Why Tactics Matter in Cybersecurity: Rethinking the Way Healthcare Defends

In a recent Fortified Health Security webinar, T.J. Ramsey, Senior Director of Threat Operations, delivered a pointed message: strategy alone won’t protect healthcare organizations from cyber criminals. Tactical execution is what makes the difference. As cyber threats grow in speed, scale, and sophistication, it’s not just about knowing what to do, but about having the […]

April 2025 CISO Brief: Behind the Cyber Threat Headlines

Fortified’s Threat Services Team tracks the most pressing cyber threats targeting the healthcare sector each month. April’s activity surrounding PipeMagic ransomware, Oracle’s dual breach allegations, and the news regarding the DaVita ransomware attack illuminate a stark reality: the healthcare sector is under sustained siege from sophisticated threat actors intensifying their focus on healthcare’s legacy systems, […]

How Health Systems Can Reduce their Attack Surface with VTM

What is attack surface management? Think of your attack surface as a fortress with multiple entry points. Each entry point represents a system or network weakness that could potentially be breached by an intruder. These weaknesses, like outdated patches, misconfigurations, and traditional vulnerabilities, serve as open doors or unguarded walls that can be exploited by […]

3 Things to Add to your Healthcare Vulnerability Threat Management

The goal of a cybersecurity in healthcare isn’t to deploy more tools or gather data. It’s to protect patients and their personal health information (PHI). While cybersecurity teams have an array of options available to combat cyberattacks, the abundance of choices can make it overwhelming to determine the most suitable solution for an organization. The […]

6 Components of a Vulnerability Threat Management Program

Safeguarding your healthcare organization’s electronic Protected Health Information (ePHI) against cybersecurity threats is like protecting your financial assets from potential fraudsters. Just as neglecting to invest in robust security measures could leave your finances vulnerable to theft, overlooking or minimizing the importance of threat management could expose your health system’s sensitive patient information to cybercriminals. […]