Cybersecurity attacks have increased the risk to patient data, with attackers targeting the physical layer such as hardware and firmware. Firmware is often exploited as its updates require a manual process that is frequently delayed by IT teams. To mitigate against this, it is essential to ask five questions of your hardware integrator about firmware authentication, hardening checks, inventory scans, traceability, and post-delivery support. The aim is to ensure robust controls that can protect against known attack vectors and expedite recovery.

Louis Vuitton says UK customer data stolen in cyber-attack – The Guardian
Summarize this content to a maximum of 60 words: Louis Vuitton says UK customer data stolen in cyber-attack The Guardian