Cybersecurity

Cyber Threat Intelligence, Alerts and Reports
As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.
You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.
Cybersecurity & Risk Advisory
Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.
H-ISAC TLP White: Daily Cyber Headlines - October 22, 2024
A daily ransomware tracker at TLP:GREEN for the purpose of increasing ransomware threat awareness.
A new AHA Cyber Intel blog by John Riggi, AHA’s national advisor on cybersecurity and risk, examines current trends and challenges in health care regarding ransomware and other cybersecurity attacks as incidents targeting hospitals, third-party providers and suppliers increase.
October marks Cybersecurity Awareness Month, a global campaign dedicated to educating individuals, businesses and institutions about the importance of online safety. For health care leaders, this is an important month to raise awareness in this area, particularly since the frequency and…
Cyberattacks are increasing and expected to reach record numbers in the U.S. by the end of 2024. Although no field or industry is immune from attacks that involve phishing, ransomware and data theft, health care organizations have become a top target for cybercriminals.
A daily ransomware tracker at TLP:GREEN for the purpose of increasing ransomware threat awareness.
H-ISAC TLP White Daily Cyber Headlines for October 18, 2024.
A daily ransomware tracker at TLP:GREEN for the purpose of increasing ransomware threat awareness.
A joint advisory issued Oct. 16 by the FBI, the Cybersecurity and Infrastructure Security Agency, the National Security Agency and international agencies warn of a threat of Iranian cyber actors using brute force and other techniques to compromise organizations in health care and other critical…
OverviewAs outlined in CISA’s Secure by Design initiative, software manufacturers should ensure that security is a core consideration from the onset of software development. This voluntary guidance provides an overview of product security bad practices that are deemed exceptionally risky,…