Healthcare Orgs, Take Control of Your Network! Level Up Cyber Hygiene with Diligent Vendor Vetting and Software Segmentation

Spacelabs Healthcare Banner Ad

 

The digital transformation of healthcare organizations has significantly increased reliance on software and medtech devices, weaving a complex web of interdependencies in their supply chains. This shift raises critical vulnerabilities as highlighted by infamous incidents like the SolarWinds breach, underscoring the urgency for enhanced cyber hygiene practices. With recent executive orders pushing for better security protocols, healthcare organizations are under pressure to fortify their supply chains against escalating cyber threats.

What strategies can healthcare organizations employ to effectively manage the cyber hygiene of their healthcare supply chain, including software and medtech devices?

Robin Berthier, CEO and founder of Network Perception, advocates for rigorous cyber hygiene practices within healthcare supply chains on a recent episode of Expert’s Talk. He emphasizes the necessity of standard vendor questionnaires and robust security protocols and underscores the importance of continuous vendor risk assessments and software segmentation to effectively mitigate potential cyber threats, drawing lessons from major breaches like SolarWinds.

Key takeaways:

  1. Develop Standard Questionnaires for Vendors: Establishing standard questionnaires for all vendors can help assess the risks introduced by third parties and ensure they adhere to secure coding best practices.
  2. Vet Vendor Security Practices: It’s crucial to scrutinize the security practices surrounding the build environments of vendors to prevent incidents similar to the SolarWinds breach, where malware was inserted directly into the source code.
  3. Implement Software Segmentation: By applying segmentation to software, organizations can contain potential breaches within manageable risk levels, thereby minimizing widespread impact.
  4. Regular Patching and Updates: Ensuring that all software and devices within the supply chain are regularly updated and patched can significantly reduce vulnerabilities.
  5. Continuous Risk Assessment: Continual evaluation of the risks posed by vendors and their products is essential to adapting and strengthening cybersecurity measures over time.

Article written by Sonia Gossai

Follow us on social media for the latest updates in B2B!

Image

Latest

Rothman Index
The Origin Story of the Rothman Index – Episode 5
January 8, 2026

Hospitals collect enormous amounts of clinical data, yet preventable patient decline remains a persistent challenge. Over the past two decades, hospitals have invested heavily in early warning scores and rapid response infrastructure, but translating data into timely, meaningful action has proven difficult. As clinicians contend with alert fatigue and increasing documentation burden, a more…

Read More
Rothman Index
My Mother and the Story of the Genesis of the Rothman Index – Episode 4
January 8, 2026

Healthcare generates enormous volumes of clinical data, yet making sense of that information in real time remains a challenge. Subtle changes in vitals, labs, and nursing assessments often precede serious events, but when that information is fragmented across the medical record, emerging risks can go unnoticed. The central challenge facing hospitals today is not…

Read More
home
Delivering Moments That Matter: The Art of Joy, Memory, and Meaning at Anthropologie Home
January 8, 2026

These days, ‘home’ means more than just four walls. It’s where people reset, gather, and express who they are—raising the bar for what they expect from the brands that help shape those spaces. Consumers are no longer just buying décor—they’re investing in meaning, memory, and moments that last. Research continues to show that people…

Read More
Texas energy
Small Margins, Big Risks: How Fraud Hurts Texas Energy Retailers
January 6, 2026

Fraud has quietly become one of the most existential threats in Texas’s deregulated retail electricity market—because the business runs on razor-thin margins and delayed payment. Under the non-POR system overseen by the Electric Reliability Council of Texas (ERCOT), retail energy providers assume the full risk of nonpayment. With profit margins often measured in just a…

Read More