End the duopoly

The Escalating Demand for Continuous Monitoring in Healthcare

16

As the technology we use to conduct business continues to advance, so too does the frequency and sophistication of attacks on our configuration management systems. The threat landscape is changing, and throughout the coronavirus pandemic, bad actors have been targeting healthcare industries more than ever.

As of March, hospitals were seeing a 150% increase in cyber attacks. And, the Federal Bureau of Investigation’s Internet Crime Complaint Center reported online crimes “ have roughly quadrupled since the coronavirus pandemic .” With the CMS (Centers for Medicare & Medicaid Services) urging providers to remain CM-6 compliant, organizations must ensure they’re doing everything they can to protect against a data breach.

While the importance of CM-6 compliance is obvious, running an audit can be incredibly costly and inefficient. It is common for organizations to have an arduous CM-6 compliance process in place. Manual processes, such as tracking with Excel, SharePoint or email, are neither scalable nor efficient. Such outdated methods are unable to provide clear visibility or a real-time view of your vulnerabilities. Therefore, they offer little insight into the risks those vulnerabilities present.

For example, the average time it took to identify a breach in 2019 was 206 days , and the average time […]

read more here —> securityboulevard.com

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More