094 90 48200     Get SUPPORT

Aniar IT Services Blog

You’d Be Surprised How Insecure Some Healthcare Providers Are

You’d Be Surprised How Insecure Some Healthcare Providers Are

The healthcare industry is in a difficult position. Despite the utility that connected devices present to medical providers, the Bluekeep vulnerability makes it seem as though connected devices aren’t a wise solution for many to use… and there’s nobody these organizations can blame but themselves.

What is BlueKeep?

BlueKeep is a malware strain that was first discovered in May 2019, and was patched in short order to prevent it from becoming another situation like EternalBlue. EternalBlue was the exploit that allowed WannaCry to have such a considerable impact, especially on healthcare providers in the UK. Despite this precedent, however, many hospitals neglected to apply the necessary patches--and that isn’t even the worst part.

The worst part is that the three systems that BlueKeep impacts (Windows 7, Windows Server 2008, and Windows Server 2008 R2) share one thing in common: they have all passed their end-of-life date, and therefore no longer receive security updates.

This makes this situation a two-fold disaster. Not only have patches been released to mitigate BlueKeep, the systems affected by BlueKeep should not be in use anyways.

Of course, it only gets worse, and paints an unfortunate portrait of medical IT. A reported 22 percent of BlueKeep-vulnerable devices are yet unpatched. Worse, 45 percent of connected medical devices remain vulnerable, making things like x-rays, anesthesia machines, and other care-driven technology a risk to use.

Are you concerned about your organization’s technology?

Lean on the IT experts at Aniar IT Services for assistance. We can help any organization ensure that their technology won’t put their operations or their patrons in harm’s way. Learn more about what we can do by calling us at 094 90 48200 .

Considerations for Your Business Networking Setup
Tip of the Week: Using Microsoft Word Templates


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 30 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Productivity Privacy Cloud Innovation User Tips Workplace Tips Email Internet Microsoft Network Security Data Software Hosted Solutions Hardware Hackers IT Support Data Recovery Google Data Backup Efficiency Smartphones Tech Term IT Services Windows 10 Managed IT Services Mobile Devices Cybersecurity Communication Communications Small Business Phishing Android Cloud Computing Business VoIP Computer Gadgets Collaboration Users Backup Malware Mobile Device Artificial Intelligence Smartphone Outsourced IT Network Business Management Internet of Things Miscellaneous Saving Money Business Continuity Windows Information Upgrade Spam Facebook BDR Server Browser Office 365 Router Social Media Managed Service Chrome How To Word Cybercrime BYOD Applications Paperless Office Computers Blockchain Passwords Automation Windows 7 Holiday Microsoft Office Vulnerability Quick Tips Operating System Data Breach Connectivity Networking Ransomware Encryption Mobile Device Management Money Infrastructure Human Resources Save Money Remote Monitoring Settings Two-factor Authentication Managed IT Virtualization Bandwidth Data Security Staff Telephone System Data Storage Apps Disaster Recovery Data Protection Display History Patch Management Processor Big Data Social Engineering Bring Your Own Device Website IT Management Avoiding Downtime App Meetings Access Control Comparison Sports Virtual Assistant Google Drive CES Fraud Google Docs Business Technology Law Enforcement Education Managed Services Provider Keyboard Telephony Private Cloud IT Plan Content Management OneNote VPN Wi-Fi Scam Update Password Business Intelligence Servers Augmented Reality Unsupported Software Vendor Botnet Help Desk Government Digital Signage Managed IT services Machine Learning HIPAA Cryptocurrency Redundancy Voice over Internet Protocol Spam Blocking Telephone Systems Training Software as a Service Identity Theft Frequently Asked Questions Recovery Google Search Copiers Google Apps Start Menu YouTube Mouse Remote Workers Electronic Medical Records Wire Safe Mode Security Cameras Investment Printing Online Shopping Sync Multi-Factor Security Smart Office Addiction Professional Services Credit Cards PDF WiFi Remote Worker Database Vendor Management Going Green Gmail Millennials Shortcuts Virtual Reality Excel Save Time Hard Drive Development Workers Microchip Solid State Drive Managed IT Service Data Management Smartwatch ROI Downtime Personal Evernote Cleaning Document Management Camera Windows 10s Project Management Mobility Cabling Fiber Optics Wireless Flash Wiring Saving Time Screen Mirroring Recycling Devices Value Workforce Enterprise Content Management Tip of the week Employer-Employee Relationship Proactive IT Messaging Authentication Specifications Search Engine Audit Physical Security Health GDPR Root Cause Analysis Digitize Practices Trending Printers Bitcoin Cache Password Management Social Cables Trend Micro Amazon HaaS Firewall Procurement Cast eWaste Thought Leadership Windows Server 2008 MSP Net Neutrality SMS Bing OLED Using Data HBO Employee Remote Computing IT Assessment Charger Hosted Computing Entertainment Warranty Public Cloud Batteries Wireless Internet NIST Default App Shopping Amazon Web Services Accountants 5G Unified Threat Management Employee/Employer Relationship Legal Telecommuting Computer Care File Sharing ISP Virtual Machine Data loss AI Password Manager Nanotechnology HVAC Biometric Security Computer Fan Information Technology Outlook Compliance Windows Server 2008 R2 OneDrive Wireless Charging Inventory The Internet of Things Skype Printer Virtual Private Network Software Tips USB Hacker IT Infrastructure Social Network Mobile Computing Criminal Travel Remote Work Digital Signature Cortana Cryptomining Hypervisor Alert Remote Business Mangement Smart Tech Tools Work/Life Balance Manufacturing FENG Computing Regulation IP Address Managed Service Provider Customer Service Mobile Office Hiring/Firing Company Culture Domains Fun Personal Information Windows 10 Managing Stress Public Speaking Presentation Lithium-ion battery Financial Hard Drives Search Wireless Technology Tech Support Safety IBM Emergency Productivity Marketing CrashOverride Twitter Budget Competition Customer Relationship Management