This post-implementation security review of a clinic using Zoom for telehealth visits includes specific technical findings and actionable recommendations for healthcare providers. “The healthcare disruption wrought by the COVID-19 outbreak is causing providers large and small to rethink care delivery – everything from registration and waiting room protocols to the...
Designing and deploying a vulnerability management program is essential — but many of these programs are still missing a crucial piece of the puzzle.
Download the FDA’s plan on protecting patients and promoting public health with the Medical Device Safety Action Plan. Download the full report here.
Download the January 2018 OCR report on Cyber Extortion. Download the full report here.
Read the full Frost & Sullivan report that named Fortified Health Security the 2018 Healthcare IoT Company of the Year. Download the full report here.
Download the Health Care Industry Cybersecurity Task Force’s June 2017 Report on Improving Cybersecurity in the Health Care Industry. Download the full report here.
Ransomware! The word alone strikes fear in the hearts of CIOs, CISOs and hospital administrators alike. In this overview, learn what is ransomware, where it’s going, and what you can do to protect your organization. Download the full report here.