Health-ISAC Hacking Healthcare 6-17-2024

This week, Hacking Healthcare™ briefly looks at the evolving cyber incident impacting London. We breakdown what has been reported so far, examine the long list of cascading effects, and then outline how incidents like this come at a time when the political landscape...

Medical Device Security Blog: Mergers and Acquisitions

Building Resilience During Mergers and Acquisitions Blog in TechNation by Health-ISAC VP of Medical Device Security, Phil Englert. Each merger and acquisition is unique. It is helpful to break the process into three phases: Pre-Acquisition, Post Acquisition, and...

Health-ISAC Hacking Healthcare 6-7-2024

This week, Hacking Healthcare™ examines a new report from the Cyberspace Solarium Commission 2.0 that assesses the state of healthcare cybersecurity in the U.S. and provides recommendations for public and private sector alike. We briefly detail the contents of the...

Healthcare Cybersecurity Needs a Check Up

The United States Cyberspace Solarium Commission recommends participating in Health-ISAC to improve resiliency to cyberattacks Recommendations Healthcare providers’ resiliency to cyberattacks is essential for the continuity of public health services The solution to...

Monthly Newsletter – June 2024

June’s Newsletter features: Recap — Health-ISAC’s Spring Americas Summit European Summit –Call for Papers still open.  Book your room in June and receive a discount code for registration Workshop — Breaking the Barriers in Information Sharing...

Health-ISAC Hacking Healthcare 5-27-2024

This week, Hacking Healthcare™ stays on the topic of U.K. ransomware. Join us as we examine recent reports of an upcoming consultation that might radically shift how the U.K. government allows entities to respond to ransomware incidents. We provide a brief overview of...

Preventing the Next Big Cyberattack on U.S. Health Care

Cybersecurity And Digital Privacy Summary The cyberattack on Change Healthcare that devastated the U.S. health care sector made painfully clear that much more needs to be done to address vulnerabilities that exist throughout the ecosystem. This article offers five...
Translate »