Cybersecurity Best Practices
Implementing best practices in cybersecurity is important for healthcare organizations to have in place to reduce cybersecurity risks and potential attacks.
-
Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook
This playbook provides a framework that can serve as a tool in addressing cybersecurity threats impacting medical devices and equipment with the potential to impact safe patient care and clinical operations. This comprehensive guide addresses medical device inventory, hazard vulnerability analysis, emergency operations plan, incident response, training and post-event reporting.
-
White Paper: Five Best Practices For Mitigating Medical Device Security Risks
Medjacking, also known as medical device hijacking, is a security threat to healthcare organizations because connected medical devices can be hacked, exposing confidential patient information. This threat targets devices directly associated with patient care. It is imperative for organizations to review security of medical devices and ensure security strategies are in place to protect against a direct threat to patients. This white paper developed by Great Bay Software, Inc in Bloomington, MN recommends five best practices to mitigate the risks from medjacking.
-
Department of Health and Human Services: Top 10 Tips for Cybersecurity in Healthcare
The U. S. Department of Health and Human Services has issued voluntary best practices, including 10 great tips for healthcare organizations for managing cyber threats and protecting patients.
-
Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients
DHH provides resources on how to manage cybersecurity threats and how to protect patients and their information.
-
PhoenixNAP: 11 Steps to Defend Against the Top Cybersecurity Threats in Healthcare
Provides proactive steps to assist with reducing the risk of cybersecurity threats.
-
Becker's Health IT & CIO Report: HHS Issues Guidance on Preventing 5 Types of Cyberattacks
HHS provides information on how to prevent different types of cyberattacks.