Around the world, healthcare facilities are under fire from cyberattacks. They are prime targets for cybercriminals, as they are busy with emergencies. Cyberattacks that can take place both locally, with physical access, or remotely, if the target is accessible via the computer network. And this is (unfortunately) quite often the case. This is for example the case with some medical equipment monitored by old operating systems. A look at the different types of accessibility of software attacks on hospital equipment.

 

Download

Share on

[juiz_sps buttons="facebook, twitter, linkedin, mail"]

To discover

  • Whitepaper | Everything you need to know about IEC 62443 to improve the protection of your operational system

  • Datasheet SNi10 – Stormshield Network Security

  • Ask Ze Expert | Everything you need to know about ZTNA

  • Datasheet SN-XS-Series-170 – Stormshield Network Security

Perform a new search