Get Help Now

From the Cybersecurity News Desk

GreyCastle recaps Healthcare IT cyber threats for April 2023.

Healthcare Cyber Threats Identified in Health-ISAC Annual Report

The Health Information Sharing and Analysis Center (Health-ISAC) recently released its annual threat report, which surveyed over 280 healthcare cybersecurity executives across Health-ISAC, CHIME, and the Health Sector Coordination Council.

The report highlighted the top five cybersecurity concerns facing healthcare organizations, which include ransomware deployment, phishing/spear-phishing attacks, thirty-party/partner breaches, data breaches, and social engineering.

Health-ISAC aims to influence healthcare cybersecurity budget and investment decisions by providing insight into specific threats facing the sector.

The report also emphasized the importance of medical device security and recommended organizations perform risk assessments, apply patches and updates, and develop care contingency plans to account for cyber risk.

Health-ISAC predicted that product abuse and synthetic accounts would be a growing threat to the healthcare industry in 2023, and emphasized the importance of aligned controls at the network, application, authentication, and risk layers to protect organizational data.

See How We Can Help!

Fill out this form and we’ll be in touch shortly

    Number of Employees - select one:
    Industry - select one:

    Be proactive in containing advanced threats before they create harm. Our team provides insight into attack methodologies used by adversaries, ensuring your organization stays ahead off evolving threats.


    Stay Ahead of the Adversary

    Let us help you ensure that your organization stays ahead of evolving threats.

    Ensure Your Data Privacy Success

    Ensure you’re following best practices and identify issues and mitigate them with our Data Privacy Services.

    Cybersecurity Incidents Happen

    Plan, prevent, and mitigate with our incident response team.

    View expert analysis on the latest threats 

    Finding qualified security professionals can be difficult and costly.

    Ours are the best. Put them to work for you.

    Contact Us
    Privacy Settings
    We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
    Consent to display content from - Youtube
    Consent to display content from - Vimeo
    Google Maps
    Consent to display content from - Google
    Consent to display content from - Spotify
    Sound Cloud
    Consent to display content from - Sound
    Contact Us