Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![healthcare vendor risk management](/sites/default/files/styles/4_3_small/public/2023/02/07/healthcare%20vendor%20risk%20management.jpg.webp?itok=M4OX6k1V)
Delivering medical services involves hundreds of third-party vendors. We explore the criticality of healthcare vendor risk management and how organizations can overcome common challenges.
![Ransomware](/sites/default/files/styles/4_3_small/public/2021/11/14/8%20Recent%20Dangerous%20Ransomware%20Examples.jpg.webp?itok=AAN80MPg)
Recent Bitsight research shows that 76% of healthcare organizations may be at increased risk of ransomware attacks due to poor TLS/SSL configuration management.
![healthcare IT](/sites/default/files/styles/4_3_small/public/2021/11/14/Healthcare%20security_shutterstock_248574760.jpg.webp?itok=U_KvkDnU)
Hospitals, doctors’ networks, insurance companies, and other healthcare organizations are guardians of valuable protected health information (PHI).
![Poor Patching Cadence Correlated To Healthcare Ransomware Risk](/sites/default/files/styles/4_3_small/public/migration/images/Ransomware%2520Cyber%2520Attacks.jpg.webp?itok=XbDxnzyx)
Recent Bitsight research shows healthcare organizations that display poor patching cadence can be up to 7x more likely to experience ransomware.
![How Universal Health Services Could Have Avoided A Ransomware Attack](/sites/default/files/styles/4_3_small/public/migration/images/UHS%2520ransomware%2520blog%2520post%2520image_1.jpg.webp?itok=e3IphnEc)
Over the weekend of September 26th, major healthcare provider Universal Health Services experienced a ransomware attack resulting in widespread computer systems failures. Without access to their digital databases, doctors and nurses were forced to resort to pen and paper notes, postpone medical treatment, and work through gaps in medical history for patients needing care; all during an already high-pressure time for health care workers fighting the global COVID-19 pandemic.
![3 Ways to Mitigate Cyber Risk in Temporary COVID-19 Hospitals](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_642880945_1.jpg.webp?itok=qqZviqNy)
As cases of COVID-19 have grown, a lack of capacity has led governments to erect temporary hospitals in our nation’s stadiums, parks, and convention centers.
![Could Hackers Target Healthcare Next with Coronavirus Scam?](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_608032916_1.jpg.webp?itok=yha_D4K8)
Cyber hackers are an opportune group of people, hunting like predators and shifting their approach as needed. And now, they’re leveraging the concern and — in some cases — hysteria about the coronavirus outbreak to advance their nefarious objectives.
![How Healthcare Organizations Can Get Ahead of New and Worrisome Cybersecurity Developments](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_574043182_1.jpg.webp?itok=ryhZOJBc)
Cybersecurity is a priority for many organizations these days, but one sector of particular concern is healthcare.
![BitSight Study: Healthcare Sector is Far Too Vulnerable to Cyber Threats](/sites/default/files/styles/4_3_small/public/migration/images/917%2520Blog%2520%25281%2529_1.jpg.webp?itok=BcJCXMnM)
Healthcare is under attack. Hospitals, doctors’ networks, insurance companies, and others are prime targets for hackers due to the valuable protected health information (PHI) they store and the vital role they play in our nation’s critical infrastructure.
![4 Cybersecurity Risks Healthcare Providers Face With Their Vendors](/sites/default/files/styles/4_3_small/public/migration/images/thumb-cybersecurity-in-healthcare_1.jpg.webp?itok=BHOfYJHB)
If you’re involved in a healthcare-based organization, you’ve likely noticed the push for stronger vendor security and vendor risk management (VRM) practices. There are a few reasons for this.
![Discussing Third-Party Risk Management in the Healthcare Industry](/sites/default/files/styles/4_3_small/public/migration/images/medical_corps-128_1.png.webp?itok=hqUfQv92)
Healthcare security and how updated HIPAA/HITECH Act regulations are changing the nature of risk in that industry are hot topics right now. "The rules have made it easier for organizations to have penalties levied against them because of the actions of a subcontractor," Elizabeth Warren, a healthcare attorney with Nashville Tennessee-based Bass Berry & Sims, is quoted as saying in this Becker’s Hospital CIO post. And she’s absolutely right.