Skip to content
Health Cyberlab

Health Cyberlab

Pragmatic cybersecurity for digital health leaders

  • Home
  • 5 Threats
    • A. Email phishing attack
    • B. Ransomware attack
    • C. Loss of equipment
    • D. Accidental / intentional data loss
    • E. Attack against medical device and patient safety
  • 10 Practices
    • 1. Email Protection
    • 2. Endpoint protection
    • 3. Access management
    • 4. Data protection
    • 5. Asset management
    • 6. Network management
    • 7. Vulnerability management
    • 8. Incident response
    • 9. Medical device security
    • 10. Cybersecurity policies
  • Strategies
  • About

Uncategorized

10 Practices, 3. Access management, Uncategorized

Access Management: how leaders can minimize disruption from cyber attacks

Access management affects whether your service line is disrupted for one day or three months when an attack happens.  Articles about ransomware seldom mention the … Read more

Photo of author

Written by: Aldo Febro

Published on: February 1, 2022

MOTTO

start where you are,
use what you have,
do what you can,
done is better than perfect.

Recent Posts

  • Cybersecurity Policy: how leaders set the expectation for cyber hygiene
  • Medical Device Security: how leaders can secure medical devices to enhance patient safety
  • Incident Response: how leaders can prepare for cyberattacks
  • Vulnerability Management: how leaders can be proactive and ahead of attackers
  • Network Management: how leaders can secure the network and minimize impact on attacks

Looking for something

Health Cyberlab | 2023
  • Home
  • 5 Threats
    • A. Email phishing attack
    • B. Ransomware attack
    • C. Loss of equipment
    • D. Accidental / intentional data loss
    • E. Attack against medical device and patient safety
  • 10 Practices
    • 1. Email Protection
    • 2. Endpoint protection
    • 3. Access management
    • 4. Data protection
    • 5. Asset management
    • 6. Network management
    • 7. Vulnerability management
    • 8. Incident response
    • 9. Medical device security
    • 10. Cybersecurity policies
  • Strategies
  • About