63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, according to Claroty. Research shows 72% of medical devices are connected to the internet, with only 13% supporting endpoint protection. Also, 14% of devices run on unsupported or end-of-life operating systems, increasing their vulnerability. Hospital practices, like bridging guest and internal networks and using legacy devices, add to the security issue.

Determining patients' needs via pop health data
The enterprise taxonomy includes categories for Population and Public Health, Operations, Quality Care, Analytics, Care, Business, and Data and Information. Additionally, node settings specify that