News & Events

Healthcare cybersecurity threats: October 2023

More than 87 million. That’s the estimated number of patient records that have been compromised as of the end of October 2023, according to data gathered from the Office for Civil Rights (OCR). That’s a 55 percent year-over-year increase from 2022. Throughout the month of October, threat actors increasingly exploited...

CHIME Fall Forum | November 9th – 12th | Phoenix, AZ

Learn More Join us at the CHIME 23 Fall Forum: November 9th - 12th Come join the Fortified Health Security team at the conference. Not only will our team be in attendance to learn, we will be speaking, and engaging attendees throughout the conference. Stop and say hello.  About Fortified's...

CHIME Career Development Miniseries | Workforce and Cybersecurity Education Strategy | October 27th | 1 pm CT | Live webinar

Join Fortified’s Kate Pierce, Sr. vCISO & Executive Director of the Subsidy Program at Fortified Health Security, for CHIME's on-demand webinar, "Workforce and Cybersecurity Education Strategy". Learning objectives: Identify the current landscape for healthcare cybersecurity professionals Discuss the National Cyber Workforce and Education Strategy Career Development opportunities Define the steps...

How to successfully navigate HIPAA cybersecurity requirements

In a world where technology evolves faster than we can say "cybersecurity," one might wonder if the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is still relevant. Surprisingly, it's not just relevant; it's an unsung guardian of our healthcare data.  Compliance with HIPAA is essential for healthcare organizations...

How to make cybersecurity training part of your healthcare culture

Ever clicked on a website link that you shouldn’t have? We’ve all made that mistake at least once, and chances are nothing bad happened. But the stakes are considerably higher in a hospital environment. Patient care takes place 24/7/365, and any cyberattack can cripple the ability to treat patients.  More...

Healthcare cybersecurity threats: September 2023

Last month, three new cyber vulnerabilities emerged, posing a significant threat to healthcare organizations. Two were vulnerabilities from unpatched network technologies that, if exploited, could compromise both medical devices and patient care. The third was a new ransomware variant called "3AM" which poses a severe risk to healthcare organizations.   Continue...

Fortified Roundtable | December 14th | 2 PM CT

Part of raising security awareness and improving your cybersecurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

Fortified Roundtable | November 2nd | 2 PM CT

Part of raising security awareness and improving your cybersecurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

Fortified Roundtable | October 19th | 2 PM CT

Part of raising security awareness and improving your cybersecurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

Healthcare cybersecurity threats: August 2023

Vulnerabilities from two very different IT manufacturers and device types were notable threats in August. They serve as a reminder that continuous patch management and replacement of End of Life (EOL) technology is fundamental to cybersecurity.   The severity of these vulnerabilities should not be underestimated, as both allow significant access...

Fortified Roundtable | September 14th | 2 PM CT

Part of raising security awareness and improving your cybersecurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

Fortified Roundtable | August 17th | 2 PM CT

Part of raising security awareness and improving your cybersecurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

Living Off the Land attacks: Unveiling the illusion 

What does Living Off the Land (LOTL) mean in cybersecurity?When a threat actor performs a “Living Off the Land” (LOTL) attack, they use legitimate tools and processes within a system to carry out nefarious activities. Unlike traditional malware, LOTL tactics don't rely on external malicious code; instead, they exploit what's...

The evolution and impact of NIST CSF 2.0

NIST, or the U.S. National Institute of Standards and Technology, is at the forefront of the evolving realm of cybersecurity. Their goal is to provide recommendations that can be used as guideposts for industry best practices and more efficient ways of workingHowever, cybersecurity is notoriously difficult to build standards around...

Healthcare cybersecurity threats: July 2023

In July, cybercriminals increasingly targeted Linux systems and exploited new zero-day vulnerabilities in Citrix solutions. While threat actors never cease looking for new vulnerabilities to exploit, it's worth noting that this surge in cyber activity aligns with the industry trend of retiring software products in the Fall. Both Windows and...

2023 Horizon Report

Download the 2023 Horizon Report Now In our 2023 report on healthcare cybersecurity The 2023 Horizon Report is now available! Read all about the 2022 year in review, with data from the OCR on the total number of records breached, how the breaches happened, and more. Deep dive into topics...

Healthcare cybersecurity threats: June 2023

During the summer months, threat actors often escalate their activities, taking advantage of staffing shortages among IT teams, and leaving many organizations more susceptible to an attack. This trend was particularly evident last month. As June unfolded, healthcare cybersecurity teams found themselves navigating critical network flaws and multiple patching vulnerabilities,...

Fortified Roundtable | July 20th | 2 PM CT

Part of raising security awareness and improving your cybersecurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

How health systems can reduce their attack surface with VTM

 What is attack surface management?Think of your attack surface as a fortress with multiple entry points. Each entry point represents a system or network weakness that could potentially be breached by an intruder.These weaknesses, like outdated patches, misconfigurations, and traditional vulnerabilities, serve as open doors or unguarded walls that can...

Fortified Roundtable | June 15th | 2 PM CT

Part of raising security awareness and improving your cybersecurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

Healthcare IT Institute | June 12th | Pasadena, CA

Healthcare organizations are facing increased cyberattacks, cyber insurance changes, and regulatory obligations that have stressed and strained their IT teams. Despite the desire to implement more robust cybersecurity, budgets are in decline or restricted. However, many healthcare organizations are unaware of, or unable to access, several cybersecurity funding opportunities, including...

Healthcare IT Institute | June 11th | Pasadena, CA

The healthcare cybersecurity landscape has changed dramatically over the past two years. Executive and IT teams now face new hurdles entering 2023. Regulatory and cyber insurance requirements are advancing the need for a higher level of cybersecurity planning, execution, and reporting. In response, many organizations are undergoing a “healthcare cybersecurity...

Webinar | Defense in Depth part 2, Threat surface management with VTM

Session two of our three-part Defense in Depth series offers a comprehensive view of attack surface management in healthcare. Learn what Vulnerability Threat Monitoring (VTM) entails, and why it’s so critical to maintaining a successful cybersecurity program. In this educational series, Fortified’s Senior Director of Threat Assessment Operations, Tim “TJ”...

Single sign-on vs multi-factor authentication: Do you know the difference?

A disheartening reality is that cyberattacks targeting healthcare and other critical industries are on the rise, making it more important than ever for organizations to implement thorough security measures. This is where single sign-on (SSO) and multi-factor authentication (MFA) come in. By combining these tools, healthcare organizations can protect themselves...

MUSE Inspire | June 8th | Denver, CO

Healthcare providers accounted for 70% of all cybersecurity incidents in 2022, representing the majority of breaches reported, according to the HHS Office for Civil Rights (OCR) data breach portal. The reality for healthcare cybersecurity teams is not if an attack will happen, but rather when it will happen.   Join Fortified’s...

Fortified Roundtable | May 11th | 2 PM CT

Part of raising security awareness and improving your cybersecurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

HCP ’23 | May 9th | Houston, TX

Join Fortified’s Russell Teague, VP Advisory Services, and Tim Ramsey, Director of Threat Operations, for Health Connect Partners 2023 Spring Hospital Technology Conference educational session, “IR Program Maturity: How to Prepare for the Worst Day Ever” on Tuesday, May 9th from 11am – 12pm CT. This session will help you...

HCP ’23 | May 8th | Houston, TX

Join us at Health Connect Partners’ 2023 Spring Hospital Technology Conference on Monday, May 8th from 12pm – 4pm CT. Stop by booth #1309 to see firsthand how Fortified Central Command is simplifying cybersecurity and enter for a chance to win prizes! MORE INFO

CHIME | May 17th | Live webinar

Join Fortified’s T.J. Ramsey, Director, Threat Operations, for CHIME's live webinar, "Current Threats and Best Practices You Should Follow to Keep Your Data Safe" on Wednesday, May 17th from 2pm – 3pm EST. Learn how Fortified is working alongside healthcare organizations to address the latest threats, prioritize and implement solutions,...

Take control of your healthcare security with threat hunting

What is threat hunting? Similar to how early detection and prevention are crucial to maintaining patient health, threat hunting plays a critical role in identifying potential cyber threats and breaches before they occur. Within a Security Operations Center (SOC), threat hunters systematically search through an organization's network, system, and data...

Fortified Health Security Unveils Fortified Central Command

Unified service delivery platform provides better operational efficiencies and comparative analytics, transforming the MSSP relationship. FRANKLIN, Tenn. – April 25, 2023 – Fortified Health Security (Fortified), a Best in KLAS managed security services provider (MSSP) to the healthcare industry, today announced the launch of Fortified Central Command, which simplifies the...

Fortified Roundtable | April 13th | 2 PM CT

Part of raising security awareness and improving your cybersescurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

HIMSS | April 17th – 21st | Chicago

Join us at kiosk 4309-10, April 17th - 21st! Learn how Fortified is working alongside healthcare organizations to address the latest threats, prioritize and implement solutions, and simplify the management of healthcare cybersecurity. Join Fortified’s Russell Teague, VP Advisory Services, and Ryan Quigg, Regional VP West, at the 2023 HIMSS...

Can a decryption key help you avoid a ransom?

Network security admins all have the same fear - Friday afternoon at about 4:30pm, tech support gets a call that a computer is acting strange with files and folders not working properly. Their response to the call reveals a ransom note! But before you consider paying a ransom for a...

Fortified Health Security’s Senior VISO Testifies Before the U.S. Senate’s Homeland Security & Governmental Affairs Committee

Kate Pierce, Fortified Health Security’s Senior Virtual Information Security Officer & Executive Director of Subsidy testified before the U.S. Senate’s Homeland Security & Governmental Affairs Committee on Thursday, March 16. The hearing focused on the topic “In Need of a Checkup: Examining the Cybersecurity Risks to the Healthcare Sector.” Having...

5 Healthcare cybersecurity tips for apps and mobile devices

Every healthcare organization, regardless of the devices used, faces the risk of cybersecurity attacks. However, the use of mobile devices and apps can bring the risk of a cyber-attack to another level. Apps and mobile devices are highly effective, affordable, and convenient ways for medical facilities to manage a diverse...

THIMA | March 27th, 3:15pm CT | Franklin, TN

Cybersecurity threats are constantly evolving and can feel overwhelming to keep up with and stay ahead of. Join Fortified’s Tim (T.J.) Ramsey, Director, Threat Operations, at the 2023 THIMA Annual Meeting in Franklin, TN on Monday, March 27th from 3:15pm CT – 4pm CT to learn about Current Threats and...

Fortified Roundtable | March 16th | 2 PM CT

Part of raising security awareness and improving your cybersescurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

ViVE | March 26th – 29th | Nashville

While providers hire MSSPs to solve for human capital limitations, all too often the systems for communicating with and managing MSSPs requires a significant time investment and builds on alert fatigue At Fortified, we’ve developed a solution to this communication challenge and we’re bringing it to ViVE on March 26th...

Fortified Roundtable | February 23rd | 2 PM CT

Part of raising security awareness and improving your cybersescurity posture in healthcare is creating trusted peer relationships. Our roundtables facilitate this by giving you an opportunity to meet with your peers from other healthcare organizations to discuss challenges, ideas, and solutions. The format is a 60-minute web conference with healthcare...

2022 Mid-year Horizon Report

2022 Mid-year Horizon Report The State of Cybersecurity in Healthcare What we cover in the latest report: Penetration Testing Artificial Intelligence (AI)/ Machine Learning (ML) Detection and Response Technologies Metrics: Tracking Data that Affects Patient Outcomes MITRE ATT&CK Incident Response Download

3 Ways to Reduce Vulnerabilities In Your Healthcare Security

The goal of a cybersecurity in healthcare isn’t to deploy more tools or gather data. It’s to protect patients and their personal health information (PHI). While cybersecurity teams have an array of options available to combat cyberattacks, the abundance of choices can make it overwhelming to determine the most suitable...

5 Steps to Improve Cybersecurity on Your Connected Medical Devices 

Patient care depends on reliable access to medical devices, so hospital staff need to keep an accurate inventory of this equipment. However, since more devices are connected to hospital networks than ever before, there is an increased risk of cyberattacks. This guide will break down some of the ways that...