This article provides guidance on protecting oneself from healthcare data breaches. It emphasizes the need to use strong, unique passwords, regularly monitor account activity, be cautious with sharing medical information, and use secured networks. Further, individuals are encouraged to maintain updated antivirus software and to review their health insurance statements regularly.

Dispersed responsibility, lack of asset inventory is causing gaps in medical device cybersecurity
Witnesses at a House hearing on medical device cybersecurity highlighted the need for better tracking of devices and their vulnerability to cyber threats. They noted