Healthcare Orgs, Take Control of Your Network! Level Up Cyber Hygiene with Diligent Vendor Vetting and Software Segmentation

Spacelabs Healthcare Banner Ad

 

The digital transformation of healthcare organizations has significantly increased reliance on software and medtech devices, weaving a complex web of interdependencies in their supply chains. This shift raises critical vulnerabilities as highlighted by infamous incidents like the SolarWinds breach, underscoring the urgency for enhanced cyber hygiene practices. With recent executive orders pushing for better security protocols, healthcare organizations are under pressure to fortify their supply chains against escalating cyber threats.

What strategies can healthcare organizations employ to effectively manage the cyber hygiene of their healthcare supply chain, including software and medtech devices?

Robin Berthier, CEO and founder of Network Perception, advocates for rigorous cyber hygiene practices within healthcare supply chains on a recent episode of Expert’s Talk. He emphasizes the necessity of standard vendor questionnaires and robust security protocols and underscores the importance of continuous vendor risk assessments and software segmentation to effectively mitigate potential cyber threats, drawing lessons from major breaches like SolarWinds.

Key takeaways:

  1. Develop Standard Questionnaires for Vendors: Establishing standard questionnaires for all vendors can help assess the risks introduced by third parties and ensure they adhere to secure coding best practices.
  2. Vet Vendor Security Practices: It’s crucial to scrutinize the security practices surrounding the build environments of vendors to prevent incidents similar to the SolarWinds breach, where malware was inserted directly into the source code.
  3. Implement Software Segmentation: By applying segmentation to software, organizations can contain potential breaches within manageable risk levels, thereby minimizing widespread impact.
  4. Regular Patching and Updates: Ensuring that all software and devices within the supply chain are regularly updated and patched can significantly reduce vulnerabilities.
  5. Continuous Risk Assessment: Continual evaluation of the risks posed by vendors and their products is essential to adapting and strengthening cybersecurity measures over time.

Article written by Sonia Gossai

Follow us on social media for the latest updates in B2B!

Image

Latest

modern AI architecture
A Practical Guide to Modern AI Architecture, Workflow-First Thinking, and Scalable Business Value
April 24, 2026

Artificial intelligence has already moved beyond the hype cycle and into the day-to-day reality of business operations. Companies across industries are rushing to integrate AI into their workflows, but many are running into the same challenge: it’s relatively easy to build something that works in a demo, and much harder to make it reliable…

Read More
farm
The Business Case for AgTech: Better Data Is Key to Managing Risk on the Farm
April 23, 2026

Farming is under more pressure than it’s been in years. Costs are rising, prices are unpredictable, and every decision carries more weight than it used to. What many still think of as a traditional industry is quietly evolving, with more farmers turning to digital tools to manage risk and stay competitive. It’s not about chasing…

Read More
pre-clinical
From Classroom to Clinic: Pre-Clinical Talent Steps Into Healthcare’s Hard-to-Fill Roles
April 23, 2026

Healthcare systems are facing a workforce crisis that’s no longer temporary—it’s structural. Even before COVID-19, staffing shortages across nursing, technical, and administrative roles were already straining capacity; today, those gaps are wider, costlier, and directly impacting patient access. With labor shortages persisting and burnout rising, health systems are being forced to rethink not just…

Read More
learning
If Higher Ed Wants Experiential Learning at Scale, It Needs a Broader Playbook
April 21, 2026

The ground is shifting under higher education. AI is changing how people learn almost overnight—and at the same time, more than half of graduates are underemployed after finishing their degrees. That’s forcing a more uncomfortable question into the open: what is a college credential really worth today? As employers and governments shift their focus…

Read More