HHS releases voluntary cybersecurity goals for health care | AHA News – American Hospital Association

The Department of Health and Human Services Jan. 24 released voluntary Cybersecurity Performance Goals for the sector, which include 10 “essential” and 10 “enhanced” goals. The health care CPGs are based on multiple cybersecurity frameworks and directly address common attack vectors against U.S. domestic hospitals as identified in the 2023 Hospital Cyber Resiliency Landscape Analysis. AHA provided input on the resiliency report and the draft goals as a member of the Health Sector Coordinating Council’s Cybersecurity Working Group. 

“America’s hospitals and health systems are dedicated to protecting their patients and workforce against cyberattacks that can disrupt patient care and erode privacy by the loss of personal health care data,” said AHA President and CEO Rick Pollack. “To that end, the AHA supports voluntary consensus-based cybersecurity practices, such as those announced today by the Department of Health and Human Services. These cybersecurity performance goals are targeted at defending against the most common tactics used by cyber adversaries to attack health care and related third parties, such as exploitation of known technical vulnerabilities, phishing emails and stolen credentials. We recommend that all components of the health care sector implement these practices including third-party technology providers and business associates.

“As data theft and ransomware attacks targeting health care have increased dramatically over the past several years, the AHA has worked closely with federal agencies and the hospital field to build trusted relationships and channels for the mutual exchange of cyber threat information, risk mitigation practices and resources to implement these practices. 

“The AHA will continue to work collaboratively with HHS and other federal partners to enhance cybersecurity efforts for the entire health care field, including hospitals and health systems, technology providers, and other vendors, to ensure we are protected against the primary source of cyber risk — criminal and nation state-supported cyber adversaries.”

For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity
Noncommercial use of original content on www.aha.org is granted to AHA Institutional Members, their employees and State, Regional and Metro Hospital Associations unless otherwise indicated. AHA does not claim ownership of any content, including content incorporated by permission into AHA produced materials, created by any third party and cannot grant permission to use, distribute or otherwise reproduce such third party content. To request permission to reproduce AHA content, please click here.

source

Related Posts

After 6 months and little explanation, Norton Healthcare patients, employees still feeling effects of cyber attack – WDRB

Spotty shower possible. Storms after midnight Updated: April 16, 2024 @ 12:31 pmNorton Healthcare, a company serving about 600,000 patients a year with nearly $5 billion in assets, continues to…

Read more

CA's top cybersecurity job has been vacant for almost 2 years – CalMatters

Technology Californians get hacked all the time. The state’s top cybersecurity job is vacant In summaryGov. Newsom has yet to appoint a commander who is tasked with informing businesses and…

Read more

13 Cyber Security Measures Your Small Business Must Take – Tech.co

Our content is funded in part by commercial partnerships, at no extra cost to you and without impact to our editorial impartiality. Click to Learn MoreCybersecurity has been important to…

Read more

AVG Antivirus Free review – Ghacks

AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code.One interesting fact about AVG is that it maintains…

Read more

Vlog Episode #247: Chris Long on Improving Technical SEO Skills & Playing Offense SEO – Search Engine Roundtable

In part one, we learned about Chris Long and his experience working with Bill Slawski. Then, in part two, we spoke about helping people with SEO on LinkedIn and using…

Read more

Information Security Vs. Cybersecurity: What's The Difference? – Forbes

Information Security Vs. Cybersecurity: What’s The Difference?  Forbessource

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *