Open in app

Sign in

Write

Sign in

Aldo Febro
Aldo Febro

39 Followers

Home

About

Mar 22, 2022

Cybersecurity Policy: how leaders set the expectation for cyber hygiene

Cybersecurity policy forms your staff behavior that protects your organization. Just like any other habit, bad cyber habits are easy to form. But, left unchecked, staff with bad cyber hygiene is a liability to the organization and a threat to patient safety. …

Cybersecurity Policy

5 min read

Cybersecurity Policy: how leaders set the expectation for cyber hygiene
Cybersecurity Policy: how leaders set the expectation for cyber hygiene
Cybersecurity Policy

5 min read


Mar 15, 2022

Medical Device Security: how leaders can secure medical devices to enhance patient safety

Medical devices are soft targets for threat actors. They were built for a specific clinical use case. As a result, these devices have only the necessary components to do the job and keep the production cost low. As a result, typically, they do not have enough resources (e.g., …

Cybersecurity

4 min read

Medical Device Security: how leaders can secure medical devices to enhance patient safety
Medical Device Security: how leaders can secure medical devices to enhance patient safety
Cybersecurity

4 min read


Mar 8, 2022

Incident Response: how leaders can prepare for cyberattacks

Being prepared makes dealing with cyberattack incidents less stressful. Despite our best effort to prevent cyberattacks, there is still a possibility that an incident will occur. Do we have a plan for when that happened? Do your staff know what to do and when? …

6 min read

Incident Response: how leaders can prepare for cyberattacks
Incident Response: how leaders can prepare for cyberattacks

6 min read


Published in

System Weakness

·Mar 1, 2022

Vulnerability Management: how leaders can be proactive and ahead of attackers

It is safe to say that no system or software is 100% secure. The question is whether we have mitigated the vulnerabilities which already been discovered or the attackers will get to it first? Answering this question involves having a good inventory of our systems, followed by scanning them for…

Vulnerability Management

6 min read

Vulnerability Management: how leaders can be proactive and ahead of attackers
Vulnerability Management: how leaders can be proactive and ahead of attackers
Vulnerability Management

6 min read


Feb 22, 2022

Network Management: how leaders can secure the network and minimize impact on attacks

Network management is crucial to care delivery. Critical systems (EHR, ERP, RCM, medical devices, etc.) are accessible through a computer network. From the users’ perspective, the net effect of a network attack is similar to a ransomware attack. …

Network Management

5 min read

Network Management: how leaders can secure the network and minimize impact on attacks
Network Management: how leaders can secure the network and minimize impact on attacks
Network Management

5 min read


Feb 15, 2022

Asset Management: how leaders can improve patient safety by using IT assets that are “cyberworthy”​

From the perspective of cybersecurity in healthcare, asset management ensures that IT assets are safe to use to deliver care. Federal Aviation Administration (FAA) has a thorough process of certifying aircraft to be airworthy [1]. This process is critical to ensure passengers’ and operators’ safety. …

8 min read

Asset Management: how leaders can improve patient safety by using IT assets that are “cyberworthy”​
Asset Management: how leaders can improve patient safety by using IT assets that are “cyberworthy”​

8 min read


Feb 8, 2022

Data protection: how leaders can minimize information leak

Data protection is about keeping PHI, research data, or other sensitive information confidential. It is like having invisible fences for your confidential data. Threat actors will try to steal and sell confidential information in the black market. In a recent article, Vugar Zeynalov (Cleveland Clinic’s Chief Information Security Officer) observed…

6 min read

Data protection: how leaders can minimize information leak
Data protection: how leaders can minimize information leak

6 min read


Feb 1, 2022

Access Management: how leaders can minimize disruption from cyber attacks

Access management affects whether your service line is disrupted for one day or three months when an attack happens. Articles about ransomware seldom mention the lack of access management, which contributed to this incident. …

6 min read

Access Management: how leaders can minimize disruption from cyber attacks — Health Cyberlab
Access Management: how leaders can minimize disruption from cyber attacks — Health Cyberlab

6 min read


Jan 25, 2022

Endpoint Protection: budget-friendly options for health leaders in 2022

With trends like work from home, remote patient monitoring, acute care at home, new ambulatory care models, etc., the topic of endpoint protection has become even more important for leaders that aspire to be business enablers. This article is the fourth in a series. In the first article, we looked…

7 min read

Endpoint Protection: budget-friendly options for health leaders in 2022
Endpoint Protection: budget-friendly options for health leaders in 2022

7 min read


Jan 17, 2022

Email Protection: How leaders can get cost-effective option in 2022

A robust email protection system is crucial to stop email phishing attacks that often lead to ransomware. The Health Industry Cybersecurity Practices (HICP) document describes best practices for email protection. However, leaders would typically assume that adopting these practices is not cost-effective. …

5 min read

Email Protection: How leaders can get cost-effective option in 2022
Email Protection: How leaders can get cost-effective option in 2022

5 min read

Aldo Febro

Aldo Febro

39 Followers
Following
  • Nitin Sharma

    Nitin Sharma

  • Jackie Schuld

    Jackie Schuld

  • Authority Magazine Editorial Staff

    Authority Magazine Editorial Staff

  • Kurtis Pykes

    Kurtis Pykes

  • Developing Cyber Leadership

    Developing Cyber Leadership

See all (99)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams