even if it is signed quickly. Next, we examine some of the interesting details to emerge from the Conti ransomware group leaks. We assess what the leaks tell us about the group’s willingness to attack healthcare organizations, how it operates, and why leaks like this could pose a legal or regulatory risk to organizations.

As a reminder, this is the public version of the Hacking Healthcare blog. For additional in-depth analysis and opinion, become a member of H-ISAC and receive the TLP Amber version of this blog (available in the Member Portal.)

Continue reading

Health-ISAC Hacking Healthcare 3-23-2022

TLP White: This week, Hacking Healthcare begins by highlighting the National Institute for Standards and Technology’s (NIST) request for public comment on a potential update to their cybersecurity framework. Next, we dive into a number of new developments outlined by the U.S. Department of Justice that should hopefully make a noticeable dent in cybercrime in 2022. Finally, we provide an update on the hack that hit the International Committee of the Red Cross (ICRC) and offer our thoughts on what it might mean for the healthcare industry in general.

Continue reading

This site is registered on Toolset.com as a development site.