Cybersecurity
Topic Collection
October 30, 2024
Topic Collection: Cybersecurity
Recent cyberattacks on healthcare facilities have had significant effects on every aspect of patient care and operational continuity. They highlight the need for healthcare organizations of all sizes and types to implement cybersecurity best practices and conduct robust planning to improve cyber incident response and consequence management. As the number of cyberattacks on the healthcare sector increases, practitioners, facility executives, information technology professionals, and emergency managers must remain current on threats to their facilities and systems, as well as have robust downtime procedures to protect patients and staff. The resources in this Topic Collection can help stakeholders better protect against, mitigate, respond to, and recover from cyberattacks to ensure patient safety and operational continuity. This Topic Collection was updated in August 2022.
Select examples/widely publicized cyberattacks are cited here due to the major impact they had on healthcare operations and clinical care delivery; however, it is important to note that references to these incidents are not exhaustive. As the number and severity of incidents continues to grow, we encourage you to regularly review the information and alerts available on the following federal sites:
-HHS Healthcare and Public Health Sector: Highlights-Cybersecurity Edition
-HHS 405(d): Subscribe to the Post
-CISA: National Cyber Awareness System-Bulletins, Alerts Subscription
Each resource in this Topic Collection is placed into one or more of the following categories (click on the category name to be taken directly to that set of resources). Resources marked with an asterisk (*) appear in more than one category.
Must Reads
This implementation guide provides specific steps that health care organizations can take immediately to manage cyber risks to their information technology systems. It provides recommendations, best practices, and resources to help the public and private health care sectors prevent cybersecurity incidents.
Login to favorite or comment on the article
Recent cyberattacks on healthcare facilities have had significant effects on every aspect of patient care and organizational continuity. They highlight the need for healthcare organizations of all sizes and types to implement cybersecurity best practices and conduct robust planning and exercising for cyber incident response and consequence management. As the number of cyberattacks on this sector increases, healthcare practitioners, facility executives, information technology professionals, and emergency managers must remain current on the ever-changing nature and type of threats to their facilities, systems, patients, and staff. These resources can help stakeholders better protect against, mitigate, respond to, and recover from cyber threats, ensuring patient safety and operational continuity.
Login to favorite or comment on the article
This playbook presents a framework that can be used by healthcare organizations and stakeholders to plan for and respond to cybersecurity attacks on medical devices. It includes supplemental information specific to regional cyber preparedness and recommendations for conducting a hazard vulnerability analysis, asset inventory, and incident reporting.
Login to favorite or comment on the article
Cybersecurity and Infrastructure Security Agency. (n.d.).
Resources for Business.
(Accessed 8/16/2022.) U.S. Department of Homeland Security.
This webpage (known by the acronym US-CERT) features links to cybersecurity resources for businesses (e.g., healthcare facilities) grouped into the following categories: Resources to Identify, Resources to Protect, Resources to Detect, and Resources to Recover. A specific link to the National Cyber Awareness System (https://www.cisa.gov/uscert/ncas) provides a single point of access for all current cybercrime information, including alerts, tips, bulletins, and analytic reports.
Login to favorite or comment on the article
Cybersecurity and Infrastructure Security Agency. (2023).
Shields Up.
Russia’s invasion of Ukraine has included cyberattacks on Ukrainian critical infrastructure, which could have implications for cybersecurity in other parts of the world, including the U.S. This resource from the Cybersecurity and Infrastructure Security Agency (CISA) helps organizations prevent and respond to cyberattacks. The website contains guidance for organizations, corporate leaders, individuals, and ransomware response.
Login to favorite or comment on the article
This webpage provides direct access to the main guidance documents, a four-volume publication, that provides an overview of current HSCC cybersecurity threats faced by the healthcare and public health (HPH) sector. In addition, it links to Technical Volume 1 that outlines cyber safety practices for small healthcare organizations; Technical Volume 2 that discusses cybersecurity practices for medium to large healthcare organizations, and other resources and template materials that can be used to develop policies and procedures via a cybersecurity toolkit.
Login to favorite or comment on the article
Healthcare and Public Health Sector Coordinating Council, Cybersecurity Working Group. (2022).
HSCC Publications.
This webpage lists working group recommended cybersecurity publications by date and includes links to resources on operational continuity, telehealth and telemedicine cybersecurity, health industry tactical response, and information sharing.
Login to favorite or comment on the article
U.S. Department of Health and Human Services, Health Sector Cybersecurity Coordination Center (HC3). (2022).
HC3 Products.
This health sector page provides access to HC3 and partner threat briefs, sector alerts, joint threat bulletins, and other cyber-related resources to help organizations maintain situational awareness of current cyber vulnerabilities and threats.
Login to favorite or comment on the article
This webpage assists healthcare professionals find information about the HIPAA Security Rule and provides links to other standards and resources on safeguarding electronic protected health information.
Login to favorite or comment on the article
U.S. Department of Health and Human Services, Office for Civil Rights and Office of the National Coordinator for Health Information Technology. (2022).
Security Risk Assessment (SRA) Tool.
The Security Risk Assessment tool was designed to help guide healthcare providers in small to medium-sized offices conduct risk assessments of their organizations’ HIPAA compliance. This webpage contains a user guide and tutorial video. Users can download the 156 question app to their computers or iPads.
Login to favorite or comment on the article
U.S. Department of Health and Human Services, Office of Information Security. (n.d.).
405(d) Resource Library.
(Accessed 3/11/2024.)
This webpage provides access to all the task group products, publications, and guidance material on health sector cyber-related materials, including cybersecurity practices for small, medium, and large healthcare organizations; phishing, malware, and ransomware factsheets; cyberthreat infographics; healthcare industry cybersecurity quick start guides; and security considerations and infographics for medical devices. Many 405(d) resources are also available in Spanish: https://405d.hhs.gov/spanish
Login to favorite or comment on the article
This document was developed to assist healthcare professionals, industry partners, and federal partners communicate information about cybersecurity vulnerabilities. It contains best practices and tips for creating clear, concise, and easy to consume messaging to patients and the public.
Login to favorite or comment on the article
Education and Training
Benjamin Gilbert provides recommendations for managing challenges related to healthcare cybersecurity (e.g., high recovery costs, hiring cybersecurity staff, and protecting the sensitivity of patient information). Gilbert also covers threat vectors, methodology of cyberattacks, and protective measures health care organizations can take to prepare their IT systems and facilities.
Login to favorite or comment on the article
The CISA resources provided on this page can assist stakeholders and partners with conducting their own training exercises on a variety of cybersecurity and physical security scenarios including ransomware, insider threats, phishing scams, active shooter, and improvised explosive devices.
Login to favorite or comment on the article
This webpage provides a variety of cyber-related training and education resources for federal employees, private industry professionals, and critical infrastructure operators (e.g., certification prep courses, cyber defense skills, and incident response training).
Login to favorite or comment on the article
This series of webinars outlines the challenges faced by owners/operators of critical infrastructure and national critical functions and strategies for mitigating and overcoming them.
Login to favorite or comment on the article
This webpage includes links to the CISA Virtual Learning Portal, scheduled web-based, and instructor-led, cybersecurity training programs geared toward industrial control system protection.
Login to favorite or comment on the article
This package of materials assists stakeholders in assessing their recovery and business continuity plans related to organizational recovery from the COVID-19 pandemic.
Login to favorite or comment on the article
This guide can help staff in healthcare facilities design, develop, conduct, and evaluate cybersecurity tests, training, and exercise events.
Login to favorite or comment on the article
The “Cybersecurity for the Clinician” video training series is comprised of eight videos, for a total of 47 minutes (eligible for one credit hour). Speakers explain in easy, non-technical language what clinicians and students in the medical profession need to understand about how cyber attacks can affect clinical operations and patient safety, and how to help keep healthcare data, systems and patients safe from cyber threats.
Login to favorite or comment on the article
This resource provides information on cost-effective strategies that can be use by a range of healthcare organizations to reduce cybersecurity risks. Practical guidance includes training videos on email protection, asset management, endpoint protection, and network management, among others that are available towards the bottom of the webpage.
Login to favorite or comment on the article
National Computer Forensics Institute (NCFI). (n.d.).
NCFI Courses.
(Accessed 8/16/2022.)
The NCFI is a federally funded training center established to educate state and local officials in cyber-related crime investigations, trends, and investigative methods. Courses include training on ransomware investigations, business email compromise, and incidence response cyber team coordination for first responders, law enforcement, and local government personnel.
Login to favorite or comment on the article
From this webpage, visitors can search for offered trainings by focus area, offering entity, level of training, location of training, and other factors as well as access various on-line training sites.
Login to favorite or comment on the article
This organization’s webpage provides information on federal information security training and cybersecurity awareness programs, including upcoming events and past programs.
Login to favorite or comment on the article
The NICE initiative was developed as a partnership between government, academia, and private industry to promote cybersecurity education, training, and workforce development. This webpage provides links to information on the framework, cybersecurity training and how to get involved in network efforts. The ‘Online Learning Content’ page includes links to professional development training, tools, and various specific cybersecurity educational materials.
Login to favorite or comment on the article
This webinar recording examines guidance on securing critical technical aspects of the healthcare environment such as EHR, medical devices, telehealth, patient monitoring, and PACS systems, and highlights best practices for engaging the public and private sector.
Login to favorite or comment on the article
This resource for information security training includes links to webcasts, online trainings and livestream videos, educational whitepapers, and more for the healthcare sector.
Login to favorite or comment on the article
This website includes a comprehensive list of the (OCIO) information security and role-based training resources that includes topics such as phishing, executive and managerial training, and IT administration.
Login to favorite or comment on the article
These training and resource materials were developed to help entities implement privacy and security protections. This webpage includes videos and slides from state attorneys general training and educational programs for healthcare providers.
Login to favorite or comment on the article
These rules apply to government employees, contractors, and other system users and must be read by all new users prior to accessing HHS data, systems, or networks. The policies may serve as a helpful template for private sector entities.
Login to favorite or comment on the article
Healthcare organizations can download this zip file which contains a package of materials that can help them plan and organize a cyber tabletop exercise.
Login to favorite or comment on the article
University of California San Francisco, Stanford Center of Excellence in Regulatory Science and Innovation (CERSI). (n.d.).
Cybersecurity Seminar Series.
(Accessed 8/16/2022.)
This monthly speaker series is comprised of one-hour lectures on an array of cybersecurity topics including medical device security, biomedical engineering and manufacturing safety, and regulatory information.
Login to favorite or comment on the article
Healthcare facility staff can use this document--presented as a discussion-based exercise--to identify their cybersecurity challenges, needs, and strengths.
Login to favorite or comment on the article
Guidance
This implementation guide provides specific steps that health care organizations can take immediately to manage cyber risks to their information technology systems. It provides recommendations, best practices, and resources to help the public and private health care sectors prevent cybersecurity incidents.
Login to favorite or comment on the article
This webpage is sponsored by the American Hospital Association and includes links to resources (e.g., webinars, tools, and fact sheets) stakeholders can use to protect their healthcare facilities.
Login to favorite or comment on the article
This document provides information to physicians on protecting their computers, mobile devices, home network, and medical devices from cyber threats while working from home.
Login to favorite or comment on the article
This issue of the newsletter focuses on cybersecurity events and cyber hygiene.
Login to favorite or comment on the article
This resource can help healthcare facilities, and the systems they may be a part of, understand the roles and responsibilities of stakeholders before, during, and after a cyber incident.
Login to favorite or comment on the article
This paper reviews the major cyber threats facing healthcare organizations, the role of cyber attackers, cyber defenders, developers, and end-users in cybersecurity. It includes recommendations for policy makers and healthcare organizations to mitigate these threats.
Login to favorite or comment on the article
This practice guide provides insight into vulnerabilities associated with Remote Patient Monitoring (RPM) systems within healthcare organizations. Collaborating with telehealth and technology partners, and healthcare leadership, NIST identified risks and solutions for improving telehealth cybersecurity practices.
Login to favorite or comment on the article
The PACS ecosystem was analyzed to identify risks and vulnerabilities, as well as standards available to safeguard systems, using commercially available tools, to improve resilience and patient privacy.
Login to favorite or comment on the article
This publication can help agencies establish computer security incident response capabilities and ensure that incidents are handled efficiently and effectively. Note: NIST resource details show this publication was last updated in 2021, though not reflected in the document
Login to favorite or comment on the article
Cybersecurity and Infrastructure Security Agency. (n.d.).
Resources for Business.
(Accessed 8/16/2022.) U.S. Department of Homeland Security.
This webpage (known by the acronym US-CERT) features links to cybersecurity resources for businesses (e.g., healthcare facilities) grouped into the following categories: Resources to Identify, Resources to Protect, Resources to Detect, and Resources to Recover. A specific link to the National Cyber Awareness System (https://www.cisa.gov/uscert/ncas) provides a single point of access for all current cybercrime information, including alerts, tips, bulletins, and analytic reports.
Login to favorite or comment on the article
This CISA webpage provides direct links to resources relevant for SLTT cyber planning needs. These include geographic specific resources by state, best practice (case studies), and an SLTT cyber toolkit to assist in understanding the threat environment, evaluating current programs, and understanding the five Cybersecurity Framework Function Areas.
Login to favorite or comment on the article
*
Cybersecurity and Infrastructure Security Agency. (n.d.).
Stop Ransomware.
(Accessed 8/16/22.)
This CISA resource page is the government’s “one-stop-shop” for ransomware information, guidance, and available services. The site specifically provides links to critical ransomware guides, checklists, alerts, and factsheets. It includes information on who to contact and how to report an incident, trainings, current campaigns, and other partner/stakeholder information.
Login to favorite or comment on the article
This tip sheet provides information on sharing of cyber-related events in accordance with CISA requirements. It contains guidance to clarify what type of information should be shared, with whom, under what circumstances, and what to expect once an incident is reported.
Login to favorite or comment on the article
*
Cybersecurity and Infrastructure Security Agency. (2023).
Shields Up.
Russia’s invasion of Ukraine has included cyberattacks on Ukrainian critical infrastructure, which could have implications for cybersecurity in other parts of the world, including the U.S. This resource from the Cybersecurity and Infrastructure Security Agency (CISA) helps organizations prevent and respond to cyberattacks. The website contains guidance for organizations, corporate leaders, individuals, and ransomware response.
Login to favorite or comment on the article
This FBI cybercrime homepage outlines how, when, and who to report a cyber incident to, links to additional resources such as annual reports, industry alerts, and ransomware information, as well as answers FAQs.
Login to favorite or comment on the article
*
Federal Communications Commission, Department of Homeland Security, National Cyber Security Alliance, Chamber of Commerce. (n.d.).
Cybersecurity Planning Guide.
(Accessed 8/16/2022)
This planning guide, created in partnership with other agencies and subject matter experts, was designed to assist small businesses, with limited cybersecurity resources, incorporate cyber preparedness and risk assessment activities into their organizations. It includes a list of action items, policy considerations, and best practices.
Login to favorite or comment on the article
The project team analyzed a year’s worth of healthcare intelligence data and provide an overview of the sector’s vulnerabilities (including the “Internet of Things” and challenges related to compliance). The author shares three case studies that demonstrate how healthcare networks were attacked and concludes with preparedness tips useful to both information technology professionals and emergency planners.
Login to favorite or comment on the article
The author presents results from a SANS 2014 State of Cybersecurity in Health Care Organizations survey. Overall, 41% of respondents ranked current data breach detection strategies as ineffective and more than half found the “negligent insider” to be the primary threat to security.
Login to favorite or comment on the article
The authors list steps that can be taken to protect sensitive information while transferring medical information over public and home networks. They emphasize the importance of these steps and strategies as the role of information technology in modern radiology practice increases.
Login to favorite or comment on the article
This report highlights the cost of data breaches on healthcare facilities and how these costs are computed. Steps for mitigating risks are included, along with links to related resources.
Login to favorite or comment on the article
This checklist assists healthcare enterprise managers in implementing a telework strategy that enables an uninterrupted workflow, supports patient care and facility operations, and protects against cyberthreats.
Login to favorite or comment on the article
This guide offers tactics for the healthcare system to address cyberthreats, focused on education and outreach, enhanced prevention techniques, enhanced detection and response, and taking care of the team.
Login to favorite or comment on the article
This webpage provides direct access to the main guidance documents, a four-volume publication, that provides an overview of current HSCC cybersecurity threats faced by the healthcare and public health (HPH) sector. In addition, it links to Technical Volume 1 that outlines cyber safety practices for small healthcare organizations; Technical Volume 2 that discusses cybersecurity practices for medium to large healthcare organizations, and other resources and template materials that can be used to develop policies and procedures via a cybersecurity toolkit.
Login to favorite or comment on the article
This guide was developed in consultation with the Healthcare and Public Health (HPH) Sector Coordinating Council and Government Coordinating Council, along with input from other sector members and the U.S. Department of Homeland Security Critical Infrastructure Cyber Community. The goal of the guide is to help HPH Sector organizations understand and use the HITRUST Risk Management Framework—consisting of the HITRUST CSF, CSF Assurance Program, and supporting methodologies—to implement the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity in the HPH Sector and meet its objectives for critical infrastructure protection.
Login to favorite or comment on the article
This guide can help smaller to mid-sized healthcare organizations manage supply chain cybersecurity risk.
Login to favorite or comment on the article
Healthcare and Public Health Sector Coordinating Council, Cybersecurity Working Group. (2022).
HSCC Publications.
This webpage lists working group recommended cybersecurity publications by date and includes links to resources on operational continuity, telehealth and telemedicine cybersecurity, health industry tactical response, and information sharing.
Login to favorite or comment on the article
These slides from the 2019 HIMSS global conference provide an overview of the 405d HHS cybersecurity program. The presentation highlights partnerships, outlines the top five cyber threats and ten best practices for resilience, and summarizes how to prioritize threats within the healthcare sector.
Login to favorite or comment on the article
This report outlines the primary cybersecurity threats facing the health care sector and can help organizations of all sizes access resources and best practices geared towards preparing for and responding to threats that can impact patient safety.
Login to favorite or comment on the article
The authors describe research conducted on a variety of hospital and healthcare-related infrastructures and systems; identify industry-specific challenges; and create a blueprint for improving healthcare facility security.
Login to favorite or comment on the article
This publication can help cyber professionals in the healthcare system establish and participate in cyber threat information sharing relationships. It contains information on developing information sharing goals, identifying threat sources, engaging with existing information sharing communities, and effectively using threat information, which can help health systems share threat information in a structured fashion.
Login to favorite or comment on the article
The toolkit can help rural healthcare facilities develop a cybersecurity program focused on awareness, assessment, implementation & remediation, and education.
Login to favorite or comment on the article
This document provides updated guidance on securing networks against changing and evolving vulnerabilities, specifically it outlines new security features and methods to be considered. It reviews the Zero Trust model, improper system configurations, authentication, and security maintenance- among others.
Login to favorite or comment on the article
The authors discuss recent healthcare-related data breaches and how they could have been prevented. They also highlight the differences between compliance and security (and how they overlap)—particularly in the research arena—and share tips for improving cybersecurity.
Login to favorite or comment on the article
This paper discusses the expansion of technology into healthcare operations, the challenges associated with such integration, and future recommendations for mitigation of growing cyber threats against health systems.
Login to favorite or comment on the article
This paper provides an overview of HHS’ proposed framework to help the
health care sector address cybersecurity threats and protect patients while focusing on four steps: 1) Establish voluntary cybersecurity performance goals for the healthcare sector; 2) Provide resources to incentivize and implement these cybersecurity practices; 3) Implement an HHS-wide strategy to support greater enforcement and accountability; and 4) Expand and mature the one-stop shop within HHS for healthcare sector cybersecurity.
Login to favorite or comment on the article
This webpage assists healthcare professionals find information about the HIPAA Security Rule and provides links to other standards and resources on safeguarding electronic protected health information.
Login to favorite or comment on the article
This website includes educational materials specifically designed to give HIPAA covered entities and business associate’s insight into how to respond to a cyber-related security incidents for professionals. This includes a cybersecurity checklist, infographic, ransomware guidance, NIST cyber framework information, and links to the Office of Civil Rights (OCR) cyber awareness newsletters.
Login to favorite or comment on the article
U.S. Department of Health and Human Services, Office of Information Security. (n.d.).
405(d) Resource Library.
(Accessed 3/11/2024.)
This webpage provides access to all the task group products, publications, and guidance material on health sector cyber-related materials, including cybersecurity practices for small, medium, and large healthcare organizations; phishing, malware, and ransomware factsheets; cyberthreat infographics; healthcare industry cybersecurity quick start guides; and security considerations and infographics for medical devices. Many 405(d) resources are also available in Spanish: https://405d.hhs.gov/spanish
Login to favorite or comment on the article
This document provides planning and response guidance based on lessons learned by federal prosecutors while handling cyber investigations and prosecutions. The authors drafted the document with smaller organizations (with fewer resources) in mind, but larger organizations should also find it useful.
Login to favorite or comment on the article
This website provides links to several quick reference guides developed by U.S. Secret Service experts to help organizations before, during, and after a cyber incident. These resources include an introductory guide to understanding cybercrimes, ransomware, reporting cyber incidents, and business email compromises.
Login to favorite or comment on the article
Incident Management
The authors provide guidance for cyber attack recovery planning and emphasize the importance of learning from past events and developing, testing, and improving recovery planning. This document includes an example scenario that demonstrates guidance and informative metrics that may be helpful for improving information systems resilience.
Login to favorite or comment on the article
This publication can help agencies establish computer security incident response capabilities and ensure that incidents are handled efficiently and effectively. Note: NIST resource details show this publication was last updated in 2021, though not reflected in the document
Login to favorite or comment on the article
This CISA resource contains two playbooks, one for incident response and the other for vulnerability response. Each one contains standards and protocol to help identify, coordinate, remediate, and recover from possible cyber incidents as well as identified vulnerabilities known to affect federal agencies, their systems, data, and networks.
Login to favorite or comment on the article
This cyber incident checklist can be used as a template for operational staff and executives in healthcare to respond to and recover from a large-scale extended cyberattack. Recommendations can be tailored to an organizations size and level of operational complexity and role-based modules can align with current Incident Command System plans.
Login to favorite or comment on the article
Legal/Regulatory Resources
This chart presents cybersecurity-related policies, legal authorities, and documents in a color-coded schema for quick reference to identify relevant strategies and resources that can help prepare for and respond to cyber threats. While created by and for the Department of Defense, the information can be applied to healthcare and other critical infrastructure.
Login to favorite or comment on the article
This executive order (14028), aims to improve federal efforts to identify, deter, detect, protect against, and respond to increasingly ‘sophisticated malicious cyber campaigns. Key points include removing barriers to information sharing between government and private sector; modernizing and strengthening cybersecurity standards within the Federal government; improving software supply chain security; standardizing cybersecurity response playbooks; and improving investigation and remediation capabilities.
Login to favorite or comment on the article
Cybersecurity professionals can locate information about HIPAA rules, guidance on compliance, the Office for Civil Rights’ enforcement activities, frequently asked questions, and more on this webpage.
Login to favorite or comment on the article
This legislative package, a combination of three bills (the Federal Information Security Modernization Act, the Cyber Incident Reporting Act; and the Federal Secure Cloud Improvement and Jobs Act) focuses on improving cyber incident reporting obligations, modernizing cyber capabilities, and securing cloud adoption. Importantly, new reporting requirements would mandate reporting of any substantial cyber incidents by all federal civilian agencies to CISA within 72 hours.
Login to favorite or comment on the article
Lessons Learned
This recording captures a discussion with the University of Vermont Medical Center president, Chief Operating Officer and Chief Medical Information Officer on lessons learned during a major ransomware attack on their facility in the Fall of 2020.
Login to favorite or comment on the article
Cybersecurity is a critical issue facing the ASPR TRACIE audience. In this webinar, a distinguished panel of experts describe lessons learned from recent experiences, planning considerations, and steps the federal government is taking to address cybersecurity and cyber hygiene.
Login to favorite or comment on the article
Speakers from healthcare facilities share their experiences and tangible lessons learned from responding to cybersecurity incidents.
Login to favorite or comment on the article
This ASPR TRACIE TA response includes information on high-profile healthcare cyberattacks over the past five years in the U.S., to include resources and details on the associated impacts and lessons learned for clinical care delivery.
Login to favorite or comment on the article
This e-book is based on a roundtable discussion with nine hospital and healthcare IT leaders to better understand data management strategies, cyber recovery and resilience, gaps in backup and recovery methods, as well as factors impacting healthcare system cyber vulnerabilities.
Login to favorite or comment on the article
This report focuses on how cyberattacks on health systems impact people and society. It consolidates information on a variety of threats from ransomware to cyber espionage, discusses how COVID-19 has added to the complexities of cybersecurity, and includes recommendations for mitigation of threats based on current initiatives.
Login to favorite or comment on the article
Cyber Storm is the U.S. Department of Homeland Security’s biennial cybersecurity exercise. This webpage includes highlights and lessons learned from exercises and links for more information.
Login to favorite or comment on the article
This paper summarizes the large-scale effects of the WannaCry cyberattack on the U.K National Health Service and the overarching lessons learned that have become relevant to health systems across the globe. It highlights economic, operational, and strategic outcomes including disruptions to clinical care, financial losses, and workforce impacts.
Login to favorite or comment on the article
The authors examine the methods some healthcare providers use to circumvent cybersecurity. These “creative, flexible, and motivated” employees did not have criminal intention—they were presumably focused on providing patient care in a fast-paced environment.
Login to favorite or comment on the article
This systematic review examined 930 full text studies, from 2015 to 2020, to identify the most common cloud security issues impacting healthcare systems. The researchers included a breakdown of these issues as well as potential solutions that were most frequently cited.
Login to favorite or comment on the article
This paper provides a high-level overview of the impacts of the COVID-19 pandemic on cybersecurity in the healthcare industry and highlights the vulnerabilities that were a result of modified behaviors during a chaotic pandemic. It highlights key challenges and includes best practices and lessons learned to improve healthcare security in the future.
Login to favorite or comment on the article
This HHS slide deck reviews the 2021 cyberattack against the Health Service Executive (HSE), Ireland’s publicly funded healthcare system. Information included in the summary details the impacts caused by the Conti ransomware attack, subsequent disruptions to health system operations, and key findings and challenges associated with response and recovery.
Login to favorite or comment on the article
In this report, Verizon examined more than 100,000 security incidents affecting various industries, including healthcare. They found that of the 166 healthcare breaches, 115 had confirmed data loss, 32% were caused by stolen assets, and 23% were a result of privilege misuse. The report also found reuse of credentials to be a healthcare-specific risk. Victim demographics, vulnerabilities, phishing, and incident classification patterns are discussed, as well as an entire appendix devoted to “attack graphs.”
Login to favorite or comment on the article
Medical Devices
The authors outline a framework for securing wireless health devices to minimize the occurrence of “medjacking,” or the hacking medical devices.
Login to favorite or comment on the article
This playbook provides information on preventing and mitigating cybersecurity incidents for medical devices. It includes a framework for health care organizations, as well as tools, techniques, and resources, and has been revised to be in alignment with Hospital Incident Command.
Login to favorite or comment on the article
This playbook presents a framework that can be used by healthcare organizations and stakeholders to plan for and respond to cybersecurity attacks on medical devices. It includes supplemental information specific to regional cyber preparedness and recommendations for conducting a hazard vulnerability analysis, asset inventory, and incident reporting.
Login to favorite or comment on the article
This reference page provides a list of quicklinks to major medical device manufacturer’s product security websites. Manufacturers are listed by name with corresponding URLs to product security information.
Login to favorite or comment on the article
This toolkit provides guidance for disclosing vulnerabilities in medical devices with a focus on communicating to patients. It includes a template and best practices such as categorizing the vulnerability, terminology to be used, and workflows/processes to be considered.
Login to favorite or comment on the article
The author provides an overview of the “CIA Triad” for information security, where C stands for confidentiality, I stands for integrity, and A stands for availability. The author explains how a cybersecurity standard designed specifically for connected diabetes devices will improve device safety and increase security.
Login to favorite or comment on the article
This paper outlines vulnerabilities associated with increased medical device use in wireless communication and remote monitoring. It details several cyber incidents and highlights considerations in preparing for future incidents, and the importance of engaging stakeholders public and private sector.
Login to favorite or comment on the article
The authors evaluated recalls and adverse events related to security and privacy risks of medical devices and found “sharp inconsistencies” in the way individual providers secured devices. The authors challenged manufacturers and regulators to consider the security and privacy elements of their devices and systems and to build the ability to collect cybersecurity threat indicators into their medical devices.
Login to favorite or comment on the article
These three individual resources (https://405d.hhs.gov/Documents/Five-Threat-Series-Medical-Devices-R.pdf; https://405d.hhs.gov/Documents/405d-Five-Threats-Attacks-Connected-Devices-Poster.pdf; and https://405d.hhs.gov/Documents/5-Threats-Series-Threat-5-Attacks-Against-Connected-Medical-Devices-Powerpoint-Updated-R.pdf) provide access to an informational medical device poster to be used as a visual aid for staff, a fact sheet listing impacts and considerations in case of a connected medical device attack, and slides covering the 5 main medical device threats and data loss, among others.
Login to favorite or comment on the article
Myths and facts about medical device cybersecurity are shared in this table geared towards manufacturers and providers.
Login to favorite or comment on the article
This guidance provides recommendations to consider and information to include in FDA medical device premarket submissions for effective cybersecurity management. Effective cybersecurity management is intended to reduce the risk to patients by decreasing the likelihood that device functionality is intentionally or unintentionally compromised by inadequate cybersecurity.
Login to favorite or comment on the article
This guidance can help manufacturers and healthcare providers manage cybersecurity in medical devices, particularly those that are networked.
Login to favorite or comment on the article
This webpage highlights the U.S. Food and Drug Administration's efforts to secure medical devices. It includes links to helpful resources, including webinars and guidance documents.
Login to favorite or comment on the article
This video describes steps clinicians can take to ensure their patients’ medical devices and privacy are protected. It includes questions health care providers should ask manufacturers of medical devices, and when to contact the manufacturer.
Login to favorite or comment on the article
This website provides updates on cybersecurity requirements for medical devices. It includes a timeline of how the Consolidated Appropriations Act updated these requirements, information on mitigating cybersecurity risks, and links to cybersecurity reports and whitepapers for medical devices.
Login to favorite or comment on the article
This document was developed to assist healthcare professionals, industry partners, and federal partners communicate information about cybersecurity vulnerabilities. It contains best practices and tips for creating clear, concise, and easy to consume messaging to patients and the public.
Login to favorite or comment on the article
The authors review the factors that can contribute to cybersecurity vulnerabilities in medical devices and provide guidance regarding protection mechanisms, mitigations, and processes.
Login to favorite or comment on the article
Plans, Tools, and Templates
The goal of the National Health Security Strategy (NHSS) is to strengthen and sustain communities’ abilities to prevent, protect against, mitigate the effects of, respond to, and recover from disasters and emergencies. This webpage includes links to the full text of the strategy, an overview, the NHSS Implementation Plan, the NHSS Evaluation of Progress, and an NHSS Archive.
Login to favorite or comment on the article
Administration for Strategic Preparedness and Response. (2023).
RISC Toolkit 2.0.
U.S. Department of Health and Human Services.
The Risk Identification and Site Criticality (RISC) Toolkit is an objective, data-driven all-hazards risk assessment that can be used by public and private organizations within the Healthcare and Public Health Sector to inform emergency preparedness planning, risk management activities, and resource investments. The RISC Toolkit provides owners/operators in the HPH Sector with nationally recognized standards-based evaluation criteria in an easy-to-follow, guided format. It can be utilized by a wide variety of HPH stakeholders including but not limited to hospitals, long-term care facilities, community health centers, health care coalitions, and public health agencies.
Login to favorite or comment on the article
This resource can help healthcare facilities, and the systems they may be a part of, understand the roles and responsibilities of stakeholders before, during, and after a cyber incident.
Login to favorite or comment on the article
This playbook presents a framework that can be used by healthcare organizations and stakeholders to plan for and respond to cybersecurity attacks on medical devices. It includes supplemental information specific to regional cyber preparedness and recommendations for conducting a hazard vulnerability analysis, asset inventory, and incident reporting.
Login to favorite or comment on the article
This website explains the (free) cyber resilience review process and lists benefits and variables measured. It also explains the cyber security evaluation tool and its benefits. Important links for getting started and requesting reviews are also included.
Login to favorite or comment on the article
This CISA webpage provides direct links to resources relevant for SLTT cyber planning needs. These include geographic specific resources by state, best practice (case studies), and an SLTT cyber toolkit to assist in understanding the threat environment, evaluating current programs, and understanding the five Cybersecurity Framework Function Areas.
Login to favorite or comment on the article
This plan applies to significant cyber incidents that have the potential to cause significant harm to national security interests, foreign relations, economy, or public health and safety. Sections include Roles and Responsibilities; Core Capabilities; and Coordinating Structures and Integration. Additional guidance is provided in the appendices.
Login to favorite or comment on the article
This CISA resource contains two playbooks, one for incident response and the other for vulnerability response. Each one contains standards and protocol to help identify, coordinate, remediate, and recover from possible cyber incidents as well as identified vulnerabilities known to affect federal agencies, their systems, data, and networks.
Login to favorite or comment on the article
Federal Communications Commission. (n.d.).
Cyberplanner.
(Accessed 8/17/2022.)
This FCC tool, designed to assist small businesses with limited cybersecurity resources, is an online resource to help smaller businesses develop customized cybersecurity plans. It includes step-by-step guidance and links to additional cybersecurity resources and tip sheets.
Login to favorite or comment on the article
*
Federal Communications Commission, Department of Homeland Security, National Cyber Security Alliance, Chamber of Commerce. (n.d.).
Cybersecurity Planning Guide.
(Accessed 8/16/2022)
This planning guide, created in partnership with other agencies and subject matter experts, was designed to assist small businesses, with limited cybersecurity resources, incorporate cyber preparedness and risk assessment activities into their organizations. It includes a list of action items, policy considerations, and best practices.
Login to favorite or comment on the article
Healthcare executives can incorporate the considerations in this document to support informed and swift decision-making during and after a cybersecurity incident. Strategies are listed under incident response, business continuity, and communication headings; links to related resources are provided.
Login to favorite or comment on the article
This plan was created for organizations throughout the healthcare ecosystem to help them implement foundational cybersecurity programs that address the operational, technological, and governance challenges posed by significant healthcare industry trends over the next five years.
Login to favorite or comment on the article
This checklist assists healthcare enterprise managers in implementing a telework strategy that enables an uninterrupted workflow, supports patient care and facility operations, and protects against cyberthreats.
Login to favorite or comment on the article
This template aims to prepare health care organizations for the operational impacts of a cybersecurity incident by bringing together separate components of emergency plans. It contains information on command center synchronization, incident identification, communication strategy, containment strategy, and the interim solution request process.
Login to favorite or comment on the article
This Health Sector Coordinating Council document provides resources and materials that healthcare organizations can use during the development of cybersecurity policies and procedures. It consists of a glossary of terms, roadmaps, toolkits, and templates for securing devices, cyber incident reporting, and access control protocol.
Login to favorite or comment on the article
This cyber incident checklist can be used as a template for operational staff and executives in healthcare to respond to and recover from a large-scale extended cyberattack. Recommendations can be tailored to an organizations size and level of operational complexity and role-based modules can align with current Incident Command System plans.
Login to favorite or comment on the article
This guide was developed in consultation with the Healthcare and Public Health (HPH) Sector Coordinating Council and Government Coordinating Council, along with input from other sector members and the U.S. Department of Homeland Security Critical Infrastructure Cyber Community. The goal of the guide is to help HPH Sector organizations understand and use the HITRUST Risk Management Framework—consisting of the HITRUST CSF, CSF Assurance Program, and supporting methodologies—to implement the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity in the HPH Sector and meet its objectives for critical infrastructure protection.
Login to favorite or comment on the article
The C2M2 tool, developed in 2012, was created to assist organizations with evaluating and improving their cybersecurity capabilities. The 2021 C2M2 Version 2.0 update addresses emerging technologies and the evolving cyber threat landscape.
Login to favorite or comment on the article
This document maps paths between two seminal healthcare cybersecurity documents. It can help healthcare planners use the Cybersecurity Framework as a “common language” and identify gaps to boost compliance with the Security Rule.
Login to favorite or comment on the article
*
U.S. Department of Health and Human Services, Office for Civil Rights and Office of the National Coordinator for Health Information Technology. (2022).
Security Risk Assessment (SRA) Tool.
The Security Risk Assessment tool was designed to help guide healthcare providers in small to medium-sized offices conduct risk assessments of their organizations’ HIPAA compliance. This webpage contains a user guide and tutorial video. Users can download the 156 question app to their computers or iPads.
Login to favorite or comment on the article
Ransomware Resources
This blog post, written in the aftermath of the “WannaCry” ransomware attack, provides key best practices and lessons learned for preventing and responding to a ransomware attack.
Login to favorite or comment on the article
This factsheet provides an overview of the impacts of ransomware, a summary of recent attacks, and includes a preparedness checklist with links to guidance on cyber hygiene and vulnerability testing. It also outlines best practices for protecting sensitive and personal information and responding to ransomware-caused data breaches.
Login to favorite or comment on the article
*
Cybersecurity and Infrastructure Security Agency. (n.d.).
Stop Ransomware.
(Accessed 8/16/22.)
This CISA resource page is the government’s “one-stop-shop” for ransomware information, guidance, and available services. The site specifically provides links to critical ransomware guides, checklists, alerts, and factsheets. It includes information on who to contact and how to report an incident, trainings, current campaigns, and other partner/stakeholder information.
Login to favorite or comment on the article
This factsheet provides an overview of ransomware and shares how the variants Locky and Samas were recently used to compromise healthcare networks.
Login to favorite or comment on the article
This Alert (AA22-040A) summarizes recent ransomware threats and activity identified domestically and abroad. It includes technical details, mitigation techniques, response guidance, and additional resources.
Login to favorite or comment on the article
The coauthored joint cybersecurity advisory describes the tactics, techniques, and procedures (TTPs) used by cybercriminals against targets in the Healthcare and Public Health (HPH) Sector to infect systems with ransomware. Recent updates include information on Conti, TrickBot, and BazarLoader, as well as new IOCs and Yara Rules for detection.
Login to favorite or comment on the article
This FBI cybercrime homepage answers FAQs, outlines how, when, and who you should report a cyber incident to, and links to additional resources such as annual reports, industry alerts, and ransomware information.
Login to favorite or comment on the article
This infographic presents ransomware-related cybersecurity information in an easy to reference and format that can be used in trainings and exercises to increase awareness on preparing for, reacting to, and recovering from a cyber incident.
Login to favorite or comment on the article
This framework, developed by over 60 experts across industry, academia, and government, is part of a public-private anti-ransomware campaign to increase awareness and resilience. The framework includes a breakdown of priority ransomware issues, current mitigation efforts, key recommendations, and an overview of the framework’s call to action.
Login to favorite or comment on the article
This webpage is a comprehensive list of NIST data integrity and data breach security guidance documents. It provides information on potential targets of data corruption, including ransomware, malware, and insider threats. It includes information on resources and tools that support vulnerability detection, response efforts, and practical safety measures to minimize damage from loss of data.
Login to favorite or comment on the article
This webpage includes quick reference guides, best practices, videos, and factsheets on preventive measures to help organizations prepare for ransomware attacks and links to additional cyber awareness tips.
Login to favorite or comment on the article
This webpage provides links and access to collective NIST ransomware resources including, risk management guidance, a Quick Start Guide, videos, tip sheets, and infographics, as well as information on the Ransomware Risk Management cybersecurity framework.
Login to favorite or comment on the article
This quick start guide is meant to help organizations prepare to counter ransomware attacks that are based on the NIST Cybersecurity Framework’s five key functions that include Identifying, Protecting, Detecting, Responding, and Recovering. It is applicable to smaller organizations and those with limited resources.
Login to favorite or comment on the article
The authors provide recommendations that can help an organization prevent, prepare for, respond to, and recover from malware incidents, especially widespread ones. Several types of malware are addressed (e.g., worms, viruses, and Trojan horses) and Appendix B provides malware incident handling scenarios that can help identify strengths and gaps in a facility’s cybersecurity plans.
Login to favorite or comment on the article
This newsletter highlights the impacts of ransomware on the healthcare sector since 2021. It outlines key issues, statistics, and solutions that include links to additional sources of information on cybersecurity resilience efforts.
Login to favorite or comment on the article
This presentation highlights key aspects of ransomware threats, early examples of attacks, operational impacts on healthcare, emerging trends, and strategies for protecting from and detecting vulnerabilities.
Login to favorite or comment on the article
This threat briefing reviews key aspects of the Conti ransomware attacks on the health sector, recent high-profile attacks, and description of impacts to hospital operations via real-world examples.
Login to favorite or comment on the article
This short factsheet provides a general overview of ransomware threats and characteristics, a short list of prevention measures, and a checklist for response efforts.
Login to favorite or comment on the article
Risk and Threat
This webpage contains information on AHA cyber services aimed at helping members increase resiliency against growing threats.
Login to favorite or comment on the article
This AHA webpage contains a chronological list of all FBI Traffic Light Protocol reports and notifications on cyber threats and vulnerabilities.
Login to favorite or comment on the article
Anti-Phishing Work Group. (2021).
APWG.
The Anti-Phishing Working Group (AFWG) is a coalition whose goal is to unify “the global response to cybercrime across industry, government, and law enforcement sectors and NGO communities.” Their website includes links to helpful resources, reporting mechanisms, programming options, and the like.
Login to favorite or comment on the article
This webpage includes information on recently published vulnerabilities, including technical details, remediation information, and lists of affected vendors. It also has search capabilities, links to archived vulnerability information, and guidance for reporting an incident.
Login to favorite or comment on the article
Cybersecurity and Infrastructure Security Agency. (n.d.).
Bad Practices.
(Accessed 8/17/2022.)
This webpage is a collection of CISA identified risky behaviors that could impact critical infrastructure and national security. The catalog is periodically updated and also links directly to a CISA GitHub page where discussions on vulnerabilities and risks can be found.
Login to favorite or comment on the article
This CISA webpage provides information on how to access their free cyber hygiene services that include scanning, testing, and assessments.
Login to favorite or comment on the article
This webpage houses information on the KEV catalog, a federal “living list” of frequently abused vulnerabilities that are of significant risk to the national enterprise. This includes links to the list itself, criteria for adding vulnerabilities, and information on mitigation, workarounds, and prioritizing threats.
Login to favorite or comment on the article
This CISA information page is a single point of access for all current Federal cybercrime information including alerts, tips, bulletins, and analysis reports. It also contains up to date information on security topics, threats, and vulnerabilities that can be found by date in the “Alerts” and “Bulletins” sections.
Login to favorite or comment on the article
*
Cybersecurity and Infrastructure Security Agency. (2023).
Shields Up.
Russia’s invasion of Ukraine has included cyberattacks on Ukrainian critical infrastructure, which could have implications for cybersecurity in other parts of the world, including the U.S. This resource from the Cybersecurity and Infrastructure Security Agency (CISA) helps organizations prevent and respond to cyberattacks. The website contains guidance for organizations, corporate leaders, individuals, and ransomware response.
Login to favorite or comment on the article
The coauthored joint cybersecurity advisory describes the tactics, techniques, and procedures (TTPs) used by cybercriminals against targets in the Healthcare and Public Health (HPH) Sector to infect systems with ransomware. Recent updates include information on Conti, TrickBot, and BazarLoader, as well as new IOCs and Yara Rules for detection.
Login to favorite or comment on the article
This analysis is based on publicly available responses from twelve healthcare organization and four federal agencies that were answering a letter from Senator Warren regarding short-term and long-term strategies for increasing cyber resiliency and decreasing vulnerabilities across the healthcare sector. The paper outline’s key themes and takeaways such as the need for streamlined collaboration, considerations for emerging cyber legislation, and the need for a standardized national cyber strategy.
Login to favorite or comment on the article
This report provides insight on the major safety issues affecting the use of medical devices and systems in the healthcare industry. Some of these include disruptions to healthcare delivery impacting patient safety, supply chain concerns, telehealth workflows, and Wi-Fi ”dead zones” endangering patient care.
Login to favorite or comment on the article
This FBI cybercrime page contains a chronological list of all cyber alerts, reports, and advisories that have been released by the agency and its task force partners. These include Joint Cybersecurity Advisories, private industry notifications, and FBI cyber division Flash Reports, all of which contain information on current vulnerabilities and attack risks.
Login to favorite or comment on the article
This alert summarizes known vulnerabilities identified in PACS systems and servers since 2019 and includes guidance on mitigation and resources to reference more for more in-depth information.
Login to favorite or comment on the article
This webpage provides direct access to the main guidance documents, a four-volume publication, that provides an overview of current HSCC cybersecurity threats faced by the healthcare and public health (HPH) sector. In addition, it links to Technical Volume 1 that outlines cyber safety practices for small healthcare organizations; Technical Volume 2 that discusses cybersecurity practices for medium to large healthcare organizations, and other resources and template materials that can be used to develop policies and procedures via a cybersecurity toolkit.
Login to favorite or comment on the article
The 2020 cybersecurity survey provides insight into the landscape of U.S. healthcare organizations based on feedback from 168 U.S.-based industry professionals. It discusses the most common and significant security incidents, major threat actors and target areas, as well as where healthcare sector resilience gaps exist and can be improved.
Login to favorite or comment on the article
InfraGard is a partnership between the private sector and the Federal Bureau of Investigation, and members from businesses, academia, state and local law enforcement who represent 16 critical infrastructures (including emergency services and healthcare and public health) to facilitate information sharing on emerging technology and threats. Interested parties can apply to join online, and the open-access part of the webpage includes links to state and local chapters and a calendar of events.
Login to favorite or comment on the article
This project, conducted in tandem with Carnegie Mellon University, aimed to assess the cybersecurity readiness level of the healthcare sector across healthcare IT, supply chain security, and emerging technology domains. The final report, presented to HHS, VA, and private sector experts during a government summit, included a summary of disruptions and potential threats to health information systems, security threats to connected devices, and a comparison of cybersecurity frameworks.
Login to favorite or comment on the article
This volunteer-run webpage was created in 2001 and features free warning and analysis to Internet users while working closely with Internet service providers to combat cyberattacks. The webpage features daily “Stormcasts” and links to articles, patches, podcasts, tools, and other helpful information.
Login to favorite or comment on the article
This resource is an opensource repository (or ‘knowledge base’) of known adversarial threat tactics and techniques collected by experts. It contains a matrix of tactics, techniques, sub-techniques, and defense evasions, among others, that break down methods used by cyber criminals to infiltrate systems.
Login to favorite or comment on the article
This repository page is an easy way to navigate a variety of cyber-related healthcare resources collected from federal, private, and MITRE-produced data. Users can navigate by resource type (i.e., analyst note, official report, tool, website), user role, date, title, or organization type.
Login to favorite or comment on the article
This database is a federal repository of ‘standards-based vulnerability management data’ using the Security Content Automation Protocol (SCAP). It includes security checklists, security-related software flaws, misconfigurations, product names, and impact metrics.
Login to favorite or comment on the article
This article highlights recent cyberattacks on major infrastructure such as the health sector and outlines the operational and financial impacts experienced. It underscores the major challenges facing the healthcare industry, including updated statistics and data, as well as recommendations for preventing future attacks.
Login to favorite or comment on the article
U.S. Department of Health and Human Services, Health Sector Cybersecurity Coordination Center (HC3). (2022).
HC3 Products.
This health sector page provides access to HC3 and partner threat briefs, sector alerts, joint threat bulletins, and other cyber-related resources to help organizations maintain situational awareness of current cyber vulnerabilities and threats.
Login to favorite or comment on the article
The Office for Civil Rights issues periodic newsletters share knowledge about the various security threats and vulnerabilities that currently exist in the healthcare sector, helping stakeholders understand what security measures can be taken to decrease the possibility of being exposed by these threats, and how to reduce breaches of electronic protected health information.
Login to favorite or comment on the article
This slide deck provides an overview of one of the largest medical cyberattacks in history. It includes a summary of the initial attacks, new variant and vulnerabilities, as well as describes impacts and best practice prevention methods for healthcare facilities.
Login to favorite or comment on the article
This slide deck provides an overview of HHS cloud computing guidance for the healthcare sector and is targeted for a technical and non-technical audience. It reviews cloud services, cloud models, and their associated risks, and vulnerabilities as well as preparedness and response activities.
Login to favorite or comment on the article
This slide deck contains an overview of Log4j vulnerabilities that may impact the health sector. It includes a summary of known compromises, timeline of major vulnerability events, and best practices relevant to healthcare.
Login to favorite or comment on the article
Agencies and Organizations
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
U.S Department of Health and Human Services. Office of the Chief Information Officer.
OCIO Cybersecurity.
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article
Login to favorite or comment on the article