The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center highly recommends all health sector organizations immediately test and deploy a critical OpenSSL patch when it becomes available Nov. 1, because many of the most common operating systems and applications use the OpenSSL software library for secure communications.

“Once again we have ubiquitous, embedded third-party technology that is often out of view of the end users and cybersecurity teams creating cyber risk exposure for our hospitals and health systems,” said John Riggi, AHA’s national advisor for cybersecurity and risk. “This also highlights the ongoing need for a software bill of materials for medical devices and other pieces of mission-critical medical technology. Identifying instances of OpenSSL in your infrastructure will certainly help expedite deployment of the patch — remember the cyber ‘bad guys’ have the same notice of this vulnerability and now it’s a race to patch, before they exploit it.”

Related News Articles

Headline
The National Institute of Standards and Technology Feb. 2 published details on a critical vulnerability that impacted Notepad++, a free, open-source text and…
Headline
The FBI has launched a two-month campaign, Operation Winter SHIELD (Securing Homeland Infrastructure by Enhancing Layered Defense), highlighting 10 actions…
Headline
Two AHA guides offer strategies for hospitals and health systems in preparing for public health emergencies and disasters and managing cybersecurity incidents…
Headline
Larry Pierce, director of cybersecurity and information security officer for Atlantic Health, unpacks how the growth of artificial intelligence is reshaping…
Headline
U.S. and international agencies Jan. 14 released guidance on secure connectivity for operational technology environments. Examples of OT environments in health…
Headline
The AHA Jan. 14 expressed support for the Rural Hospital Cybersecurity Enhancement Act (S. 2169), legislation that would direct the Department of Health and…