Resources

Refine your skills, enhance your expertise, and bolster your professional credibility with Access Point Consulting's expansive set of resources. Browse our catalog of articles and bulletins for expert cybersecurity guidance, best practices, timely vulnerability and incident reports, breaking industry news, and more.

State of Security

View all podcasts

[LIVE] How to Be Proactive About Operational Resilience and Incident Response | State of Security

Summary The conversation focuses on operational resilience and incident response in the healthcare industry. The speakers discuss the increase in healthcare data breaches and the need for organizations to proactively protect themselves. They emphasize the importance of cyber resilience and having a plan in place to manage and recover from attacks. The conversation also touches on the role of AI and machine learning in cybersecurity and the need for ongoing testing and governance. Key elements of an incident response plan include classification and prioritization of incidents, detection and analysis tools, and recovery strategies. The conversation explores the role of engineering and architecture in ensuring the effectiveness of a security operations center (SOC) and the need for transparency and collaboration between the CISO, engineering staff, and executives. It also discusses the importance of cyber resilience in healthcare organizations and the evolving understanding of cybersecurity in the C-suite. The conversation highlights the challenges of budgeting for cybersecurity and the need for prioritization. It emphasizes the shift from compliance-focused security to proactive cyber resilience and the role of CISO dashboards in communicating risk to the C-suite and the board. The conversation concludes with a discussion on the benefits of virtual CISOs and CISO advisory services in bridging the gap between organizations and experienced cybersecurity professionals. Takeaways - Organizations need to shift from a defensive posture to a proactive approach in protecting themselves from cyber attacks. - Cyber resilience is crucial in managing and recovering from attacks. - AI and machine learning can be manipulated to produce false outcomes, so ongoing testing and governance are essential. - An incident response plan should include incident classification, detection and analysis tools, and recovery strategies. - Engineering and architecture play a significant role in ensuring the effectiveness of a security operations center (SOC) and the transparency of cyber operations. - Collaboration between the CISO, engineering staff, and executives is crucial for creating a cyber-resilient organization. - Budgeting for cybersecurity requires prioritization and a shift from compliance-focused security to proactive cyber resilience. - CISO dashboards are effective tools for communicating risk to the C-suite and the board. - Virtual CISOs and CISO advisory services can bridge the gap between organizations and experienced cybersecurity professionals.

Find out more
May 16, 2024

Ransomware Pandemic Hits Ascension Hospitals

On May 9, Ascension, a leading private healthcare provider managing 140 hospitals across the United States, confirmed experiencing a significant ransomware attack initiated by the Black Basta group. This cybersecurity breach was first detected the day before, May 8, because of unusual activity on the organization's network systems. The attack severely disrupted operations, leading to delays and postponements of patient appointments and other healthcare services.

Find out more
May 16, 2024

Two Exploited Zero-Day Vulnerabilities Patched

Microsoft released their security updates for May of 2024 which include fixes for two zero-day vulnerabilities: CVE-2024-30040 (CVSSv3: 8.8) and CVE-2024-30051 (CVSSv3:7.8). CVE-2024-30051 (Windows DWM Core Library Elevation of Privilege Vulnerability) allows for a local attacker to exploit this vulnerability to gain system-level privileges. CVE-2024-30040 (Windows MSHTML Platform Security Feature Bypass Vulnerability) allows a remote attacker to bypass OLE mitigations in M365 and Microsoft Office that protect users from vulnerable COM/OLE controls. It requires an attacker to convince a user to load a malicious file into a vulnerable system and manipulate it. This can allow an unauthenticated attacker to achieve remote arbitrary code execution from the context of the user. Both of these vulnerabilities are known to be exploited and have each been added to CISA’s Known Exploited Vulnerabilities Catalog, giving them a heightened patch priority and associated risk.

Find out more
May 10, 2024

Fix Available for Use-After-Free Vulnerability in Tinyproxy

This is a vulnerability that exists in HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.1 classified as CVE-2024-49606 (CVSSv3: 9.8). Cisco Talos security researchers describe this vulnerability as a use-after-free which exists in the HTTP Connection Headers of vulnerable versions of tiny proxy. Utilizing a specially crafted HTTP header can trigger reuse of previously freed memory which leads to memory corruption and can potentially lead to remote code execution. This method does not require authentication. This vulnerability is considered a zero day, but a fix has been made available through GitHub.

Find out more

Guides & Whitepapers

View all
Dangers of Unpatched Healthcare IoT and Network Systems

Dangers of Unpatched Healthcare IoT and Network Systems

It’s not uncommon for large healthcare organizations to support patients via thousands of systems––servers, network hardware, and Internet of Things (IoT) devices particular to the medical practice. Healthcare organizations are primary targets for attackers and are required to follow strict regulations to stop data breaches. HIPAA violations are costly, and unpatched hardware leaves healthcare systems vulnerable to numerous threats including malware, ransomware, security bypasses, and possible remote code execution. Patching systems with the latest update is critical to data protection and risk management, and it keeps the company compliant with HIPAA guidelines.

Find out more
6cd7600d-b040-4723-b0cd-2d93e6b65dbc
Virtual
Live

Reception at Top Golf | SecureWorld Philadelphia

Wed, April 17, 2024 | 4:30 PM-7:30 PM
Top Golf King of Prussia
Live
Virtual

7th Annual Medtech Cybersecurity Risk Mitigation Conference

Tue, Oct 3, 2023 9:00 am - Wed, Oct 4, 2023, 2:30 pm