Cybersecurity attacks have increased the risk to patient data, with attackers targeting the physical layer such as hardware and firmware. Firmware is often exploited as its updates require a manual process that is frequently delayed by IT teams. To mitigate against this, it is essential to ask five questions of your hardware integrator about firmware authentication, hardening checks, inventory scans, traceability, and post-delivery support. The aim is to ensure robust controls that can protect against known attack vectors and expedite recovery.

Employer groups, unions urge Trump administration to reform No Surprises dispute resolution
Providers are reaping high award amounts, and arbiters have “structural conflicts of interest” that incentivize a high volume of disputes, driving up healthcare costs for


