Healthcare IT managers are getting more support in their efforts to protect valuable patient data from cyber attacks.
The U.S. Department of Health and Human Services Cybersecurity and Infrastructure Security Agency recently unveiled the CISA Hunt and Incident Response Program (CHIRP) tool, which is designed to support entities detect threat activity within on-premises environments, according to Health IT Security.
CHIRP is a forensic collection tool that will help network defenders find indicators of compromise with two key threat areas: advanced persistent threat actor attacks tied to the SolarWind compromise and threat activity in Microsoft Cloud environments.
CISA previously launched an IOC tool to help detect compromises within the cloud. The latest provided tool is specifically meant for on-premises networks. By default, CHIRP scans for signs of compromise within an on-premises environment, particularly IOCs associated with the malicious activity around SolarWinds threat activities that have spilled into an on-premises enterprise environment.
IAQ and Infection Mitigation in Aging Facilities
Preventing Pests: Effective Measures in Healthcare Facilities
CommuniCare Reports Data Security Incident
What Does Light Daily Cleaning Miss in Patient Rooms?
Smart Lighting Overhaul Boosts Efficiency, Diagnostics and Wellness at Bryan Health