Healthcare IT managers are getting more support in their efforts to protect valuable patient data from cyber attacks.
The U.S. Department of Health and Human Services Cybersecurity and Infrastructure Security Agency recently unveiled the CISA Hunt and Incident Response Program (CHIRP) tool, which is designed to support entities detect threat activity within on-premises environments, according to Health IT Security.
CHIRP is a forensic collection tool that will help network defenders find indicators of compromise with two key threat areas: advanced persistent threat actor attacks tied to the SolarWind compromise and threat activity in Microsoft Cloud environments.
CISA previously launched an IOC tool to help detect compromises within the cloud. The latest provided tool is specifically meant for on-premises networks. By default, CHIRP scans for signs of compromise within an on-premises environment, particularly IOCs associated with the malicious activity around SolarWinds threat activities that have spilled into an on-premises enterprise environment.
Building Envelope Design: Beyond Energy Efficiency
Outpatient Surge Reshapes Long-Term Strategy for Medical Outpatient Buildings
Mercy Medical Center to Be Integrated into Baystate Health
Managing IAQ in Healthcare Facilities During Wildfires
Building Hospital Resilience in an Era of Extreme Weather