The Department of Health and Human Services (HHS) aids the Healthcare and Public Health (HPH) sector in preparing for and responding to cyber threats.
HHS, in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), has developed voluntary Cybersecurity Performance Goals (CPGs) for the healthcare sector.
– The CPGs aim to protect healthcare organizations from cyberattacks, improve response capabilities, and minimize residual risk.
– They are divided into essential goals, which outline minimum foundational practices, and enhanced goals, promoting more advanced practices.
Include mitigating known vulnerabilities, email security, multifactor authentication, basic cybersecurity training, strong encryption, revoking credentials, basic incident planning, unique credentials, and vendor/supplier cybersecurity requirements.
Focus on asset inventory, third-party vulnerability disclosure, incident reporting, cybersecurity testing, mitigation, threat detection, network segmentation, centralized log collection, and configuration management.
– The CPGs are built on CISA’s CPGs and are informed by common industry frameworks and best practices like the Healthcare Industry Cybersecurity Practices and the NIST Cybersecurity Framework.
– They address common attack vectors against U.S. domestic hospitals and promote resiliency in medical devices and healthcare operations.
– The HPH CPGs offer a comprehensive foundation for cyber preparedness and resiliency, emphasizing layered protection and targeted strategies to mitigate cyber risks in the healthcare sector.
This document https://hphcyber.hhs.gov/performance-goals.html is crucial for healthcare organizations looking to strengthen their cybersecurity posture and safeguard patient information and healthcare operations against emerging cyber threats.
When data is stolen in a breach, it embarks on a journey through the criminal…
The 2024 Space Threat Assessment, published by the Center for Strategic and International Studies (CSIS), highlights…
Enhancing the security of industrial control systems (ICS) is critical, and executing network segmentation and…
Concerned about how the NIST Cybersecurity Framework 2.0 will change your approach to cybersecurity? The…
How do AI and machine learning redefine the role of AI and machine learning in…
What exactly is phishing, and how can you recognize and prevent it? Our Phishing 101…