lunes, 15 de mayo de 2017

HHS Update #2: International Cyber Threat to Healthcare Organizations Banner

HHS Update #2: International Cyber Threat to Healthcare Organizations


Where can I find the most up-to-date information from the U.S. government?
Where can I find the latest Microsoft Security Information?
Visit the Microsoft Update Catalog for the latest security updates.
ASPR TRACIE: Healthcare Cybersecurity Best Practices
Our message from May 12, 2017 including information on how to protect from email-based and open RDP ransomware attacks can be found on the TRACIE portal here. 
ASPR TRACIE also has the best and promising healthcare cybersecurity practices available in our Technical Resources domain. Issue 2 of The Exchange  (released in 2016) highlights lessons learned from a recent attack on a U.S. healthcare system and features articles that demonstrate how collaboration at all levels is helping healthcare facilities implement practical, tangible steps to prevent, respond to, and recover from cyberattacks. The video Cybersecurity and Healthcare Facilities features subject matter experts describing last year's attack on MedStar, steps we can take to prevent and mitigate attacks, and what the federal government is doing to address cybersecurity. The Cybersecurity and Information Sharing Topic Collections include annotated resources reviewed and approved by a variety of subject matter experts.
How to request an unauthenticated scan of your public IP addresses from DHS
The US-CERT’s National Cybersecurity Assessment & Technical Services (NCATS) provides integrated threat intelligence and provides an objective third-party perspective on the current cybersecurity posture of the stakeholder’s unclassified operational/business networks.
  • NCATS focuses on increasing the general health and wellness of the cyber perimeter by broadly assessing for all known external vulnerabilities and configuration errors on a persistent basis, enabling proactive mitigation prior to exploitation by malicious third parties to reduce risk.
  • Attributable data is not shared or disseminated outside of DHS or beyond the stakeholder; non-attributable data is used to enhance situational awareness.
  • NCATS security services are available at no-cost to stakeholders. For more information please contact
If you are the victim of ransomware or have cyber threat indicators to share
If your organization is the victim of a ransomware attack, please contact law enforcement immediately.
  1. Contact your FBI Field Office Cyber Task Force  immediately to report a ransomware event and request assistance. These professionals work with state and local law enforcement and other federal and international partners to pursue cyber criminals globally and to assist victims of cyber-crime.
  2. Report cyber incidents to the US-CERT and  FBI's Internet Crime Complaint Center.
  3. For further analysis and healthcare-specific indicator sharing, please also share these indicators with HHS’ Healthcare Cybersecurity and Communications Integration Center (HCCIC) at

No hay comentarios:

Publicar un comentario