U.S. and Australian cybersecurity agencies the week of July 24 warned organizations using web applications about vulnerabilities that enable malicious actors to modify, delete or access sensitive data and urged them to implement recommendations to protect their data from compromise.
 
John Riggi, AHA鈥檚 national advisor for cybersecurity and risk, said, 鈥淪ome of the largest breaches involving the theft of protected health information over the last several years have been related to vulnerabilities in third-party software deployed in health care organizations. We highly recommend that technology and security teams and those involved in the purchase and acquisition of software review this advisory, which provides comprehensive security guidance to both software developers and end users of web applications, application programming interfaces and other software. It highlights best practices for secure coding; reminds end users that all applications should be included in penetration testing and risk assessments; and reinforces the principles of 鈥榮ecure by design and secure by default.鈥欌
 
For more information on this or other cyber and risk issues, contact Riggi at鈥. For the latest cyber and risk resources and threat intelligence, visit鈥aha.org/cybersecurity.

Related News Articles

Headline
The FBI, Cybersecurity and Infrastructure Security Agency and international agencies July 29 released a joint advisory on recent tactics by the Scattered鈥
Headline
Microsoft July 22 released an update on the ongoing cyberattacks to SharePoint servers used within organizations, attributing the incidents to China-based鈥
Headline
The FBI, Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services, and Multi-State Information Sharing and Analysis Center鈥
Headline
Microsoft July 19 issued an alert about active attacks from vulnerabilities targeting SharePoint servers used within organizations. The incidents have not鈥
Headline
In his latest AHA Cyber and Risk Intel blog, Scott Gee, AHA deputy national advisor for cybersecurity and risk, explains how hospitals can prepare for and鈥
AHA Cyber Intel
In today鈥檚 heightened threat environment, driven by domestic and geopolitical issues, it is more critical than ever for hospitals to prepare for and mitigate鈥