The evaluation process covers everything from compatibility to cost and the quality of customer service, but it also includes a comprehensive risk assessment led by the health system’s CISO.
“Any vendor we’re potentially going to use must go through that assessment,” Meadows says….
Source: healthtechmagazine.net – Read more

Critical Microsoft Telnet 0-Click Vulnerability Exposes Windows Credentials
A critical vulnerability in Microsoft Telnet Server allows remote attackers to bypass authentication entirely, gaining administrative access without credentials. Affecting legacy Windows systems (2000 through