By accepting you will be accessing a service provided by a third-party external to

Security Has to Be At the Top of Every Healthcare Provider’s List

Security Has to Be At the Top of Every Healthcare Provider’s List

With thousands of people exposed to the COVID-19 Coronavirus and millions more under quarantine, the healthcare industry is on red alert at the moment. Just a short time ago they were worried about another virus: Bluekeep.

What is BlueKeep?

The Bluekeep vulnerability is a strain of malware that was discovered in May 2019, and was patched soon thereafter. Healthcare providers wanted to ensure that BlueKeep wasn’t anything like the EternalBlue situation just a short time ago. EternalBlue was the exploit hackers used that allowed the WannaCry ransomware attack to have such a lasting impact on the industry. 

Unfortunately, many health maintenance organizations didn’t apply the necessary patches; and with the three operating systems (Windows 7, Windows Server 2008, and Windows Server 2008 R2) that the BlueKeep vulnerability affects already lacking support, the situation is definitely problematic. This is more true today as the COVID-19 virus continues to spread rapidly, putting unprecedented pressure on these hospitals and other healthcare organizations.

Even today, over 20 percent of all BlueKeep-vulnerable devices remain unpatched and nearly 45 percent of all connected medical devices remain vulnerable to attack. That includes some very important machines such as x-rays, anesthesia machines, and care-driven technologies vulnerable for an attack.

Is your practice up-to-date? 

If you would like our professional IT experts to do a thorough assessment of all of your practice’s technology to see if your systems are patched and up-to-date, call us today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 07 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Malware Business Efficiency Communication Data Google Small Business Workplace Tips IT Services IT Support Mobile Devices Hardware Cloud Computing Tech Term Internet Managed IT Services Data Recovery Ransomware Backup Innovation Smartphone Users Outsourced IT Windows Mobile Device Smartphones Upgrade Android Saving Money Data Backup Miscellaneous Information Disaster Recovery VoIP Facebook communications Server Microsoft Office Phishing Windows 10 Business Management Browser Business Continuity Cybersecurity Office 365 Productivity Managed IT Services Network Social Media Windows 10 Passwords Data Management Internet of Things Vulnerability Remote Monitoring Gadgets Gmail Word App Encryption Apps Chrome Quick Tips Mobile Office Infrastructure Artificial Intelligence Managed Service Information Technology Employer-Employee Relationship Networking Virtual Reality VPN Access Control Applications Router Settings Analytics Managed Service Provider BYOD Company Culture Tip of the week IT Support Remote Workers Money Save Money Website WiFi Office Tips Automation HIPAA BDR Google Drive Big Data Bandwidth Content Filtering Paperless Office IT Management Data Security Government Education Virtual Private Network Apple Storage Computers Unified Threat Management Employee-Employer Relationship Display YouTube Hacker Data storage Maintenance Collaboration Firewall Risk Management Avoiding Downtime Antivirus Development Robot Windows 7 Bring Your Own Device Operating System Social Solid State Drive Software as a Service Break Fix IT LiFi Wireless Search Social Network Hosted Solution End of Support Laptop Humor Administration Training The Internet of Things Best Practice Remote Computing Hard Disk Drive Mouse Mobile Security Server Management Downtime Going Green Business Technology SaaS Marketing Business Intelligence iOS Wi-Fi Touchscreen Managed IT Holiday Virtualization Tablet Printing Data loss Retail Alert Password Conferencing Telephone Systems desktop Managed Services MSP Augmented Reality Two-factor Authentication Managing Stress Managed IT Service Vendor Management OneNote Monitors Spam Computing Document Management Data Breach Customer Relationship Management Scam Chromebook Outlook Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Buisness Motherboard Cables Computer Care IBM Gamification Alerts USB File Sharing Sports Identity Continuity Managed Services Provider Websites Virtual Desktop Budget Fraud Cost Management Onboarding GDPR Time Management Printer Smart Office Print Toner Myths Black Friday Screen Reader Charging Identity Theft Slack Hard Disk Drives Typing Content Huawei Servers Google Calendar Safety Current Events Wires Corporate Profile Messaging Emergency COVID-19 Licensing Dongle Solar G Suite Entertainment Vendor Dark Web Holidays Assessment Automobile Digital Signage Data Warehouse Network Management Work Dell Shortcuts Mobile Management Cyber Monday Distribution Smart Tech Monitoring Solid State Drives Network Congestion Cryptocurrency Streaming Processor Legislation IT solutions Voice over Internet Protocol WannaCry Employee-Employer Relationships Remote Work Cybercrime Google Docs Cooperation Service Level Agreement Cabling SharePoint Writing Hacks Compliance Hybrid Cloud Microsoft Excel Payment Card Hotspot Internet Exlporer Google Maps Troubleshooting Business Analysis Bitcoin IT Technicians Optimization Security Cameras Profiles Smart Technology Logistics Google Wallet Connectivity Spying National Security Techology Human Error Memory Statistics Modem FinTech Analysis Students How To Lenovo Dark Data Update Business Growth Staff Leominster Downloads Regulations Scalability Mail Merge Blockchain Inventory Legal Language Value Virus Halloween Windows 8 Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Asset Management Politics Unified Communications Drones IoT Digital Payment Updates VoIP Unified Threat Management Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Digital Mixed Reality Firefox Superfish Customer Service Peripheral K-12 Schools Threats Office Samsung Mobile Device Management Social Networking Migration Consulting Address Permissions Shadow IT Health Private Cloud Deep Learning Computing Infrastructure Professional Services LED Scary Stories Chatbots eWaste Laptops Patch Management Memes Tech Support Star Wars PowerPoint User Error Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Spyware Running Cable Alt Codes Wearable Technology Network upgrade Financial Notifications Mobile Computing Electronic Medical Records Twitter Physical Security Error Point of Sale Ben McDonald shares Upgrades Gadget Emoji Crowdsourcing Travel Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Processors Taxes Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget GPS IT Consultant Computer Repair Relocation Printers Cameras Mobile Data How To Tracking Recovery Meetings Cleaning CCTV Black Market Webcam Law Enforcement

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3