The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) yesterday urged health care organizations to install patches to protect their Microsoft Windows operating systems and servers against two high-risk remote desktop protocol vulnerabilities known collectively as DejaBlue. As with BlueKeep and WannaCry ransomware, the DejaBlue vulnerabilities are “wormable,” meaning they can spread automatically. The health care sector is vulnerable due to widespread use of legacy systems susceptible to this vulnerability, including embedded systems in medical devices. Newer systems vulnerable to DejaBlue further complicate the attack surface. For more information, see the HHS report. John Riggi, AHA senior advisor for cybersecurity and risk, also is available to answer questions on this and other cyber-related issues at jriggi@aha.org

Related News Articles

Headline
John Riggi, AHA national advisor for cybersecurity and risk, talks with Brett Leatherman, FBI assistant director, Cyber Division, and Gretchen Burrier, FBI…
Headline
The AHA Feb. 9 released a series of behavioral threat assessment and management resources developed in partnership with the FBI’s Behavioral Analysis Unit-1.…
Headline
John Riggi, AHA national advisor for cybersecurity and risk, talks with Brett Leatherman, FBI assistant director, Cyber Division, and Gretchen Burrier, FBI…
Headline
The National Institute of Standards and Technology Feb. 2 published details on a critical vulnerability that impacted Notepad++, a free, open-source text and…
Headline
The FBI has launched a two-month campaign, Operation Winter SHIELD (Securing Homeland Infrastructure by Enhancing Layered Defense), highlighting 10 actions…
Headline
Two AHA guides offer strategies for hospitals and health systems in preparing for public health emergencies and disasters and managing cybersecurity incidents…