Skip to content
Health Cyberlab

Health Cyberlab

Pragmatic cybersecurity for digital health leaders

  • Home
  • 5 Threats
    • A. Email phishing attack
    • B. Ransomware attack
    • C. Loss of equipment
    • D. Accidental / intentional data loss
    • E. Attack against medical device and patient safety
  • 10 Practices
    • 1. Email Protection
    • 2. Endpoint protection
    • 3. Access management
    • 4. Data protection
    • 5. Asset management
    • 6. Network management
    • 7. Vulnerability management
    • 8. Incident response
    • 9. Medical device security
    • 10. Cybersecurity policies
  • Strategies
  • About

Aldo Febro

10 Practices, 10. Cybersecurity policies

Cybersecurity Policy: how leaders set the expectation for cyber hygiene

Cybersecurity policy forms your staff behavior that protects your organization. Just like any other habit, bad cyber habits are easy to form. But, left unchecked, staff … Read more

Photo of author

Written by: Aldo Febro

Published on: March 22, 2022

10 Practices, 9. Medical device security

Medical Device Security: how leaders can secure medical devices to enhance patient safety

Medical devices are soft targets for threat actors. They were built for a specific clinical use case. As a result, these devices have only the … Read more

10 Practices, 8. Incident response

Incident Response: how leaders can prepare for cyberattacks

Being prepared makes dealing with cyberattack incidents less stressful. Despite our best effort to prevent cyberattacks, there is still a possibility that an incident will … Read more

10 Practices, 7. Vulnerability management

Vulnerability Management: how leaders can be proactive and ahead of attackers

It is safe to say that no system or software is 100% secure. The question is whether we have mitigated the vulnerabilities which already been … Read more

10 Practices, 6. Network management

Network Management: how leaders can secure the network and minimize impact on attacks

Network management is crucial to care delivery. Critical systems (EHR, ERP, RCM, medical devices, etc.) are accessible through a computer network. From the users’ perspective, … Read more

10 Practices, 5. Asset management

Asset Management: how leaders can improve patient safety by using IT assets that are “cyberworthy”

From the perspective of cybersecurity in healthcare, asset management ensures that IT assets are safe to use to deliver care. Federal Aviation Administration (FAA) has … Read more

10 Practices, 4. Data protection

Data protection: how leaders can minimize information leak

Data protection is about keeping PHI, research data, or other sensitive information confidential. It is like having invisible fences for your confidential data.  Threat actors … Read more

10 Practices, 3. Access management, Uncategorized

Access Management: how leaders can minimize disruption from cyber attacks

Access management affects whether your service line is disrupted for one day or three months when an attack happens.  Articles about ransomware seldom mention the … Read more

10 Practices, 2. Endpoint protection

Endpoint Protection: budget-friendly options for health leaders in 2022

With trends like work from home, remote patient monitoring, acute care at home, new ambulatory care models, etc., the topic of endpoint protection has become … Read more

1. Email Protection, 10 Practices

Email Protection: How leaders can get cost-effective option in 2022

A robust email protection system is crucial to stop email phishing attacks that often lead to ransomware. The Health Industry Cybersecurity Practices (HICP) document describes … Read more

Next

MOTTO

start where you are,
use what you have,
do what you can,
done is better than perfect.

Recent Posts

  • Cybersecurity Policy: how leaders set the expectation for cyber hygiene
  • Medical Device Security: how leaders can secure medical devices to enhance patient safety
  • Incident Response: how leaders can prepare for cyberattacks
  • Vulnerability Management: how leaders can be proactive and ahead of attackers
  • Network Management: how leaders can secure the network and minimize impact on attacks

Looking for something

Health Cyberlab | 2023
  • Home
  • 5 Threats
    • A. Email phishing attack
    • B. Ransomware attack
    • C. Loss of equipment
    • D. Accidental / intentional data loss
    • E. Attack against medical device and patient safety
  • 10 Practices
    • 1. Email Protection
    • 2. Endpoint protection
    • 3. Access management
    • 4. Data protection
    • 5. Asset management
    • 6. Network management
    • 7. Vulnerability management
    • 8. Incident response
    • 9. Medical device security
    • 10. Cybersecurity policies
  • Strategies
  • About