Healthcare Orgs, Take Control of Your Network! Level Up Cyber Hygiene with Diligent Vendor Vetting and Software Segmentation

Spacelabs Healthcare Banner Ad

 

The digital transformation of healthcare organizations has significantly increased reliance on software and medtech devices, weaving a complex web of interdependencies in their supply chains. This shift raises critical vulnerabilities as highlighted by infamous incidents like the SolarWinds breach, underscoring the urgency for enhanced cyber hygiene practices. With recent executive orders pushing for better security protocols, healthcare organizations are under pressure to fortify their supply chains against escalating cyber threats.

What strategies can healthcare organizations employ to effectively manage the cyber hygiene of their healthcare supply chain, including software and medtech devices?

Robin Berthier, CEO and founder of Network Perception, advocates for rigorous cyber hygiene practices within healthcare supply chains on a recent episode of Expert’s Talk. He emphasizes the necessity of standard vendor questionnaires and robust security protocols and underscores the importance of continuous vendor risk assessments and software segmentation to effectively mitigate potential cyber threats, drawing lessons from major breaches like SolarWinds.

Key takeaways:

  1. Develop Standard Questionnaires for Vendors: Establishing standard questionnaires for all vendors can help assess the risks introduced by third parties and ensure they adhere to secure coding best practices.
  2. Vet Vendor Security Practices: It’s crucial to scrutinize the security practices surrounding the build environments of vendors to prevent incidents similar to the SolarWinds breach, where malware was inserted directly into the source code.
  3. Implement Software Segmentation: By applying segmentation to software, organizations can contain potential breaches within manageable risk levels, thereby minimizing widespread impact.
  4. Regular Patching and Updates: Ensuring that all software and devices within the supply chain are regularly updated and patched can significantly reduce vulnerabilities.
  5. Continuous Risk Assessment: Continual evaluation of the risks posed by vendors and their products is essential to adapting and strengthening cybersecurity measures over time.

Article written by Sonia Gossai

Follow us on social media for the latest updates in B2B!

Image

Latest

Stop Guessing: How Reality Capture Improves Construction Productivity
January 20, 2026

Construction projects lose time and money when teams rely on assumptions. Someone says a section is “done,” another trade arrives, and then problems appear: wrong levels, missing openings, clashing services, or unfinished areas. That leads to rework, delays, and arguments. Reality capture helps because it replaces opinions with clear evidence. Reality capture means using tools…

Read More
Human Trafficking
National Human Trafficking Prevention Month
January 20, 2026

School Safety Today podcast, presented by Raptor Technologies. In this episode of School Safety Today, host Dr. Amy Grosso speaks with Kelly Brickl, a trainer with SPEAK UP, in recognition of National Human Trafficking Prevention Month. During the conversation, Brickl shares data, real-world warning signs, and explains how age-appropriate, research-based prevention curricula can empower…

Read More
college
A One-Year College Alternative: How Pega6 Is Preparing to Train AI-First, Job-Ready Talent
January 19, 2026

The traditional four-year college model is facing growing pressure as rising tuition, shifting labor market demands, and new technological realities expose gaps between education and employment outcomes. Confidence in the traditional college pathway is eroding among parents, students, and employers as rising costs and persistent skills gaps collide with the reality that many new…

Read More
radio
Where Experience Meets the Extreme: John F5VHQ at the World’s Most Isolated Radio Outpost
January 16, 2026

For some operators, Bouvet Island is the final frontier. For John (F5VHQ), it is a challenge that stands apart even after decades of DXpedition experience. A veteran of more than twenty years in the field and Vice President of the Clipperton DX Club, John joins the multinational 3Y0K team with both experience and conviction….

Read More