U.S. and Australian cybersecurity agencies the week of July 24 warned organizations using web applications about vulnerabilities that enable malicious actors to modify, delete or access sensitive data and urged them to implement recommendations to protect their data from compromise.
 
John Riggi, AHA鈥檚 national advisor for cybersecurity and risk, said, 鈥淪ome of the largest breaches involving the theft of protected health information over the last several years have been related to vulnerabilities in third-party software deployed in health care organizations. We highly recommend that technology and security teams and those involved in the purchase and acquisition of software review this advisory, which provides comprehensive security guidance to both software developers and end users of web applications, application programming interfaces and other software. It highlights best practices for secure coding; reminds end users that all applications should be included in penetration testing and risk assessments; and reinforces the principles of 鈥榮ecure by design and secure by default.鈥欌
 
For more information on this or other cyber and risk issues, contact Riggi at鈥. For the latest cyber and risk resources and threat intelligence, visit鈥aha.org/cybersecurity.

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency April 17 released guidance to reduce risks associated with a reported breach of Oracle cloud services.鈥
Headline
The National Counterintelligence and Security Center, the FBI, and the Defense Counterintelligence and Security Center yesterday released guidance on鈥
AHA Cyber Intel
While the rate of cyberattacks on hospitals has risen dramatically, the severity of the impacts has also grown exponentially. Let鈥檚 look at the state of cyber鈥
Headline
The House Energy and Commerce Oversight and Investigations Subcommittee April 1 discussed cybersecurity threats in legacy medical devices during a hearing. The鈥
Headline
The Trump Administration March 28 announced that it renewed for one year the public emergency for ongoing malicious cyber-enabled activities against the U.S.鈥
Headline
The FBI March 26 advised that, after extensive investigation and intelligence review, they have not identified any specific credible threat targeted against鈥