Around the world, healthcare facilities are under fire from cyberattacks. They are prime targets for cybercriminals, as they are busy with emergencies. Cyberattacks that can take place both locally, with physical access, or remotely, if the target is accessible via the computer network. And this is (unfortunately) quite often the case. This is for example the case with some medical equipment monitored by old operating systems. A look at the different types of accessibility of software attacks on hospital equipment.

 

Download

Share on

[juiz_sps buttons="facebook, twitter, linkedin, mail"]

To discover

  • Ask Ze Expert | Easy encryption with the Stormshield orchestrator

  • Datasheet SN-XL-Series-6200 – Stormshield Network Security

  • Datasheet SN-XL-Series-5200 – Stormshield Network Security

  • Datasheet SN-L-Series-3200 – Stormshield Network Security

Perform a new search