Cybersecurity Best Practices

Implementing best practices in cybersecurity is important for healthcare organizations to have in place to reduce cybersecurity risks and potential attacks.

  • Guidelines/Recommendations

    Guidelines/Recommendations

    Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook

    This playbook provides a framework that can serve as a tool in addressing cybersecurity threats impacting medical devices and equipment with the potential to impact safe patient care and clinical operations. This comprehensive guide addresses medical device inventory, hazard vulnerability analysis, emergency operations plan, incident response, training and post-event reporting.

    TAGS: Playbook, Framework, Medical, Hazards, Vulnerability, Training

  • Guidelines/Recommendations

    Guidelines/Recommendations

    White Paper: Five Best Practices For Mitigating Medical Device Security Risks

    Medjacking, also known as medical device hijacking, is a security threat to healthcare organizations because connected medical devices can be hacked, exposing confidential patient information. This threat targets devices directly associated with patient care. It is imperative for organizations to review security of medical devices and ensure security strategies are in place to protect against a direct threat to patients. This white paper developed by Great Bay Software, Inc in Bloomington, MN recommends five best practices to mitigate the risks from medjacking.

    TAGS: Medjacking, great, bay, software, bloomington, MN, Mitigate, Risk, device

  • Guidelines/Recommendations

    Guidelines/Recommendations

    Department of Health and Human Services: Top 10 Tips for Cybersecurity in Healthcare

    The U. S. Department of Health and Human Services has issued voluntary best practices, including 10 great tips for healthcare organizations for managing cyber threats and protecting patients.

    TAGS: human, Services, 10, Tips, Cyber, threats

  • PhoenixNAP: 11 Steps to Defend Against the Top Cybersecurity Threats in Healthcare

    Provides proactive steps to assist with reducing the risk of cybersecurity threats.

    TAGS: Proactive, Cybersecurity, threats

  • Becker's Health IT & CIO Report: HHS Issues Guidance on Preventing 5 Types of Cyberattacks

    HHS provides information on how to prevent different types of cyberattacks.

    TAGS: HHS, cyberattacks