Healthcare IT managers are getting more support in their efforts to protect valuable patient data from cyber attacks.
The U.S. Department of Health and Human Services Cybersecurity and Infrastructure Security Agency recently unveiled the CISA Hunt and Incident Response Program (CHIRP) tool, which is designed to support entities detect threat activity within on-premises environments, according to Health IT Security.
CHIRP is a forensic collection tool that will help network defenders find indicators of compromise with two key threat areas: advanced persistent threat actor attacks tied to the SolarWind compromise and threat activity in Microsoft Cloud environments.
CISA previously launched an IOC tool to help detect compromises within the cloud. The latest provided tool is specifically meant for on-premises networks. By default, CHIRP scans for signs of compromise within an on-premises environment, particularly IOCs associated with the malicious activity around SolarWinds threat activities that have spilled into an on-premises enterprise environment.
Two Steps to Controlling the Hot Zone
RiverSpring Living Breaks Ground on River's Edge Senior Living Community
Encompass Health Reveals Plans to Build Inpatient Rehabilitation Hospital in Post Falls, Idaho
Creating Compassionate Spaces in Healthcare
Study Shows Connection Between Odor and Patient Experience