Healthcare IT managers are getting more support in their efforts to protect valuable patient data from cyber attacks.
The U.S. Department of Health and Human Services Cybersecurity and Infrastructure Security Agency recently unveiled the CISA Hunt and Incident Response Program (CHIRP) tool, which is designed to support entities detect threat activity within on-premises environments, according to Health IT Security.
CHIRP is a forensic collection tool that will help network defenders find indicators of compromise with two key threat areas: advanced persistent threat actor attacks tied to the SolarWind compromise and threat activity in Microsoft Cloud environments.
CISA previously launched an IOC tool to help detect compromises within the cloud. The latest provided tool is specifically meant for on-premises networks. By default, CHIRP scans for signs of compromise within an on-premises environment, particularly IOCs associated with the malicious activity around SolarWinds threat activities that have spilled into an on-premises enterprise environment.
The Growing Crisis in Rural Healthcare Facilities
A Cleaning Alternative: The Benefits of Steam Technology
Novant Health Gets Approval for New Hospital and Freestanding Emergency Department
Preparing Healthcare Facilities for Severe Thunderstorms
NLCS Strengthens Safety and Compliance with Comprehensive Electrical Program