Risk management, legacy tech pose major threats to healthcare firms, report finds
Score: 75/100
3 articles
100.0% coherence
1 day ago
Activity Timeline
Help For Stretching Cyber Resources in Healthcare...
Data Breach Today UK
Jul 15
06:56
Top Cyber Struggles of Small, Rural Healthcare Pro...
Data Breach Today UK
Jul 15
06:56
Risk management, legacy tech pose major threats to...
Cybersecurity Dive
Primary Article
Jul 15
15:22
Primary Article
Cybersecurity Dive 16 hours ago
Risk management, legacy tech pose major threats to healthcare firms, report finds
Companies have improved their recovery processes and user controls but still lag in risk preparedness, according to the report.
Dive Brief:
More than nine in 10 healthcare organizations experienced a cyberattack last year, and those attacks disrupted patient care at seven in 10 organizations, according toa reportreleased Tuesday by managed security services provider Fortified Health Security.
Fortified’s report lists the aspects of the NIST Cybersecurity Framework where healthcare organizations have seen the most improvement, as well as areas that continue to pose serious risks.
The data helps illustrate why hospitals and other healthcare organizations remain top targets for ransomware criminals.
Dive Insight:
With healthcare facilities scrambling to identify and fix their top cyber risks, Fortified’s report provides some indications of where to begin.
According to the report, the five biggest security ga...
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Unlock AI Insights
Get AI-generated executive, technical, and remediation briefs with Pro.
Help For Stretching Cyber Resources in Healthcare
Credit Eligible
Get Permission
Rural hospitals and small medical practices must be creative and open-minded when it comes to locking down their digita...
Healthcare,Industry Specific, -Generation Technologies & Secure Development
Top Cyber Struggles of Small, Rural Healthcare Providers
Credit Eligible
Get Permission
Many healthcare providers across the...
Save to Folder
Choose a folder to save this cluster:
We use cookies
We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.
Cookie Settings
Essential Cookies
Required for the website to function. Cannot be disabled.
Session management and authentication
Security and fraud prevention
Cookie consent preferences
Analytics Cookies
Help us understand how visitors interact with our website.