Skip to content
Health Cyberlab

Health Cyberlab

Pragmatic cybersecurity for digital health leaders

  • Home
  • 5 Threats
    • A. Email phishing attack
    • B. Ransomware attack
    • C. Loss of equipment
    • D. Accidental / intentional data loss
    • E. Attack against medical device and patient safety
  • 10 Practices
    • 1. Email Protection
    • 2. Endpoint protection
    • 3. Access management
    • 4. Data protection
    • 5. Asset management
    • 6. Network management
    • 7. Vulnerability management
    • 8. Incident response
    • 9. Medical device security
    • 10. Cybersecurity policies
  • Strategies
  • About

5. Asset management

10 Practices, 5. Asset management

Asset Management: how leaders can improve patient safety by using IT assets that are “cyberworthy”

From the perspective of cybersecurity in healthcare, asset management ensures that IT assets are safe to use to deliver care. Federal Aviation Administration (FAA) has … Read more

Photo of author

Written by: Aldo Febro

Published on: February 15, 2022

MOTTO

start where you are,
use what you have,
do what you can,
done is better than perfect.

Recent Posts

  • Cybersecurity Policy: how leaders set the expectation for cyber hygiene
  • Medical Device Security: how leaders can secure medical devices to enhance patient safety
  • Incident Response: how leaders can prepare for cyberattacks
  • Vulnerability Management: how leaders can be proactive and ahead of attackers
  • Network Management: how leaders can secure the network and minimize impact on attacks

Looking for something

Health Cyberlab | 2023
  • Home
  • 5 Threats
    • A. Email phishing attack
    • B. Ransomware attack
    • C. Loss of equipment
    • D. Accidental / intentional data loss
    • E. Attack against medical device and patient safety
  • 10 Practices
    • 1. Email Protection
    • 2. Endpoint protection
    • 3. Access management
    • 4. Data protection
    • 5. Asset management
    • 6. Network management
    • 7. Vulnerability management
    • 8. Incident response
    • 9. Medical device security
    • 10. Cybersecurity policies
  • Strategies
  • About