Secure Perspectives
Teaching Your Loved Ones to #BeCyberSmart
How often do you get recruited to assist a loved one with a computer or mobile device? This blog includes helpful tips to educate your loved ones during Cybersecurity Awareness Month.
Innovation Spotlight: Cyber Operations Center (CyOC)
Before the Cyber Operations Center (CyOC) was created, reporting was done via manual and labor-intensive processes requiring hundreds of man-hours, impacting the Agency’s ability for timely reporting leaving the agency with the inability to identify a single point of contact to view agency compliance as a whole.
Innovation Spotlight: MTRAP
Defense Health Agency (DHA) is currently migrating Military Treatment Facilities (MTF) into a DoD JIE CSRA compliant Medical Community of Interest (Med-COI) architecture. As a precursor to accessing the new Electronic Health Record (EHR), each MTF requires an evaluation of Information Technology assets and services. MTFs must undergo an in-depth Risk Management Framework (RMF) evaluation to receive an Authorization to Operate (ATO) on the Med-COI.
Innovation Spotlight: The EIDS Cyber Team
The Defense Health Agency’s (DHA) Enterprise Intelligence Data Solutions (EIDS) Program Management Office (PMO) MHS Information Platform’s (MIP) enclave mission objective is to seamlessly deliver the right information to the right person at the right time to Military Health System (MHS) stakeholders and partners in a safe, effective, efficient, timely, and cost-effective manner using Amazon Web Services (AWS).
Continuous Monitoring in the Cloud
The Health IT community has embraced an accelerated progression to cloud-based services and capabilities. With this progression comes a necessary question: ”What do we do next” when addressing critical cyber activities like Continuous Monitoring (CM) and persistent Risk Management (RM) “as a Service”?
Sentar’s Next 30 Years: A Risk Worth Taking
I had just put my career on the line, and I was nervous. We were now committed to embarking on a new strategy for the
Protecting your IoT (Internet of Things) Devices
This week, we take a look into the recommended remediation strategies for IoT devices present on a teleworker’s home network.
Securing Internet-Connected Devices in Healthcare
82% of healthcare providers that have implemented Internet-of-Things (IoT) devices have experienced a cyberattack on at least one of those devices over the course of the past 12 months.
The biggest threat from these IoT cyberattacks is the theft of patient data.
Securing Devices in the Age of Telework
If 2020 has been anything, it has been a stress-test on the ability of organizations to adapt to rapid and disruptive change. Some organizations are waiting to a return to normal, while others have accepted the present state as the new normal. Regardless of which outcome you are experiencing, one thing is almost certain certain; the dynamic of teleworking has changed.